Mitigation and Identification of Camouflage Attack Over Computer Vision Applications
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2022, Vol 10, Issue 1
Abstract
Computer vision technologies are now commonly used in real-time image and video recognition applications using deep neural networks. Scaling or Mitigation is the basic input pre-processing feature in these implementations. Image scaling methods are designed to maintain visual elements before and after scaling, and are widely utilized in a variety of visual and image processing applications. Content disguising attacks may be carried out by taking advantage of the picture scaling mechanism, which causes the machine's extracted content to be drastically different from the input before scaling. In this project the actual input image with dimension Am×n is resized to an attacked image dimension Om1×n1, which will mislead the classifier as the input is attacked image. To illustrate the threats from such camouflage attacks, some computer vision applications taken as targeted victims that includes multiple image classification applications based on popular deep learning frameworks like OpenCV, pillow. This attack is not detected while checking with the YOLOV4 demo. To defend against such attacks, in this project using Dhash i.e., difference hash concept. The hash the value of the actual image and the resized are same when using the Dhash. If the image is camouflaged the means the content is modified so the Dhash value of the image also changed if the image is not camouflaged the then the hash value of the actual image and resized images are same. By using the Dhash concept detecting the image is camouflaged or not.
Authors and Affiliations
Chandra Sekhar Sanaboina
A Critical Review of Lignocellulosic Waste Pretreatment for Biofuel Production
Environmental protection is a top priority, and this can only be accomplished by minimizing Chemicals are used in the manufacturing of fuel. As a biofuel source, bioethanol production waste has become more and more attra...
Additives in Honey Detection: A Review Paper
The adulterant of choice for my sample is sugar cane and corn syrup, which is one of the most frequent adulterants used in a range of honey products. Honey adulteration is a complex issue across the world in general and...
Time and Motion Study Methods for Manufacturing a Pump
The purpose of the study was to compare conventional time study method and MOST analysis on oil pump assembly in a manufacturing company. The results showed that the time study resulted in 0.239 minutes and MOST resulted...
Privacy Preserving Auditing and Data Recovery for Secure Cloud Storage
Cloud Storage permits users to remotely store their data and also provides users with on-demand self service from a shared pool of configurable and computable resources and that can be rapidly provisioned and realized wi...
Single Image Super Resolution with Wavelet Domain Transformation and Sparse Representation
In this paper, we have proposed a new image resolution enhancement algorithm based on discrete wavelet transform (DWT), lifting wavelet transform (LWT) and sparse recovery of the input image. A single low resolution (LR)...