Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
- URL: http://arxiv.org/abs/2206.01733v1
- Date: Thu, 2 Jun 2022 07:35:50 GMT
- Title: Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
- Authors: Junjian Li, Honglong Chen
- Abstract summary: In this paper, we develop an image-scaling attack targeting on ISP pipeline, where the crafted adversarial RAW can be transformed into attack image.
To make the adversarial attack more applicable, we consider the gradient-unavailable ISP pipeline, in which a proxy model that well learns the RAW-to-RGB transformations is proposed as the gradient oracles.
- Score: 5.036532914308395
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Deep learning technologies have become the backbone for the development of
computer vision. With further explorations, deep neural networks have been
found vulnerable to well-designed adversarial attacks. Most of the vision
devices are equipped with image signal processing (ISP) pipeline to implement
RAW-to-RGB transformations and embedded into data preprocessing module for
efficient image processing. Actually, ISP pipeline can introduce adversarial
behaviors to post-capture images while data preprocessing may destroy attack
patterns. However, none of the existing adversarial attacks takes into account
the impacts of both ISP pipeline and data preprocessing. In this paper, we
develop an image-scaling attack targeting on ISP pipeline, where the crafted
adversarial RAW can be transformed into attack image that presents entirely
different appearance once being scaled to a specific-size image. We first
consider the gradient-available ISP pipeline, i.e., the gradient information
can be directly used in the generation process of adversarial RAW to launch the
attack. To make the adversarial attack more applicable, we further consider the
gradient-unavailable ISP pipeline, in which a proxy model that well learns the
RAW-to-RGB transformations is proposed as the gradient oracles. Extensive
experiments show that the proposed adversarial attacks can craft adversarial
RAW data against the target ISP pipelines with high attack rates.
Related papers
- RAW-Adapter: Adapting Pre-trained Visual Model to Camera RAW Images [51.68432586065828]
We introduce RAW-Adapter, a novel approach aimed at adapting sRGB pre-trained models to camera RAW data.
Raw-Adapter comprises input-level adapters that employ learnable ISP stages to adjust RAW inputs, as well as model-level adapters to build connections between ISP stages and subsequent high-level networks.
arXiv Detail & Related papers (2024-08-27T06:14:54Z) - Simple Image Signal Processing using Global Context Guidance [56.41827271721955]
Deep learning-based ISPs aim to transform RAW images into DSLR-like RGB images using deep neural networks.
We propose a novel module that can be integrated into any neural ISP to capture the global context information from the full RAW images.
Our model achieves state-of-the-art results on different benchmarks using diverse and real smartphone images.
arXiv Detail & Related papers (2024-04-17T17:11:47Z) - BSRAW: Improving Blind RAW Image Super-Resolution [63.408484584265985]
We tackle blind image super-resolution in the RAW domain.
We design a realistic degradation pipeline tailored specifically for training models with raw sensor data.
Our BSRAW models trained with our pipeline can upscale real-scene RAW images and improve their quality.
arXiv Detail & Related papers (2023-12-24T14:17:28Z) - Reversed Image Signal Processing and RAW Reconstruction. AIM 2022
Challenge Report [109.2135194765743]
This paper introduces the AIM 2022 Challenge on Reversed Image Signal Processing and RAW Reconstruction.
We aim to recover raw sensor images from the corresponding RGBs without metadata and, by doing this, "reverse" the ISP transformation.
arXiv Detail & Related papers (2022-10-20T10:43:53Z) - Reversing Image Signal Processors by Reverse Style Transferring [3.867363075280544]
We seek an answer to the question: Can the ISP operations be modeled as the style factor in an end-to-end learning pipeline?
We propose a novel architecture, namely RST-ISP-Net, for learning to reverse the ISP operations with the help of adaptive feature normalization.
arXiv Detail & Related papers (2022-10-17T13:21:37Z) - An Empirical Study of Remote Sensing Pretraining [117.90699699469639]
We conduct an empirical study of remote sensing pretraining (RSP) on aerial images.
RSP can help deliver distinctive performances in scene recognition tasks.
RSP mitigates the data discrepancies of traditional ImageNet pretraining on RS images, but it may still suffer from task discrepancies.
arXiv Detail & Related papers (2022-04-06T13:38:11Z) - Transform your Smartphone into a DSLR Camera: Learning the ISP in the
Wild [159.71025525493354]
We propose a trainable Image Signal Processing framework that produces DSLR quality images given RAW images captured by a smartphone.
To address the color misalignments between training image pairs, we employ a color-conditional ISP network and optimize a novel parametric color mapping between each input RAW and reference DSLR image.
arXiv Detail & Related papers (2022-03-20T20:13:59Z) - Model-Based Image Signal Processors via Learnable Dictionaries [6.766416093990318]
Digital cameras transform sensor RAW readings into RGB images by means of their Image Signal Processor (ISP)
Recent approaches have attempted to bridge this gap by estimating the RGB to RAW mapping.
We present a novel hybrid model-based and data-driven ISP that is both learnable and interpretable.
arXiv Detail & Related papers (2022-01-10T08:36:10Z) - All You Need is RAW: Defending Against Adversarial Attacks with Camera
Image Pipelines [31.043289921613933]
We propose a model-agnostic adversarial defensive method for image-to-image mapping.
The method maps the input RGB images to Bayer RAW space and back to output RGB using a learned camera image signal processing pipeline.
As a result, the method generalizes to unseen tasks without additional retraining.
arXiv Detail & Related papers (2021-12-16T21:54:26Z) - Adversarial Imaging Pipelines [28.178120782659878]
We develop an attack that deceives a specific camera ISP while leaving others intact.
We validate the proposed method using recent state-of-the-art automotive hardware ISPs.
arXiv Detail & Related papers (2021-02-07T06:10:54Z) - Blurring Fools the Network -- Adversarial Attacks by Feature Peak
Suppression and Gaussian Blurring [7.540176446791261]
We propose an adversarial attack demo named peak suppression (PS) by suppressing the values of peak elements in the features of the data.
Experiment results show that PS and well-designed gaussian blurring can form adversarial attacks that completely change classification results of a well-trained target network.
arXiv Detail & Related papers (2020-12-21T15:47:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.