Arxiv:2105.05558V1 [Eess.IV] 12 May 2021

Arxiv:2105.05558V1 [Eess.IV] 12 May 2021

AVA: Adversarial Vignetting Attack against Visual Recognition Binyu Tian1 , Felix Juefei-Xu2 , Qing Guo3∗ , Xiaofei Xie3 , Xiaohong Li1∗ , Yang Liu3 1 College of Intelligence and Computing, Tianjin University, China 2 Alibaba Group, USA 3 Nanyang Technological University, Singapore Abstract Vignetting is an inherit imaging phenomenon within almost all optical systems, showing as a ra- dial intensity darkening toward the corners of an image. Since it is a common effect for the photog- raphy and usually appears as a slight intensity vari- ation, people usually regard it as a part of a photo (a) Real-world Vignetting Examples and would not even want to post-process it. Due ResNet50: ResNet50: to this natural advantage, in this work, we study Bison Hippo the vignetting from a new viewpoint, i.e., adver- sarial vignetting attack (AVA), which aims to em- bed intentionally misleading information into the vignetting and produce a natural adversarial ex- ample without noise patterns. This example can AVA fool the state-of-the-art deep convolutional neural networks (CNNs) but is imperceptible to human. To this end, we first propose the radial-isotropic adversarial vignetting attack (RI-AVA) based on ResNet50: ResNet50: the physical model of vignetting, where the phys- Alp Lakeside ical parameters (e.g., illumination factor and fo- (b) Adversarial Vignetting Examples cal length) are tuned through the guidance of tar- Figure 1: (a) shows three real vignetting images captured by cam- get CNN models. To achieve higher transferability eras. (b) shows the adversarial examples produced by our adversar- across different CNNs, we further propose radial- ial vignetting attack (AVA), fooling the SOTA CNN ResNet50 with imperceptible property due to the realistic vignetting effects. anisotropic adversarial vignetting attack (RA-AVA) by allowing the effective regions of vignetting to be radial-anisotropic and shape-free. Moreover, we image border with continuous reduction of the image bright- propose the geometry-aware level-set optimization ness or saturation [Gonzalez et al., 2004]. Vignetting often method to solve the adversarial vignetting regions naturally occurs during the photo taking process. As cate- and physical parameters jointly. We validate the gorized by [Ray, 2002], there are the following three main proposed methods on three popular datasets, i.e., causes of vignetting for digital imaging: (1) mechanical vi- DEV, CIFAR10, and Tiny ImageNet, by attack- gnetting, (2) optical vignetting, and (3) natural vignetting. arXiv:2105.05558v1 [eess.IV] 12 May 2021 ing four CNNs, e.g., ResNet50, EfficientNet-B0, Both mechanical vignetting and optical vignetting are some- DenseNet121, and MobileNet-V2, demonstrating how caused by the blockage of light. For example, the me- the advantages of our methods over baseline meth- chanical vignetting is caused by light emanated from off-axis ods on both transferability and image quality. scene being partially blocked by external objects such as lens hoods, and the optical vignetting is usually caused by the mul- tiple element lens setting where the effective lens opening for 1 Introduction off-axis incident light can be reduced. On the other hand, In photography, image vignetting is a common effect as a re- naturally vignetting is not due to light blockage, but rather sult of camera settings or lens limitations. It shows up as a by the law of illumination falloff where the light falloff is gradually darkened transparent ring-shape mask towards the proportional to the 4-th power of the cosine of the angle at which the light particles hit the digital sensor. Sometimes, vi- ∗Qing Guo and Xiaohong Li are the corresponding authors ( gnetting can also be applied on the digital image as an artistic [email protected] and [email protected]). post-processing step to draw people’s attention to the center portion of the photograph as depicted in Fig.1(a). sparse or real-life patterns. [Croce and Hein, 2019] proposes Therefore, image vignetting can be capitalized to ideally a new attack method to generate adversarial examples aiming hide adversarial attack information in a stealthy way for its at minimizing the l0-distance to the original image. It allows ubiquity and naturalness in digital imaging. In this work, pixels to change only in region of high variation and avoiding we propose a novel and stealthy attack method called the changes along axis-aligned edges, resulting in almost non- adversarial vignetting attack (AVA) that aims at embedding perceivable adversarial examples. [Wong et al., 2019] pro- intentionally misleading information into the vignetting and poses a new threat model for adversarial attacks based on the producing a natural adversarial example without noise pat- Wasserstein distance. The resulting algorithm can success- terns, as depicted in Fig.1(b). By first mathematically and fully attack image classification models, bringing traditional physically model the image vignetting effect, we have pro- CIFAR10 models down to 3% accuracy within a Wasserstein posed the radial-isotropic adversarial vignetting attack (RI- ball with radius 0.1. [Bhattad et al., 2019] introduces “un- AVA) and the physical parameters such as the illumination restricted” perturbations that manipulate semantically mean- factors and the focal length are tuned through the guidance of ingful image-based visual descriptors (e.g., color and texture) the target CNN models under attack. Next, by further allow- to generate effective and photorealistic adversarial examples. ing the effective regions of vignetting to be radial-anisotropic [Guo et al., 2020b] proposes an adversarial attack method that and shape-free, our proposed radial-anisotropic adversarial can generate visually natural motion-blurred adversarial ex- vignetting attack (RA-AVA) can achieve much higher trans- amples. Along similar lines, non-additive noise based adver- ferability across different CNN models. Moreover, we have sarial attacks that focus on producing realistic degradation- proposed the level-set-based optimization method, that is like adversarial patterns have emerged in several recent stud- geometry-aware, to solve the adversarial vignetting regions ies, such as adversarial rain [Zhai et al., 2020] and haze and physical parameters jointly. [Gao et al., 2021], adversarial exposure for medical analy- Through extensive experiments, we have validated the sis [Cheng et al., 2020b] and co-saliency detection problems effectiveness of the proposed methods on three popular [Gao et al., 2020], adversarial bias field in medial imaging datasets, i.e., DEV [Google, 2017], CIFAR10 [Krizhevsky et [Tian et al., 2020], as well as adversarial denoising [Cheng al., 2009], and Tiny ImageNet [Stanford, 2017], by attacking et al., 2020a] and face morphing [Wang et al., 2020]. These four CNNs, e.g., ResNet50 [He et al., 2016], EfficientNet- methods apply patterns that may be produced in reality such B0 [Tan and Le, 2019], DenseNet121 [Huang et al., 2017], as color and texture to attack, but ignore the patterns that are and MobileNet-V2 [Sandler et al., 2018]. We have suc- generated naturally in the optical systems, which are also vi- cessfully demonstrated the advantages of our methods over tally important. strong baseline methods especially on transerferbility and im- Vignetting correction methods. Research into vignetting age quality. To the best of our knowledge, this is the very first correction has a long history. The Kang-Weiss model [Kang attempt to formulate stealthy adversarial attack by means of and Weiss, 2000] is established to simulate the vignetting ef- image vignetting and showcase both the feasibility and the fect. It proves that it is possible to calibrate a camera using effectiveness through extensive experiments. just a flat, textureless Lambertian surface and constant illumi- nation. [Zheng et al., 2008] proposes a method for robustly 2 Related Work determining the vignetting function in order to remove the vignetting given only a single image. [Goldman, 2010] fur- Adversarial noise attacks. Adversarial noise attacks aim to ther proposes a method to remove the vignetting from the im- fool DNNs by adding imperceptible perturbations to the im- ages without resolving ambiguities or the previously known ages. One of the most popular attack methods, i.e., fast gradi- scale and gamma ambiguities. These works on correcting ent sign method (FGSM) [Goodfellow et al., 2014], involves the vignetting effect provides a basis for us to model the vi- only one back propagation step in the process of calculating gnetting effect. Inspired by these work, we will capitalize the the gradient of cost function, enabling simple and fast adver- vignetting effect as a means of an adversarial attack. sarial example generation. [Kurakin et al., 2016] proposes an improved version of FGSM, known as basic iteration method 3 Adversarial Vignetting Attack (AVA) (BIM), which heuristically search for examples that are most likely to fool the classifier. [Dong et al., 2018] proposes a Vignetting effect is related to numerous factors, e.g., angle- broad class of momentum-based iterative algorithms to boost variant light across camera sensor, intrinsic lens character- adversarial attacks. By integrating the momentum term into istics, and physical occlusions. There are several works the iterative process for attacks, it can stabilize update di- studying how to model the vignetting including empirical- rections and escape from poor local maxima during the it- based [Goldman, 2010; Yu, 2004] and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us