Loading…
Geometrically Adaptive Dictionary Attack on Face Recognition
CNN-based face recognition models have brought remarkable performance improvement, but they are vulnerable to adversarial perturbations. Recent studies have shown that adversaries can fool the models even if they can only access the models' hard-label output. However, since many queries are nee...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 3818 |
container_issue | |
container_start_page | 3809 |
container_title | |
container_volume | |
creator | Byun, Junyoung Go, Hyojun Kim, Changick |
description | CNN-based face recognition models have brought remarkable performance improvement, but they are vulnerable to adversarial perturbations. Recent studies have shown that adversaries can fool the models even if they can only access the models' hard-label output. However, since many queries are needed to find imperceptible adversarial noise, reducing the number of queries is crucial for these attacks. In this paper, we point out two limitations of existing decision-based black-box attacks. We observe that they waste queries for background noise optimization, and they do not take advantage of adversarial perturbations generated for other images. We exploit 3D face alignment to overcome these limitations and propose a general strategy for query-efficient black-box attacks on face recognition named Geometrically Adaptive Dictionary Attack (GADA). Our core idea is to create an adversarial perturbation in the UV texture map and project it onto the face in the image. It greatly improves query efficiency by limiting the perturbation search space to the facial area and effectively recycling previous perturbations. We apply the GADA strategy to two existing attack methods and show overwhelming performance improvement in the experiments on the LFW and CPLFW datasets. Furthermore, we also present a novel attack strategy that can circumvent query similarity-based stateful detection that identifies the process of query-based black-box attacks. |
doi_str_mv | 10.1109/WACV51458.2022.00386 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9706763</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9706763</ieee_id><sourcerecordid>9706763</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-1dc805ed6295ac020a22fc08974885a0bf9ad88f9f2c8a3d872cb0c21a0627c43</originalsourceid><addsrcrecordid>eNotjt1Kw0AQhVdBsK0-gV7kBRJnZ7ObXfAmRFsLhYL4c1mmk42spklJFsG3b0SvDpzv8HGEuJWQSQnu7r2s3rTMtc0QEDMAZc2ZmEtjdA5OajgXMzQ5pk5ZeSnm4_g5bZx0aibuV74_-DgEprb9ScqajjF8--QhcAx9R8PUxUj8lfRdsiT2ybPn_qMLv_RKXDTUjv76Pxfidfn4Uj2lm-1qXZWbNCComMqaLWhfG3SaGBAIsWGwrsit1QT7xlFtbeMaZEuqtgXyHhglgcGCc7UQN3_e4L3fHYdwmH7tXAGmMEqdAHjsR90</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Geometrically Adaptive Dictionary Attack on Face Recognition</title><source>IEEE Xplore All Conference Series</source><creator>Byun, Junyoung ; Go, Hyojun ; Kim, Changick</creator><creatorcontrib>Byun, Junyoung ; Go, Hyojun ; Kim, Changick</creatorcontrib><description>CNN-based face recognition models have brought remarkable performance improvement, but they are vulnerable to adversarial perturbations. Recent studies have shown that adversaries can fool the models even if they can only access the models' hard-label output. However, since many queries are needed to find imperceptible adversarial noise, reducing the number of queries is crucial for these attacks. In this paper, we point out two limitations of existing decision-based black-box attacks. We observe that they waste queries for background noise optimization, and they do not take advantage of adversarial perturbations generated for other images. We exploit 3D face alignment to overcome these limitations and propose a general strategy for query-efficient black-box attacks on face recognition named Geometrically Adaptive Dictionary Attack (GADA). Our core idea is to create an adversarial perturbation in the UV texture map and project it onto the face in the image. It greatly improves query efficiency by limiting the perturbation search space to the facial area and effectively recycling previous perturbations. We apply the GADA strategy to two existing attack methods and show overwhelming performance improvement in the experiments on the LFW and CPLFW datasets. Furthermore, we also present a novel attack strategy that can circumvent query similarity-based stateful detection that identifies the process of query-based black-box attacks.</description><identifier>EISSN: 2642-9381</identifier><identifier>EISBN: 1665409150</identifier><identifier>EISBN: 9781665409155</identifier><identifier>DOI: 10.1109/WACV51458.2022.00386</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Deep Learning -> Adversarial Learning; Adversarial Attack and Defense Methods Deep Learning ; Dictionaries ; Face recognition ; Limiting ; Perturbation methods ; Search problems ; Semantics ; Three-dimensional displays</subject><ispartof>2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2022, p.3809-3818</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9706763$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,23910,23911,25119,27904,54533,54910</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9706763$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Byun, Junyoung</creatorcontrib><creatorcontrib>Go, Hyojun</creatorcontrib><creatorcontrib>Kim, Changick</creatorcontrib><title>Geometrically Adaptive Dictionary Attack on Face Recognition</title><title>2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)</title><addtitle>WACV</addtitle><description>CNN-based face recognition models have brought remarkable performance improvement, but they are vulnerable to adversarial perturbations. Recent studies have shown that adversaries can fool the models even if they can only access the models' hard-label output. However, since many queries are needed to find imperceptible adversarial noise, reducing the number of queries is crucial for these attacks. In this paper, we point out two limitations of existing decision-based black-box attacks. We observe that they waste queries for background noise optimization, and they do not take advantage of adversarial perturbations generated for other images. We exploit 3D face alignment to overcome these limitations and propose a general strategy for query-efficient black-box attacks on face recognition named Geometrically Adaptive Dictionary Attack (GADA). Our core idea is to create an adversarial perturbation in the UV texture map and project it onto the face in the image. It greatly improves query efficiency by limiting the perturbation search space to the facial area and effectively recycling previous perturbations. We apply the GADA strategy to two existing attack methods and show overwhelming performance improvement in the experiments on the LFW and CPLFW datasets. Furthermore, we also present a novel attack strategy that can circumvent query similarity-based stateful detection that identifies the process of query-based black-box attacks.</description><subject>Deep Learning -> Adversarial Learning; Adversarial Attack and Defense Methods Deep Learning</subject><subject>Dictionaries</subject><subject>Face recognition</subject><subject>Limiting</subject><subject>Perturbation methods</subject><subject>Search problems</subject><subject>Semantics</subject><subject>Three-dimensional displays</subject><issn>2642-9381</issn><isbn>1665409150</isbn><isbn>9781665409155</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjt1Kw0AQhVdBsK0-gV7kBRJnZ7ObXfAmRFsLhYL4c1mmk42spklJFsG3b0SvDpzv8HGEuJWQSQnu7r2s3rTMtc0QEDMAZc2ZmEtjdA5OajgXMzQ5pk5ZeSnm4_g5bZx0aibuV74_-DgEprb9ScqajjF8--QhcAx9R8PUxUj8lfRdsiT2ybPn_qMLv_RKXDTUjv76Pxfidfn4Uj2lm-1qXZWbNCComMqaLWhfG3SaGBAIsWGwrsit1QT7xlFtbeMaZEuqtgXyHhglgcGCc7UQN3_e4L3fHYdwmH7tXAGmMEqdAHjsR90</recordid><startdate>202201</startdate><enddate>202201</enddate><creator>Byun, Junyoung</creator><creator>Go, Hyojun</creator><creator>Kim, Changick</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202201</creationdate><title>Geometrically Adaptive Dictionary Attack on Face Recognition</title><author>Byun, Junyoung ; Go, Hyojun ; Kim, Changick</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-1dc805ed6295ac020a22fc08974885a0bf9ad88f9f2c8a3d872cb0c21a0627c43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Deep Learning -> Adversarial Learning; Adversarial Attack and Defense Methods Deep Learning</topic><topic>Dictionaries</topic><topic>Face recognition</topic><topic>Limiting</topic><topic>Perturbation methods</topic><topic>Search problems</topic><topic>Semantics</topic><topic>Three-dimensional displays</topic><toplevel>online_resources</toplevel><creatorcontrib>Byun, Junyoung</creatorcontrib><creatorcontrib>Go, Hyojun</creatorcontrib><creatorcontrib>Kim, Changick</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Byun, Junyoung</au><au>Go, Hyojun</au><au>Kim, Changick</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Geometrically Adaptive Dictionary Attack on Face Recognition</atitle><btitle>2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)</btitle><stitle>WACV</stitle><date>2022-01</date><risdate>2022</risdate><spage>3809</spage><epage>3818</epage><pages>3809-3818</pages><eissn>2642-9381</eissn><eisbn>1665409150</eisbn><eisbn>9781665409155</eisbn><coden>IEEPAD</coden><abstract>CNN-based face recognition models have brought remarkable performance improvement, but they are vulnerable to adversarial perturbations. Recent studies have shown that adversaries can fool the models even if they can only access the models' hard-label output. However, since many queries are needed to find imperceptible adversarial noise, reducing the number of queries is crucial for these attacks. In this paper, we point out two limitations of existing decision-based black-box attacks. We observe that they waste queries for background noise optimization, and they do not take advantage of adversarial perturbations generated for other images. We exploit 3D face alignment to overcome these limitations and propose a general strategy for query-efficient black-box attacks on face recognition named Geometrically Adaptive Dictionary Attack (GADA). Our core idea is to create an adversarial perturbation in the UV texture map and project it onto the face in the image. It greatly improves query efficiency by limiting the perturbation search space to the facial area and effectively recycling previous perturbations. We apply the GADA strategy to two existing attack methods and show overwhelming performance improvement in the experiments on the LFW and CPLFW datasets. Furthermore, we also present a novel attack strategy that can circumvent query similarity-based stateful detection that identifies the process of query-based black-box attacks.</abstract><pub>IEEE</pub><doi>10.1109/WACV51458.2022.00386</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2642-9381 |
ispartof | 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2022, p.3809-3818 |
issn | 2642-9381 |
language | eng |
recordid | cdi_ieee_primary_9706763 |
source | IEEE Xplore All Conference Series |
subjects | Deep Learning -> Adversarial Learning Adversarial Attack and Defense Methods Deep Learning Dictionaries Face recognition Limiting Perturbation methods Search problems Semantics Three-dimensional displays |
title | Geometrically Adaptive Dictionary Attack on Face Recognition |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T17%3A41%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Geometrically%20Adaptive%20Dictionary%20Attack%20on%20Face%20Recognition&rft.btitle=2022%20IEEE/CVF%20Winter%20Conference%20on%20Applications%20of%20Computer%20Vision%20(WACV)&rft.au=Byun,%20Junyoung&rft.date=2022-01&rft.spage=3809&rft.epage=3818&rft.pages=3809-3818&rft.eissn=2642-9381&rft.coden=IEEPAD&rft_id=info:doi/10.1109/WACV51458.2022.00386&rft.eisbn=1665409150&rft.eisbn_list=9781665409155&rft_dat=%3Cieee_CHZPO%3E9706763%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-1dc805ed6295ac020a22fc08974885a0bf9ad88f9f2c8a3d872cb0c21a0627c43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9706763&rfr_iscdi=true |