2021
DOI: 10.1007/978-3-030-68780-9_37
|View full text |Cite
|
Sign up to set email alerts
|

Forensics Through Stega Glasses: The Case of Adversarial Images

Abstract: This paper explores the connection between forensics, counterforensics, steganography and adversarial images. On the one hand, forensicsbased and steganalysis-based detectors help in detecting adversarial perturbations. On the other hand, steganography can be used as a counterforensics strategy and helps in forging adversarial perturbations that are not only invisible to the human eye but also less statistically detectable. This work explains how to use these information hiding tools for attacking or defending… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…Some works elaborate the detection based on preprocessing manipulations, such as denoising filter (DF for short) via scalar quantization and smoothing spatial filter [17], feature squeezing (FS for short) [18], the Gaussian noise injection detector [19]. Inspired by the view that "the adversarial attack can be treated as a sort of accidental steganography" provide by Goodfellow et al [20], some steganalysis-based methods are proposed, such as ESRM [21], SRNet [22]. In our previous work [23], we develop a method based on the 3 rd -order co-occurrences among R, G, B channels, and achieve detection accuracy >99% for detecting FGSM, PGD adversarial images on ImageNet.…”
Section: Introductionmentioning
confidence: 99%
“…Some works elaborate the detection based on preprocessing manipulations, such as denoising filter (DF for short) via scalar quantization and smoothing spatial filter [17], feature squeezing (FS for short) [18], the Gaussian noise injection detector [19]. Inspired by the view that "the adversarial attack can be treated as a sort of accidental steganography" provide by Goodfellow et al [20], some steganalysis-based methods are proposed, such as ESRM [21], SRNet [22]. In our previous work [23], we develop a method based on the 3 rd -order co-occurrences among R, G, B channels, and achieve detection accuracy >99% for detecting FGSM, PGD adversarial images on ImageNet.…”
Section: Introductionmentioning
confidence: 99%