Mitigation and Identification of Camouflage Attack Over Computer Vision Applications

Abstract

Computer vision technologies are now commonly used in real-time image and video recognition applications using deep neural networks. Scaling or Mitigation is the basic input pre-processing feature in these implementations. Image scaling methods are designed to maintain visual elements before and after scaling, and are widely utilized in a variety of visual and image processing applications. Content disguising attacks may be carried out by taking advantage of the picture scaling mechanism, which causes the machine's extracted content to be drastically different from the input before scaling. In this project the actual input image with dimension Am×n is resized to an attacked image dimension Om1×n1, which will mislead the classifier as the input is attacked image. To illustrate the threats from such camouflage attacks, some computer vision applications taken as targeted victims that includes multiple image classification applications based on popular deep learning frameworks like OpenCV, pillow. This attack is not detected while checking with the YOLOV4 demo. To defend against such attacks, in this project using Dhash i.e., difference hash concept. The hash the value of the actual image and the resized are same when using the Dhash. If the image is camouflaged the means the content is modified so the Dhash value of the image also changed if the image is not camouflaged the then the hash value of the actual image and resized images are same. By using the Dhash concept detecting the image is camouflaged or not.

Authors and Affiliations

Chandra Sekhar Sanaboina

Keywords

Related Articles

Mobile Cloud Computing Applications and Challenges

Mobile Cloud Computing (MCC) combines mobile computing and cloud computing. Cloud Computing includes application and services that run on distributed network using virtualized resources and excess by common internet prot...

Review on Teaching Ethical Hacking

The word hacker generally characterize the practice or performance of investigating & carry out trial with computer networks as computer communications grew more ubiquitous with the emergence of the Internet. However, wh...

Review on Sustainability Management Using Zero Waste Concept for Building Construction

All over the world, construction and demolition (C&D) waste is generated in enormous amount which leads to various environmental problems. The waste is dumped illegally or into the landfills which degrades the soil and c...

Aerosol Optical Thickness (AOT) Assessment Using GIS & Remote Sensing

Atmospheric aerosol particles are one of the significant agents of air quality degradation. MODIS, GIS and Remote Sensing techniques have made the way of AOT assessment easiest over historic manual systems. This paper co...

Sentimental Analysis of a Sentence

Sentimental examination or assessment mining is a procedure of regular language handling which is utilized to decide the extremity of the content ( i.e, regardless of whether the content is good , negative , or impartia...

Download PDF file
  • EP ID EP746923
  • DOI 10.55524/ijircst.2022.10.1.12
  • Views 25
  • Downloads 0

How To Cite

Chandra Sekhar Sanaboina (2022). Mitigation and Identification of Camouflage Attack Over Computer Vision Applications. International Journal of Innovative Research in Computer Science and Technology, 10(1), -. https://europub.co.uk/articles/-A-746923