Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

被引:9
作者
Singh, Inderjeet [1 ]
Araki, Toshinori [1 ]
Kakizaki, Kazuya [1 ]
机构
[1] NEC Corp Ltd, Kawasaki, Kanagawa, Japan
来源
2022 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS (WACVW 2022) | 2022年
关键词
D O I
10.1109/WACVW54805.2022.00036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
learning (ML)-based safety-critical applications are vulnerable to carefully crafted input instances called adversarial examples (AXs). An adversary can conveniently attack these target systems from digital as well as physical worlds. This paper aims to the generation of robust physical AXs against face recognition systems. We present a novel smoothness loss function and a patch-noise combo attack for realizing powerful physical AXs. The smoothness loss interjects the concept of delayed constraints during the attack generation process, thereby causing better handling of optimization complexity and smoother AXs for the physical domain. The patch-noise combo attack combines patch noise and imperceptibly small noises from different distributions to generate powerful registration-based physical AXs. An extensive experimental analysis found that our smoothness loss results in robust and more transferable digital and physical AXs than the conventional techniques. Notably, our smoothness loss results in a 1.17 and 1.97 times better mean attack success rate (ASR) in physical white-box and black-box attacks, respectively. Our patch-noise combo attack furthers the performance gains and results in 2.39 and 4.74 times higher mean ASR than conventional technique in physical world white-box and black-box attacks, respectively.
引用
收藏
页码:301 / 310
页数:10
相关论文
共 50 条
  • [21] AudioGuard: Speech Recognition System Robust against Optimized Audio Adversarial Examples
    Kwon, Hyun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (20) : 57943 - 57962
  • [22] Artificial Immune System of Secure Face Recognition Against Adversarial Attacks
    Ren, Min
    Wang, Yunlong
    Zhu, Yuhao
    Huang, Yongzhen
    Sun, Zhenan
    Li, Qi
    Tan, Tieniu
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 132 (12) : 5718 - 5740
  • [23] Adversarial Examples Improve Image Recognition
    Xie, Cihang
    Tan, Mingxing
    Gong, Boqing
    Wang, Jiang
    Yuille, Alan L.
    Le, Quoc, V
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 816 - 825
  • [24] VLA: A practical visible light-based atack on face recognition systems in physical world
    Shen, Meng
    Liao, Zelin
    Zhu, Liehuang
    Xu, Ke
    Du, Xiaojiang
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019, 3 (03)
  • [25] Imperceptible Physical Attack Against Face Recognition Systems via LED Illumination Modulation
    Fang, Junbin
    Jiang, Canjian
    Jiang, You
    Lin, Puxi
    Chen, Zhaojie
    Sun, Yujing
    Yiu, Siu-Ming
    Jiang, Zoe L.
    IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (02) : 461 - 473
  • [26] Adversarial Minimax Training for Robustness Against Adversarial Examples
    Komiyama, Ryota
    Hattori, Motonobu
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT II, 2018, 11302 : 690 - 699
  • [27] Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
    Hashemi, Mohammad J.
    Keller, Eric
    2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2020, : 37 - 43
  • [28] Adversarial Examples Against Image-based Malware Classification Systems
    Vi, Bao Ngoc
    Nguyen, Huu Noi
    Nguyen, Ngoc Tran
    Tran, Cao Truong
    PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2019), 2019, : 347 - 351
  • [29] Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World
    Wang, Jiakai
    Tao, Ye
    Zhang, Yichi
    Liu, Wanting
    Kong, Yusheng
    Tan, Shaolin
    Yan, Rongen
    Liu, Xianglong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8457 - 8471
  • [30] VeriFace: Defending against Adversarial Attacks in Face Verification Systems
    Sayed, Awny
    Kinlany, Sohair
    Zaki, Alaa
    Mahfouz, Ahmed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3151 - 3166