Adversarial Attack on Deep Learning-Based Splice Localization

被引:2
|
作者
Rozsa, Andras [1 ]
Zhong, Zheng [1 ]
Boult, Terrance E. [2 ]
机构
[1] Verisk Analyt, Jersey City, NJ 07310 USA
[2] UCCS VAST Lab, Colorado Springs, CO USA
关键词
CNN;
D O I
10.1109/CVPRW50498.2020.00332
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Regarding image forensics, researchers have proposed various approaches to detect and/or localize manipulations, such as splices. Recent best performing image-forensics algorithms greatly benefit from the application of deep learning, but such tools can be vulnerable to adversarial attacks. Due to the fact that most of the proposed adversarial example generation techniques can be used only on end-to-end classifiers, the adversarial robustness of image-forensics methods that utilize deep learning only for feature extraction has not been studied yet. Using a novel algorithm capable of directly adjusting the underlying representations of patches we demonstrate on three non end-to-end deep learning-based splice localization tools that hiding manipulations of images is feasible via adversarial attacks. While the tested image-forensics methods, EXIF-SC, SpliceRadar, and Noiseprint, rely on feature extractors that were trained on different surrogate tasks, we find that the formed adversarial perturbations can be transferable among them regarding the deterioration of their localization performance.
引用
收藏
页码:2757 / 2765
页数:9
相关论文
共 50 条
  • [1] Availability Adversarial Attack and Countermeasures for Deep Learning-based Load Forecasting
    Xu, Wangkun
    Teng, Fei
    [J]. 2023 IEEE BELGRADE POWERTECH, 2023,
  • [2] Wireless Universal Adversarial Attack and Defense for Deep Learning-Based Modulation Classification
    Wang, Zhaowei
    Liu, Weicheng
    Wang, Hui-Ming
    [J]. IEEE COMMUNICATIONS LETTERS, 2024, 28 (03) : 582 - 586
  • [3] A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense
    Muoka, Gladys W.
    Yi, Ding
    Ukwuoma, Chiagoziem C.
    Mutale, Albert
    Ejiyi, Chukwuebuka J.
    Mzee, Asha Khamis
    Gyarteng, Emmanuel S. A.
    Alqahtani, Ali
    Al-antari, Mugahed A.
    [J]. MATHEMATICS, 2023, 11 (20)
  • [4] A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems
    Mohammadian, Hesamodin
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    [J]. APPLIED SOFT COMPUTING, 2023, 137
  • [5] Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers
    Ke, Da
    Wang, Xiang
    Huang, Zhitao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4001 - 4011
  • [6] Universal Adversarial Attack on Deep Learning Based Prognostics
    Basak, Arghya
    Rathore, Pradeep
    Nistala, Sri Harsha
    Srinivas, Sagar
    Runkana, Venkataramana
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 23 - 29
  • [7] Evaluating Deep Learning-based NIDS in Adversarial Settings
    Mohammadian, Hesamodin
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 435 - 444
  • [8] Transferable Adversarial Attack Against Deep Reinforcement Learning-Based Smart Grid Dynamic Pricing System
    Ren, Yan
    Zhang, Heng
    Yang, Wen
    Li, Ming
    Zhang, Jian
    Li, Hongran
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (06) : 9015 - 9025
  • [9] Similarity attack: An adversarial attack game for image classification based on deep learning
    Tian, Xuejun
    Tian, Xinyuan
    Pan, Bingqin
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1467 - 1478
  • [10] Adversarial Attack for Deep Reinforcement Learning Based Demand Response
    Wan, Zhiqiang
    Li, Hepeng
    Shuai, Hang
    Sun, Yan
    He, Haibo
    [J]. 2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,