Adversarial face image generating method and device

A face image and image technology, applied in the computer field, can solve the problems of weak versatility and migration

Pending Publication Date: 2020-12-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current related technologies, the generated adversarial samples have weak versatility and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adversarial face image generating method and device
  • Adversarial face image generating method and device
  • Adversarial face image generating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0055] Embodiments of the present application provide a method and device for generating an adversarial face image. The device for generating a confrontational face image may be specifically integrated in an electronic device, and the electronic device may be a terminal or a server.

[0056] It can be understood that the method for generating an adversarial face image in this embodiment may be executed on a terminal, may also be executed on a server, or may be executed jointly by the terminal a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an adversarial face image generating method and device. The method relates to adversarial attacks in the field of computer security, and comprises the steps of obtaining a reference face image and an adversarial face image; through a pre-trained target face recognition model, extracting feature maps under multiple scales from the reference face image and the adversarial face image respectively; performing fusion processing on the feature maps of the reference face image under multiple scales to obtain feature information of the reference face image; performing fusion processing on the feature maps of the adversarial face image under multiple scales to obtain feature information of the adversarial face image; calculating a loss value of the feature information of thereference face image and the feature information of the adversarial face image; and based on the loss value, iteratively adjusting the pixel value of each pixel point in the adversarial face image toobtain a target adversarial face image. According to the invention, the versatility and mobility of the adversarial face image on the face recognition model can be improved by fusing the feature mapsof the adversarial face image under multiple scales.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for generating an adversarial face image. Background technique [0002] With the development of computer technology, image processing technology has been applied to more and more fields. For example, face recognition technology is widely used in many fields such as access control and attendance, information security, electronic certificates and monitoring security. Specifically, face recognition technology is a technology that automatically extracts face features from face images, and then performs identity verification based on these features. [0003] Usually, face recognition can be realized by extracting facial features based on deep neural network. However, deep neural network is vulnerable to confrontation attacks. Due to some defects naturally existing in deep neural network, such as sensitivity to noise, it is easy to be disturbed by noise ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62G06N3/04G06N3/08
CPCG06N3/08G06V40/168G06V40/172G06N3/045G06F18/253G06F18/214
Inventor 尹邦杰姚太平吴双丁守鸿李季檩黄飞跃
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products