Mitigation and Identification of Camouflage Attack Over Computer Vision Applications

Abstract

Computer vision technologies are now commonly used in real-time image and video recognition applications using deep neural networks. Scaling or Mitigation is the basic input pre-processing feature in these implementations. Image scaling methods are designed to maintain visual elements before and after scaling, and are widely utilized in a variety of visual and image processing applications. Content disguising attacks may be carried out by taking advantage of the picture scaling mechanism, which causes the machine's extracted content to be drastically different from the input before scaling. In this project the actual input image with dimension Am×n is resized to an attacked image dimension Om1×n1, which will mislead the classifier as the input is attacked image. To illustrate the threats from such camouflage attacks, some computer vision applications taken as targeted victims that includes multiple image classification applications based on popular deep learning frameworks like OpenCV, pillow. This attack is not detected while checking with the YOLOV4 demo. To defend against such attacks, in this project using Dhash i.e., difference hash concept. The hash the value of the actual image and the resized are same when using the Dhash. If the image is camouflaged the means the content is modified so the Dhash value of the image also changed if the image is not camouflaged the then the hash value of the actual image and resized images are same. By using the Dhash concept detecting the image is camouflaged or not.

Authors and Affiliations

Chandra Sekhar Sanaboina

Keywords

Related Articles

Meliorate QOS of WIFI-WIMAXin Backhaul Networks

Wireless access networks are developing at a very rapid rate. They are convenient in providing Internet access in remote inaccessible areas thatconfront for traditional wireline service providers. Wireless communication...

Advertisement Based Lock Screen Using Location and Time Information

Advertisements are more important for locality based business to improve their sales through advertisement to attract more new customers. In this project, we integrate Advertisements template with mobile lock screen usin...

A Game-Theoretic Framework for a Next-Generation Retail Power Market with a Large Number of Distributed Residential Electricity Suppliers

This study provides a novel a system dynamics foundation for this next retail electricity industry (the "Energy Network") with both a large number of dispersed household electricity providers (the "Energy Cells"). The pr...

Use of Waste Plastic Materials in Flexible Pavements

Plastic waste generation and disposal contribute significantly to pollution and global warming. The properties and strength of bituminous mixtures are both enhanced by the inclusion of plastic detritus. Also, it will be...

Text Summarization with Sentimental Analysis

In today’s world, Modern organizations deal with terabytes of text, such as email, that often plays a significant role in their day to day operations. The user has to face a task of identifying useful information from th...

Download PDF file
  • EP ID EP746923
  • DOI 10.55524/ijircst.2022.10.1.12
  • Views 39
  • Downloads 0

How To Cite

Chandra Sekhar Sanaboina (2022). Mitigation and Identification of Camouflage Attack Over Computer Vision Applications. International Journal of Innovative Research in Computer Science and Technology, 10(1), -. https://europub.co.uk/articles/-A-746923