Chen et al., 2020 - Google Patents
Scaling camouflage: Content disguising attack against computer vision applicationsChen et al., 2020
- Document ID
- 2781693343522327750
- Author
- Chen Y
- Shen C
- Wang C
- Xiao Q
- Li K
- Chen Y
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
Recently, deep neural networks have achieved state-of-the-art performance in multiple computer vision tasks, and become core parts of computer vision applications. In most of their implementations, a standard input preprocessing component called image scaling is …
- 238000001514 detection method 0 abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wen et al. | Differential private identification protection for face images | |
| Li et al. | Deeppayload: Black-box backdoor attack on deep learning models through neural payload injection | |
| Xiao et al. | Seeing is not believing: Camouflage attacks on image scaling algorithms | |
| Tramèr et al. | Adversarial: Perceptual ad blocking meets adversarial machine learning | |
| Chen et al. | Scaling camouflage: Content disguising attack against computer vision applications | |
| Waghela et al. | Robust image classification: Defensive strategies against FGSM and PGD adversarial attacks | |
| Gowda et al. | StegColNet: Steganalysis based on an ensemble colorspace approach | |
| Yang et al. | Generating and restoring private face images for internet of vehicles based on semantic features and adversarial examples | |
| Dinh et al. | Human-artificial intelligence approaches for secure analysis in CAPTCHA codes | |
| Banerjee et al. | A Survey: Deepfake and Current Technologies for Solutions. | |
| Hou et al. | M-to-N backdoor paradigm: A multi-trigger and multi-target attack to deep learning models | |
| Cao et al. | Transferable adversarial attack on image tampering localization | |
| Zhao et al. | RA-RevGAN: region-aware reversible adversarial example generation network for privacy-preserving applications | |
| Liu et al. | Hide and seek: on the stealthiness of attacks against deep learning systems | |
| Lin et al. | Out-of-bounding-box triggers: A stealthy approach to cheat object detectors | |
| Chen et al. | Oriole: Thwarting privacy against trustworthy deep learning models | |
| Kotey et al. | Preserving Privacy in Multimedia: Text-Aware Sensitive Information Masking for Visual Data | |
| Duan et al. | Feature refine network for text-based captcha recognition | |
| Li et al. | Concealed backdoor attack on diffusion models for smart devices with non-standard gaussian distribution noise | |
| Deng et al. | An improved seq-deepfake detection method | |
| Park et al. | Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware | |
| Liu et al. | Towards invisible backdoor attacks in the frequency domain against deep neural networks | |
| Singh et al. | A comprehensive review of deep learning techniques for image forgery detection | |
| US20250217633A1 (en) | Method, electronic device, and product for determining generative model | |
| Denysiuk et al. | Method for Detecting Malicious Commands Transmitted via Images Using Steganography |