Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection

Abstract

Adversarial attacks on machine learning models have seen increasing interest in the past years. By making only subtle changes to the input of a convolutional neural network, the output of the network can be swayed to output a completely different result. The first attacks did this by changing pixel values of an input image slightly to fool a classifier to output the wrong class. Other approaches have tried to learn "patches" that can be applied to an object to fool detectors and classifiers. Some of these approaches have also shown that these attacks are feasible in the real-world, i.e. by modifying an object and filming it with a video camera. However, all of these approaches target classes that contain almost no intra-class variety (e.g. stop signs). The known structure of the object is then used to generate an adversarial patch on top of it. In this paper, we present an approach to generate adversarial patches to targets with lots of intra-class variety, namely persons. The goal is to generate a patch that is able successfully hide a person from a person detector. An attack that could for instance be used maliciously to circumvent surveillance systems, intruders can sneak around undetected by holding a small cardboard plate in front of their body aimed towards the surveilance camera. From our results we can see that our system is able significantly lower the accuracy of a person detector. Our approach also functions well in real-life scenarios where the patch is filmed by a camera. To the best of our knowledge we are the first to attempt this kind of attack on targets with a high level of intra-class variety like persons.

Cite

Text

Thys et al. "Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection." IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019. doi:10.1109/CVPRW.2019.00012

Markdown

[Thys et al. "Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection." IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019.](https://mlanthology.org/cvprw/2019/thys2019cvprw-fooling/) doi:10.1109/CVPRW.2019.00012

BibTeX

@inproceedings{thys2019cvprw-fooling,
  title     = {{Fooling Automated Surveillance Cameras: Adversarial Patches to Attack Person Detection}},
  author    = {Thys, Simen and Van Ranst, Wiebe and Goedemé, Toon},
  booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops},
  year      = {2019},
  pages     = {49-55},
  doi       = {10.1109/CVPRW.2019.00012},
  url       = {https://mlanthology.org/cvprw/2019/thys2019cvprw-fooling/}
}