Mitigation and Identification of Camouflage Attack Over Computer Vision Applications

Abstract

Computer vision technologies are now commonly used in real-time image and video recognition applications using deep neural networks. Scaling or Mitigation is the basic input pre-processing feature in these implementations. Image scaling methods are designed to maintain visual elements before and after scaling, and are widely utilized in a variety of visual and image processing applications. Content disguising attacks may be carried out by taking advantage of the picture scaling mechanism, which causes the machine's extracted content to be drastically different from the input before scaling. In this project the actual input image with dimension Am×n is resized to an attacked image dimension Om1×n1, which will mislead the classifier as the input is attacked image. To illustrate the threats from such camouflage attacks, some computer vision applications taken as targeted victims that includes multiple image classification applications based on popular deep learning frameworks like OpenCV, pillow. This attack is not detected while checking with the YOLOV4 demo. To defend against such attacks, in this project using Dhash i.e., difference hash concept. The hash the value of the actual image and the resized are same when using the Dhash. If the image is camouflaged the means the content is modified so the Dhash value of the image also changed if the image is not camouflaged the then the hash value of the actual image and resized images are same. By using the Dhash concept detecting the image is camouflaged or not.

Authors and Affiliations

Chandra Sekhar Sanaboina

Keywords

Related Articles

An Analysis of Vermicomposting in Agriculture

massive amount of solid garbage generated across world is a serious biological & technical issue. Vermicomposting might be feasible solution for ecologically friendly solid waste management. This article gives a broad o...

Study of Optimum Mix Design of Light-Weight Self Compaction Concrete

The tremendous growth in population, globalization and industrialization have led to the development of the construction sectors. The construction sector contributes a majorly to the development of the country based on i...

Microgrids Based on Regionalised Authority and Control

Since its inception in the late 1800s, the electrical infrastructure has only grown throughout the previous century. The demand for and need for this infrastructure will increase as the world's reliance on electrical ene...

Integral Identity method to fluid flow through cracked porous media with different wetting abilities

It is a notable actual peculiarities when a permeable media is totally immersed with a non-wetting liquid. For instance, water is brought into contact. The last option will more often than not precipitously stream into t...

Customer Churn Scrutiny and Prediction Using Data Extraction Models in Funding Sectors

A new method for customer churn analysis and prediction has been proposed. The method uses data Extraction model in Funding industries. This has been inspired by the fact that there are around 1,5 million churn customers...

Download PDF file
  • EP ID EP746923
  • DOI 10.55524/ijircst.2022.10.1.12
  • Views 5
  • Downloads 0

How To Cite

Chandra Sekhar Sanaboina (2022). Mitigation and Identification of Camouflage Attack Over Computer Vision Applications. International Journal of Innovative Research in Computer Science and Technology, 10(1), -. https://europub.co.uk/articles/-A-746923