论文标题

对二进制图像识别系统的对抗性攻击

Adversarial Attacks on Binary Image Recognition Systems

论文作者

Balkanski, Eric, Chase, Harrison, Oshiba, Kojin, Rilee, Alexander, Singer, Yaron, Wang, Richard

论文摘要

我们启动对二进制模型(即黑白)图像分类模型的对抗性攻击的研究。尽管在攻击彩色和灰度图像的攻击模型上进行了大量工作,但关于二进制图像模型的攻击知之甚少。经过培训的用于对二进制图像进行分类的模型用于文本识别应用程序,例如检查处理,车牌识别,发票处理等。与彩色图像和灰度图像相反,对二进制图像的攻击空间受到极大限制,并且每个像素中都无法掩盖噪声。因此,对二进制图像的攻击的优化格局引入了新的基本挑战。 在本文中,我们介绍了一种名为Scar的新攻击算法,旨在欺骗二进制图像的分类器。我们表明,疤痕明显胜过现有的$ L_0 $攻击,用于二进制设置,并使用它来证明现实世界文本识别系统的脆弱性。 Scar在实践中的强劲表现与存在对大型扰动的分类器的存在形成鲜明对比。在许多情况下,更改单个像素足以欺骗一种流行的开源文本识别系统Tesseract,将单词误认为是英语词典中的一个不同单词。我们还向大多数主要的美国银行提供了支票处理系统提供商的软件,并证明了对移动存款的支票识别的脆弱性。这些系统很难愚弄,因为它们独立地用数字和字母对两个手写量进行了分类。然而,我们将疤痕推广到设计攻击,这些攻击使用不明显的扰动欺骗了最先进的检查处理系统,从而导致存款金额错误分类。因此,这是执行财务欺诈的强大方法。

We initiate the study of adversarial attacks on models for binary (i.e. black and white) image classification. Although there has been a great deal of work on attacking models for colored and grayscale images, little is known about attacks on models for binary images. Models trained to classify binary images are used in text recognition applications such as check processing, license plate recognition, invoice processing, and many others. In contrast to colored and grayscale images, the search space of attacks on binary images is extremely restricted and noise cannot be hidden with minor perturbations in each pixel. Thus, the optimization landscape of attacks on binary images introduces new fundamental challenges. In this paper we introduce a new attack algorithm called SCAR, designed to fool classifiers of binary images. We show that SCAR significantly outperforms existing $L_0$ attacks applied to the binary setting and use it to demonstrate the vulnerability of real-world text recognition systems. SCAR's strong performance in practice contrasts with the existence of classifiers that are provably robust to large perturbations. In many cases, altering a single pixel is sufficient to trick Tesseract, a popular open-source text recognition system, to misclassify a word as a different word in the English dictionary. We also license software from providers of check processing systems to most of the major US banks and demonstrate the vulnerability of check recognitions for mobile deposits. These systems are substantially harder to fool since they classify both the handwritten amounts in digits and letters, independently. Nevertheless, we generalize SCAR to design attacks that fool state-of-the-art check processing systems using unnoticeable perturbations that lead to misclassification of deposit amounts. Consequently, this is a powerful method to perform financial fraud.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源