CN112541404A - Physical attack counterattack sample generation method facing traffic information perception - Google Patents

Physical attack counterattack sample generation method facing traffic information perception Download PDF

Info

Publication number
CN112541404A
CN112541404A CN202011316184.4A CN202011316184A CN112541404A CN 112541404 A CN112541404 A CN 112541404A CN 202011316184 A CN202011316184 A CN 202011316184A CN 112541404 A CN112541404 A CN 112541404A
Authority
CN
China
Prior art keywords
image
sample
picture
traffic information
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011316184.4A
Other languages
Chinese (zh)
Inventor
黄世泽
刘晓雯
张肇鑫
杨玲玉
张兵杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongji University
Original Assignee
Tongji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongji University filed Critical Tongji University
Priority to CN202011316184.4A priority Critical patent/CN112541404A/en
Publication of CN112541404A publication Critical patent/CN112541404A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/56Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent

Abstract

The invention provides a method for generating a confrontation sample for physical attack facing traffic information perception, which mainly aims at a target detector network. The method comprises the following steps: inputting an original picture; processing the picture by using a ShapeShifter algorithm to obtain a training sample; adding Gaussian white noise into the training sample; calculating a loss function; performing back propagation and iteratively updating the picture; and checking whether the specified iteration times are reached, if not, acquiring the recommended window area again and repeating the steps, and if so, outputting the corresponding confrontation sample picture. By taking the Faster R-CNN target detector network as an example, the invention can generate an confrontation sample for physical attack, can expose security holes and problems existing in the Faster R-CNN, helps to improve or propose a more effective defense method, improves the reliability of a traffic information sensing system, and ensures the driving safety.

Description

Physical attack counterattack sample generation method facing traffic information perception
Technical Field
The invention relates to the field of rail transit, in particular to a method for generating a confrontation sample for physical attack on an Faster R-CNN target detector facing traffic information perception.
Background
In recent years, vehicle-mounted traffic information sensing systems have been developed rapidly, and the purpose of the sensing systems is to sense the operating environment and state of vehicles. Generally, a camera is installed in a cab, a running environment video image of a vehicle is shot and acquired, the running environment is sensed and identified through an intelligent algorithm, and then an intelligent decision is made for the running environment. The running environment of the vehicle is quite complex and mainly comprises three aspects of complex road surface conditions, complex and variable weather conditions and complex illumination conditions. The traditional image processing method is difficult to solve the problem of complex operation environment perception, and a deep learning algorithm is needed to detect the operation environment state in real time.
Countermeasure samples, which have been the focus of research in the computer field in recent years, pose a great threat to the reliability and security of deep learning networks. Since digital attacks on deep learning networks require an attacker to invade the computer vision system, which most attackers cannot achieve, more and more researchers are turning to studying physical attacks.
Most of the existing researches aiming at physical attacks are attack classifiers, and algorithms of an attack target detector are few. And the traffic information perception system operating environment needs to use a target detector. The difficulty of attacking one target detector is far greater than that of attacking one classifier, only one target in the classifier is needed, accurate position coordinates of the target do not need to be given, but the target detector can identify pictures containing various different targets and give accurate position coordinates of the corresponding target. The existing method for generating the confrontation samples mainly attacks the classifier, the traffic information sensing system needs to realize multi-target detection of various traffic signs and obstacles in the operating environment in each frame of picture, and the existing method for generating the confrontation samples is not suitable, so that the existing research method has little threat to the traffic information sensing system.
Disclosure of Invention
The invention provides a method for generating a confrontation sample aiming at a Faster R-CNN target detector to carry out physical attack, which is characterized in that based on stop sign photos taken at different distances and different angles, an improved ShapeShifter algorithm is adopted to generate the target detector for confronting the sample attack on the Faster R-CNN, so that the security holes and problems existing in the Faster R-CNN are exposed, a more effective defense method is improved or proposed, the reliability of a traffic information sensing system is improved, and the method is an important measure for ensuring the driving safety and the passenger safety.
The invention provides a physical attack counterattack sample generation method facing traffic information perception, which comprises the following steps:
(1) inputting an original picture;
(2) processing the original picture by using an improved ShapeShifter algorithm to obtain a training sample;
(3) adding white Gaussian noise to the training sample;
(4) calculating a loss function;
(5) performing back propagation and iteratively updating the picture;
(6) and (3) checking whether the iteration times are reached, returning to the step (2) to start new iteration if the iteration times are not reached, and outputting a confrontation sample picture if the iteration times are reached.
In the invention, the network mainly attacked is the fast R-CNN target detector.
In the invention, the improved ShapeShifter algorithm in the step (2) is a countersample generation algorithm mainly aiming at a target detector of a Faster R-CNN network, and an optimization function of the improved ShapeShifter algorithm is defined as follows
Figure BDA0002791490060000021
Wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Go to a certain pointMasking operations of regions, i.e. when transforming image x0While maintaining image x0Some of the upper regions are unchanged, making the challenge sample more robust;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region r;
Figure BDA0002791490060000022
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
x is a training set of background pictures; t is a pattern conversion mode; t is the set of all the graphics transformation modes, including translation, rotation and scaling;
f is the target detector:
F:
Figure BDA0002791490060000031
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
Further, in the present invention, the white gaussian noise in step (3) is a noise whose instantaneous value follows gaussian distribution and whose power spectral density follows uniform distribution; the method is characterized in that random variables at any two different moments are independent of each other.
In the invention, the mean value of the Gaussian white noise selected in the step (3) is 0, and the standard deviations are 0.05, 0.005 and 0.01 respectively.
In the invention, the loss function after adding the gaussian white noise in the step (4) has the following formula:
Figure BDA0002791490060000032
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Certain areas above are unchanged;
Figure BDA0002791490060000033
is gaussian white noise;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region r;
Figure BDA0002791490060000034
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
x is a training set of background pictures;
t is a pattern conversion mode; t is the set of all the graphics transformation modes, including translation, rotation and scaling;
f is the target detector:
F:
Figure BDA0002791490060000041
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
In the invention, the picture input in the step (1) is a traffic sign picture.
In the invention, the pictures input in the step (1) are English parking sign pictures and Chinese parking sign pictures.
The invention has the beneficial effects that:
(1) gaussian white noise is added into a ShapeShifter algorithm, and a fast R-CNN network for resisting sample attack is generated.
(2) The robustness of the resisting sample is enhanced, and compared with the original algorithm, the method has lower requirement on the precision of the camera equipment.
(3) The potential safety hazard of the deep learning algorithm is fully exposed by simulating successful physical attack, a basis is provided for selecting a proper perception algorithm in engineering application, and a better defense method is sought in the engineering application through an attack effect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a general flow diagram of a modified ShapeShifter countersample generation method for physical attacks against the Faster R-CNN target detector, according to an embodiment of the invention;
example 1 English traffic sign
Fig. 2 is an english parking mark original sample according to embodiment 1 of the present invention;
FIG. 3 is a countermeasure sample generated based on English parking mark original sample according to embodiment 1 of the present invention
Fig. 4 is a parking mark original image photographed at a distance of 4.2m according to embodiment 1 of the present invention;
fig. 5 is a recognition result of recognition of a stop sign original image photographed at a distance of 4.2m according to embodiment 1 of the present invention;
fig. 6 is a recognition result of recognition of a stop sign original image photographed at a distance of 3.2m according to embodiment 1 of the present invention;
fig. 7 is a recognition result of recognition of a stop sign image photographed at a distance of 1.2m to 5m (interval of 0.2m) according to embodiment 1 of the present invention;
example 2 Chinese traffic sign
FIG. 8 is a Chinese parking mark raw sample according to embodiment 2 of the present invention;
fig. 9 is a countermeasure sample generation principle of the chinese parking sign according to embodiment 2 of the present invention;
FIG. 10 is confrontational sample of Chinese parking signs generated with ShapeShifter algorithm and modified ShapeShifter algorithm at different values of c according to embodiment 2 of the present invention;
fig. 11 is a comparison of the confrontational sample detection results of the chinese parking sign generated using the ShapeShifter algorithm and the modified ShapeShifter algorithm according to embodiment 2 of the present invention (c ═ 0.005, angle 0 °, distance 5 m);
fig. 12 is a comparison of the confrontational sample detection results of the chinese parking sign generated using the ShapeShifter algorithm and the modified ShapeShifter algorithm according to embodiment 2 of the present invention (c ═ 0.005, angle 30 °, distance 5 m);
fig. 13 is a comparison of the detection results of the confrontation samples of the chinese parking sign generated by using the ShapeShifter algorithm and the modified ShapeShifter algorithm according to embodiment 2 of the present invention, selecting different parameters, angles, and distances.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
In the embodiment, a method for generating a countersample to physically attack a Faster R-CNN target detector by using a modified sharshifter algorithm is provided, and fig. 1 is a flowchart of a countersample generation method for physically attacking a Faster R-CNN target detector according to an embodiment of the present invention, and as shown in fig. 1, the flowchart includes the following steps:
(1) inputting an original picture;
(2) processing the original picture by using a ShapeShifter algorithm to obtain a training sample;
(3) adding white Gaussian noise to the training sample;
(4) calculating a loss function;
(5) performing back propagation and iteratively updating the picture;
(6) and (3) checking whether the iteration times are reached, returning to the step (2) to start new iteration if the iteration times are not reached, and outputting a confrontation sample picture if the iteration times are reached.
Through the steps, on the basis of the English parking board image, a countersample is generated by adopting an improved ShapeShifter algorithm to attack the Faster R-CNN target detector. Compared with the original ShapeShifter algorithm, through attacking the target detector and attacking the English stop board, the steps can successfully generate the confrontation sample which can more effectively carry out physical attack on the Faster R-CNN target detector, expose potential safety hazards and problems existing in a neural network, and guarantee driving safety.
Fig. 2 is an english parking mark original sample of the experimental example of the present invention.
An alternative embodiment of steps (1) to (6) of the present invention will be described in detail with reference to fig. 3 to 7.
The ShapeShifter algorithm optimization function in the step (2) is defined as follows:
Figure BDA0002791490060000061
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Some upper regions are unchanged, so that the confrontation samples are more robust;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region 6 r;
Figure BDA0002791490060000062
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
f is the target detector:
F:
Figure BDA0002791490060000071
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
Defining the mean value of the Gaussian white noise in the step (3) as 0 and the standard deviation as 0.05.
Defining the loss function after adding the white gaussian noise described in the step (4) as follows:
Figure BDA0002791490060000072
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Some upper regions are unchanged, so that the confrontation samples are more robust;
Figure BDA0002791490060000073
is gaussian white noise;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region r;
Figure BDA0002791490060000074
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
x is a training set of background pictures;
t is a pattern conversion mode; t is the set of all the graphics transformation modes, including translation, rotation and scaling;
f is the target detector:
F:
Figure BDA0002791490060000075
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is confidence of the classification of the detected object
Fig. 3 is two resist sample images against the untargeted physical attack generated through steps (1) to (6) using the ShapeShifter original algorithm and the modified ShapeShifter algorithm, respectively.
Fig. 4 is an original image of a stop sign photographed at a distance of 4.2 m. The generated confrontation sample was printed (print size 0.3m by 0.3m), and was attached to the pillars of the park at the university of Tongji, at which time the distance mark was 4.2 m. The three parking signs are arranged from top to bottom, the first image is an original English parking board, the second image is an anti-sample image generated by a ShapeShifter original algorithm, and the third image is an anti-sample image generated by an improved ShapeShifter algorithm. Shooting by adopting a millet 8 mobile phone, wherein the resolution of the camera parameter is 1080p and 30 frames per second.
Fig. 5 is a recognition result of recognizing an original image of a stop sign photographed at a distance of 4.2m using Faster R-CNN according to an experimental example of the present invention. The confidence of the original parking sign is 98%, the confidence of the parking sign generated by the ShapeShifter original algorithm is 92%, and the confidence of the parking sign generated by the ShapeShifter algorithm improved in the experimental example is 43% (the detection result with the confidence lower than 50% is not generally adopted), namely, the resist sample generated in the text is not correctly recognized by the fast-R-CNN. Meanwhile, the improved Shapephifter algorithm and the original algorithm generate the antagonistic samples which have almost the same interference degree in the naked eye, but have very different attack effects. This indicates that the improved Shapeshifter algorithm proposed herein is more efficient.
Fig. 6 is a recognition result of recognizing an original image of a stop sign photographed at a distance of 3.2m using Faster R-CNN according to an experimental example of the present invention. The confidence of the original parking sign is 99%, the confidence of the parking sign generated by the ShapeShifter original algorithm is 91%, and the confidence of the parking sign generated by the improved ShapeShifter algorithm in the experimental example is 44%, that is, the stop-sign generated in the experimental example is still not correctly identified by the Faster-R-CNN, which indicates that the improved ShapeShifter algorithm provided in the experimental example is more effective.
FIG. 7 is a result of taking images at a distance of 1.2m to 5m (interval of 0.2m) and performing detection using Faster R-CNN. The improved shape algorithm performed well between 3.2m and 5m from the stop sign. Between 1.8m and 3m from the stop sign, the improved shapeshift algorithm does not perform well.
Through the processing of the steps, the fast R-CNN target detector can be successfully subjected to physical attack.
As known in the art, the traffic information sensing system includes a collecting device, a target detection network (Faster R-CNN), an identification and determination module, and an identification and output module, and uses a camera installed at the front end of a cab to collect image data of a driving environment, input the image into the corresponding target detection network for target identification, and return the identification result to a vehicle. According to the countermeasure sample generated by the method, the countermeasure sample is provided with an Faster R-CNN target detector, so that network target detection is wrong, potential safety hazards and problems of the fast R-CNN of a deep learning algorithm are further exposed, and a basis is provided for selecting a proper perception algorithm and a proper target identification algorithm in engineering application. If the Faster R-CNN network is used in the traffic information perception system, the confrontation sample generated by the method of the invention can cause the traffic information perception system to have a fault of recognition error, thus threatening traffic safety. The method finds out a mechanism and a method which are possibly adopted by an attacker and threaten the safety of the traffic information perception system, guides researchers to research a more effective defense method and a detection method of the confrontation sample, upgrades the defense system, for example, processes an input image, increases the detection links of the confrontation sample and the like, and ensures the safety of the system and the driving.
It will be appreciated by those skilled in the art that embodiments of the invention may be provided as a method. A system or a computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.
Example 2
In the embodiment, a method for generating a countersample to physically attack a fast R-CNN target detector by using a modified sharshifter algorithm is provided, and fig. 1 is a flowchart of a countersample generation method for physically attacking a fast R-CNN target detector according to an embodiment of the present invention, and as shown in fig. 1, the flowchart includes the following steps:
(1) inputting an original picture;
(2) processing the original picture by using a ShapeShifter algorithm to obtain a training sample;
(3) adding white Gaussian noise to the training sample;
(4) calculating a loss function;
(5) performing back propagation and iteratively updating the picture;
(6) and (3) checking whether the iteration times are reached, returning to the step (2) to start new iteration if the iteration times are not reached, and outputting a confrontation sample picture if the iteration times are reached.
Through the steps, on the basis of the Chinese parking board image, a modified ShapeShifter algorithm is adopted to generate a confrontation sample to attack the Faster R-CNN target detector. Compared with the original ShapeShifter algorithm, through attacking the target detector and attacking the Chinese parking board, the steps can successfully generate an confrontation sample which can more effectively carry out physical attack on the Faster R-CNN target detector, expose potential safety hazards and problems existing in a neural network, and guarantee driving safety.
Fig. 8 is an original sample of the chinese stop sign according to the experimental example of the present invention.
An alternative embodiment of steps (1) to (6) of the present invention will be described in detail below with reference to fig. 9 to 12.
The ShapeShifter algorithm optimization function in the step (2) is defined as follows:
Figure BDA0002791490060000101
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Perform translation, rotation and scaling, and then superimpose them onBackground image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Some upper regions are unchanged, so that the confrontation samples are more robust;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region 6 r;
Figure BDA0002791490060000111
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
f is the target detector:
F:
Figure BDA0002791490060000112
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
Defining the mean value of the Gaussian white noise in the step (3) as 0 and the standard deviation as 0.05.
Defining the loss function after adding the white gaussian noise described in the step (4) as follows:
Figure BDA0002791490060000113
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Go on to levelShifted, rotated and scaled, then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Some upper regions are unchanged, so that the confrontation samples are more robust;
Figure BDA0002791490060000114
is gaussian white noise;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region r;
Figure BDA0002791490060000121
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
x is a training set of background pictures;
t is a pattern conversion mode; t is the set of all the graphics transformation modes, including translation, rotation and scaling;
f is the target detector:
F:
Figure BDA0002791490060000122
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is confidence of the classification of the detected object
Fig. 9 is a countermeasure sample generation principle of the chinese parking sign according to experimental example 2 of the present invention. That is, for the Chinese parking sign, the white parking character is not changed, and only the red background is changed, so as to generate the confrontation sample.
Figure 10 is a directional attack against the "ball" using the shamshifter algorithm and the modified shamshifter algorithm generated challenge samples at different values of c (0.1 and 0.005). The parameter c represents the weight of the difference between the original image and the confrontation sample, and is used for controlling the similarity degree between x and x', and the larger c is, the more similar is represented with the original image.
Fig. 11 shows the recognition result of recognizing a countermeasure sample of a chinese parking sign photographed at a distance of 5m of 0 ° with c being 0.005. (a) For the recognition result of detecting the confrontation sample generated by the ShapeShifter original algorithm, the recognition confidence of the confrontation sample of the fast-R-CNN for the chinese parking mark is 79%, and the "ball" is recognized in the parking mark partial region. Because the final result is determined according to the frame of the real parking sign, and the sensing system can make a 'parking' decision when detecting the parking sign, under the condition, the algorithm cannot successfully and physically attack the Chinese parking sign. (b) For the recognition result of detecting the confrontation sample generated by the improved ShapeShifter algorithm, the Faster-R-CNN recognizes the confrontation sample of the Chinese parking mark as a "ball" with a confidence of 86%. Meanwhile, the parking mark partial area is also identified as a 'ball', so that the Chinese parking mark is successfully subjected to physical attack by the countermeasure sample generated by the improved Shapephifter algorithm.
Fig. 12 shows the recognition result of recognizing a countermeasure sample of a chinese parking sign photographed at a distance of 5m of 30 ° with c being 0.005. (a) For the identification result of detecting the confrontation sample generated by the ShapeShifter original algorithm, the fast-R-CNN cannot effectively identify the confrontation sample of the Chinese parking sign (the filtering confidence is lower than the detection result of 50%), so that the ShapeShifter original algorithm cannot successfully perform directional physical attack on the Chinese parking sign. (b) For the recognition result of detecting the confrontation sample generated by the improved ShapeShifter algorithm, the Faster-R-CNN recognizes the confrontation sample of the Chinese parking mark as a "ball" with a confidence of 92%. Therefore, the adversarial samples generated by the improved Shapephifter algorithm successfully make physical attacks on the Chinese parking signs.
FIG. 13 is a comparison of the detection results of the confrontation samples of Chinese parking signs generated by ShapeShifter algorithm and modified Shapeshifter algorithm using the Faster-R-CNN network, with c taken at 0.005 and 0.01. It can be known that the Faster-R-CNN correctly recognizes the original parking sign with 99% confidence no matter the angle and distance; the improved Shapeshifter algorithm provided by the experimental example can carry out effective physical attacks with different angles and different distances on the Chinese parking sign; the parameter selection has great influence on whether the physical attack can be successfully carried out, the parameter c represents the weight of the difference between the original image and the countercheck sample and is used for controlling the similarity degree with the x, and the larger the c is, the more similar the original image is represented. When the parameter c is selected to be 0.01, the algorithm is not good whether the ShapeShifter original algorithm or the improved ShapeShifter algorithm mentioned in the experimental example; at the parameter c of 0.005, the improved Shapephifter algorithm can successfully and directionally attack the parking sign, and the improved Shapephifter algorithm is superior to the Shapephifter original algorithm. However, when the distance is far, for example, 10m, the disturbance is almost negligible because the stop sign is too small, and the attack of the countermeasure sample is not successful.
Through the processing of the steps, the fast R-CNN target detector can be successfully subjected to physical attack.
The traffic information perception system collects image data of a driving environment by using a camera arranged at the front end of a cab, inputs the image into a corresponding target detection network for target recognition, and returns a recognition result to a vehicle. According to the countermeasure sample generated by the method, the countermeasure sample is provided with an Faster R-CNN target detector, so that network target detection is wrong, potential safety hazards and problems of the fast R-CNN of a deep learning algorithm are further exposed, and a basis is provided for selecting a proper perception algorithm and a proper target identification algorithm in engineering application. If the Faster R-CNN network is used in the traffic information perception system, the countermeasure sample generated by the method of the invention can cause the system to have identification errors or faults, thus threatening traffic safety. The method finds out a mechanism and a method which are possibly adopted by an attacker and threaten the safety of the traffic information perception system, guides researchers to research a more effective defense method and a detection method of the confrontation sample, upgrades the defense system, for example, processes an input image, increases the detection links of the confrontation sample and the like, and ensures the safety of the system and the driving.
It will be appreciated by those skilled in the art that embodiments of the invention may be provided as a method. A system or a computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (8)

1. A physical attack counterattack sample generation method facing traffic information perception is characterized by comprising the following steps:
(1) inputting an original picture;
(2) processing the original picture by using a ShapeShifter algorithm to obtain a training sample;
(3) adding white Gaussian noise to the training sample;
(4) calculating a loss function;
(5) performing back propagation and iteratively updating the picture;
(6) and (3) checking whether the iteration times are reached, returning to the step (2) to start new iteration if the iteration times are not reached, and outputting a confrontation sample picture if the iteration times are reached.
2. The method for generating physical attack countermeasure samples for traffic information awareness according to claim 1, wherein a network of major attacks is a Faster R-CNN target detector.
3. The method for generating physical attack countersample facing traffic information perception according to claim 1, wherein the shareschifter algorithm in step (2) is a countersample generation algorithm mainly aiming at a target detector of a Faster R-CNN network, and an optimization function thereof is defined as follows
Figure FDA0002791490050000011
Wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Some of the upper regions are unchanged, making the challenge sample more robust;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresents a recommendation window, expressed in 4 coordinates, xrIs a sub-image of region r;
Figure FDA0002791490050000021
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
f is the target detector:
F:
Figure FDA0002791490050000022
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
4. The method for generating physical attack countermeasure samples for traffic information perception according to claim 1, wherein the gaussian white noise in step (3) is a noise whose instantaneous value of noise follows gaussian distribution and whose power spectral density follows uniform distribution; the method is characterized in that random variables at any two different moments are independent of each other.
5. The method for generating samples for physical attack defense facing traffic information perception according to claim 1, wherein the mean value of the white gaussian noise selected in the step (3) is 0, and the standard deviation is 0.05, 0.005 and 0.01 respectively.
6. The method for generating physical attack counterattack samples facing traffic information perception according to claim 1, wherein the loss function after adding white gaussian noise in step (4) is expressed by the following formula:
Figure FDA0002791490050000023
wherein the content of the first and second substances,
,Mt(xb,xotanh (x')) represents the image x0Translated, rotated and scaled and then superimposed on the background image xbAlso includes maintaining the image x0Masking operations of certain areas, i.e. when transforming image x0While maintaining image x0Certain areas above are unchanged;
Figure FDA0002791490050000031
is gaussian white noise;
x is the input original picture, x 'is the generated countermeasure sample picture, and y' is the input false target classification;
c is the weight of the difference between the original image and the confrontation sample;
tanh () is a hyperbolic tangent function, ensuring that each pixel value is between [ -1, 1 ];
rpn(x)={r1,...,rmr each of riRepresenting a recommendation window using 4 coordinate tablesX is shownrIs a sub-image of region r;
Figure FDA0002791490050000032
is a loss function of the distance between the output of the model and the misclassification y' that needs to be attacked;
f is the target detector:
F:
Figure FDA0002791490050000033
wherein the content of the first and second substances,
h is the height of the input image, w is the width of the input image;
k is the confidence of the detected object classification.
7. The method for generating physical attack countermeasure samples for traffic information perception according to claim 1, wherein the picture input in the step (1) is a traffic sign picture.
8. The method for generating physical attack countermeasure samples for traffic information perception according to claim 1, wherein the pictures input in the step (1) are English parking sign pictures and Chinese parking sign pictures.
CN202011316184.4A 2020-11-22 2020-11-22 Physical attack counterattack sample generation method facing traffic information perception Pending CN112541404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011316184.4A CN112541404A (en) 2020-11-22 2020-11-22 Physical attack counterattack sample generation method facing traffic information perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011316184.4A CN112541404A (en) 2020-11-22 2020-11-22 Physical attack counterattack sample generation method facing traffic information perception

Publications (1)

Publication Number Publication Date
CN112541404A true CN112541404A (en) 2021-03-23

Family

ID=75014571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011316184.4A Pending CN112541404A (en) 2020-11-22 2020-11-22 Physical attack counterattack sample generation method facing traffic information perception

Country Status (1)

Country Link
CN (1) CN112541404A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113361582A (en) * 2021-06-01 2021-09-07 珠海大横琴科技发展有限公司 Method and device for generating countermeasure sample
CN114368394A (en) * 2021-12-31 2022-04-19 北京瑞莱智慧科技有限公司 Method and device for attacking V2X equipment based on Internet of vehicles and storage medium
CN115909020A (en) * 2022-09-30 2023-04-04 北京瑞莱智慧科技有限公司 Model robustness detection method, related device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948658A (en) * 2019-02-25 2019-06-28 浙江工业大学 The confrontation attack defense method of Feature Oriented figure attention mechanism and application
CN110175513A (en) * 2019-04-15 2019-08-27 浙江工业大学 A kind of guideboard identification attack defense method based on the optimization of multiple target road
CN110175611A (en) * 2019-05-24 2019-08-27 浙江工业大学 Defence method and device towards Vehicle License Plate Recognition System black box physical attacks model
CN110674938A (en) * 2019-08-21 2020-01-10 浙江工业大学 Anti-attack defense method based on cooperative multi-task training

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948658A (en) * 2019-02-25 2019-06-28 浙江工业大学 The confrontation attack defense method of Feature Oriented figure attention mechanism and application
CN110175513A (en) * 2019-04-15 2019-08-27 浙江工业大学 A kind of guideboard identification attack defense method based on the optimization of multiple target road
CN110175611A (en) * 2019-05-24 2019-08-27 浙江工业大学 Defence method and device towards Vehicle License Plate Recognition System black box physical attacks model
CN110674938A (en) * 2019-08-21 2020-01-10 浙江工业大学 Anti-attack defense method based on cooperative multi-task training

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SHANG-TSE CHEN ET AL: ""ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector"", 《ARXIV:1804.05810V3 [CS.CV]》 *
SHIZE HUANG CHEN ET AL: ""An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs"", 《COMPUTERS & SECURITY》 *
刘西蒙 等: ""深度学习中的对抗攻击与防御"", 《网络与信息安全学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113361582A (en) * 2021-06-01 2021-09-07 珠海大横琴科技发展有限公司 Method and device for generating countermeasure sample
CN114368394A (en) * 2021-12-31 2022-04-19 北京瑞莱智慧科技有限公司 Method and device for attacking V2X equipment based on Internet of vehicles and storage medium
CN115909020A (en) * 2022-09-30 2023-04-04 北京瑞莱智慧科技有限公司 Model robustness detection method, related device and storage medium
CN115909020B (en) * 2022-09-30 2024-01-09 北京瑞莱智慧科技有限公司 Model robustness detection method, related device and storage medium

Similar Documents

Publication Publication Date Title
Jalled et al. Object detection using image processing
CN108491837B (en) Anti-attack method for improving license plate attack robustness
CN112541404A (en) Physical attack counterattack sample generation method facing traffic information perception
CN113156421A (en) Obstacle detection method based on information fusion of millimeter wave radar and camera
KR101834778B1 (en) Apparatus for recognizing traffic sign and method thereof
US20060067562A1 (en) Detection of moving objects in a video
CN110458063B (en) Human face living body detection method for preventing video and photo cheating
CN111709416A (en) License plate positioning method, device and system and storage medium
JP2006146626A (en) Pattern recognition method and device
CN112115761B (en) Countermeasure sample generation method for detecting vulnerability of visual perception system of automatic driving automobile
CN111783853B (en) Interpretability-based method for detecting and recovering neural network confrontation sample
US20240013572A1 (en) Method for face detection, terminal device and non-transitory computer-readable storage medium
CN113312973B (en) Gesture recognition key point feature extraction method and system
CN103902989A (en) Human body motion video recognition method based on non-negative matrix factorization
CN111066023A (en) Detection system, detection device and method thereof
CN112308883A (en) Multi-ship fusion tracking method based on visible light and infrared images
CN111898731A (en) Bias-based universal countermeasure patch generation method and device
Zhang et al. Automatic detection of road traffic signs from natural scene images based on pixel vector and central projected shape feature
CN111881436A (en) Method and device for generating black box face anti-attack sample based on feature consistency and storage medium thereof
CN107368826B (en) Method and apparatus for text detection
CN114373170A (en) Method and device for constructing pseudo-3D (three-dimensional) bounding box and electronic equipment
JP5316337B2 (en) Image recognition system, method, and program
CN113435264A (en) Face recognition attack resisting method and device based on black box substitution model searching
Nam et al. Pedestrian detection system based on stereo vision for mobile robot
CN115294037A (en) Digital attack counterattack sample generation method facing traffic information perception

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210323