An image processing method for combating attacks

An image processing and image technology, applied in the field of image processing, can solve problems such as pixel-level attacks, and achieve the effect of strong attack ability

Active Publication Date: 2020-11-13
UNIV OF ELECTRONIC SCI & TECH OF CHINA +1
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide an image processing method for adversarial attacks, to solve the problem that mo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image processing method for combating attacks
  • An image processing method for combating attacks
  • An image processing method for combating attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] It should be noted that, in the case of no conflict, the specific implementation methods, examples and features in the present application can be combined with each other. The present invention will now be described in detail with reference to the accompanying drawings and in conjunction with the following contents.

[0050] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the specific embodiments of the present invention and the examples will be clearly and completely described below in conjunction with the accompanying drawings in the specific embodiments of the present invention and the examples. , the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the specific implementation modes and examples in the present invention, all other implementation modes and examples obtained by persons of ordinary skill in the art without mak...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of image processing. The invention discloses an image processing method for resisting attacks, which comprises the following steps of: a, collecting gradient information of an image x through a local known model; b, introducing a step size amplification factor to amplify the gradient of each step in the iterative processing process, and updating the accumulative amplification gradient at the same time; c, if the cumulative amplification gradient exceeds a set threshold range, cutting noise C is obtained, and otherwise, C is 0; and d, performing projection by using a projection kernel function Wp, uniformly projecting the cutting noise C to the surrounding area of the image x, and adding the amplification gradient of the current step to obtain asample image. The method is a regional-level attack resisting technology, and provides a new thought for the research of a deep neural network. The adversarial sample image has stronger migration capability, and can better attack unknown black box models to enable the unknown black box models to generate misclassification. The technical scheme of the invention can be easily combined with many other attack methods so as to generate an adversarial sample image with stronger attack capability.

Description

technical field [0001] The present invention relates to the technical field of image processing, in particular to an anti-attack technology for neural network image recognition, and in particular to an image processing method for anti-attack. Background technique [0002] With the development of deep neural networks, image classification tasks have been able to achieve very high recognition levels. However, due to the introduction of the concept of adversarial attack in recent years, people began to re-examine the robustness of deep neural networks. [0003] The basic idea of ​​the adversarial attack is to add certain special noise to the ordinary clean picture, so that the deep neural network can give an irrelevant prediction output, but this noise-added picture has no recognition problem for human eyes. [0004] Adversarial attack can be considered as a kind of image processing technology. Through the research of different types of adversarial attack, it can in turn promo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T11/00G06F21/60G06N3/04G06N3/08G06T5/00
CPCG06T11/003G06T5/002G06F21/602G06N3/08G06T2207/10004G06N3/045
Inventor 高联丽章琪泷宋井宽
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products