skip to main content
10.1145/3240765.3240851guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

SPN Dash - Fast Detection of Adversarial Attacks on Mobile via Sensor Pattern Noise Fingerprinting

Published:05 November 2018Publication History

ABSTRACT

A concerning weakness of deep neural networks is their susceptibility to adversarial attacks. While methods exist to detect these attacks, they incur significant drawbacks, ignoring external features which could aid in the task of attack detection. In this work, we propose SPN Dash, a method for detection of adversarial attacks based on integrity of sensor pattern noise embedded in submitted images. Through experiment, we show that our SPN Dash method is capable of detecting the addition of adversarial noise with up to 94% accuracy for images of size $256\times256$. Analysis shows that SPN Dash is robust to image scaling techniques, as well as a small amount of image compression. This performance is on par with state of the art neural network-based detectors, while incurring an order of magnitude less computational and memory overhead.

References

  1. [1].2017. Bixby Vision | Apps - The Official Samsung Galaxy Site. samsung.com/global/galaxy/apps/bixby/vision/Google ScholarGoogle Scholar
  2. [2].Bojinov H. et al. 2014. Mobile Device Identification via Sensor Fingerprinting. CoRR abs/1408.1416 (2014). arxiv. org/abs/1408.1416.Google ScholarGoogle Scholar
  3. [3].Chen M. et al. 2008. Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans on Inf Forensics and Sec 3, 1 (2008), 7490. https://doi.org/10.1109/Tifs.2007.916285Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4].Cipriani J.. 2017. Google Lens: Everything to know about the Pixel 2's AR feature. cnet.com/how-to/google-lens-everything-to-know-about-the-pixel-2-ar-feature/Google ScholarGoogle Scholar
  5. [5].Corripio J. Rosales et al. 2013. Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. 1. 161.16 pages. digital-library.theiet.ore:/content/conferences/10.1049/ic.2013.0267Google ScholarGoogle Scholar
  6. [6].El Gamal A. et al. [n. d.]. Modeling and Estimation of FPN Components in CMOS Image Sensors. In Photonics West '98 Elec Img, Vol. 3301. SPIE, 10.Google ScholarGoogle Scholar
  7. [7].Evtimov I. et al. 2017. Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017). arxiv.org/abs/1707.08945.Google ScholarGoogle Scholar
  8. [8].Ferrero A., Campos J., and Pons A.. 2006. Correction of Photoresponse Nonuniformity for Matrix Detectors Based on Prior Compensation for Their Nonlinear Behavior. Appl Opt 45, 11 (2006), 24227. ncbi.nlm.nih.gov/pubmed/16623238Google ScholarGoogle Scholar
  9. [9].Goljan M., Fridrich J., and Filler T.. 2009. Large scale test of sensor fingerprint camera identification. In Media Forensics and Security, Vol. 7254. International Society for Optics and Photonics, 72540I.Google ScholarGoogle Scholar
  10. [10].Goodfellow I. et al. 2014. Generative Adversarial Nets. 26722680 pages. papers. nips.cc/paper/5423-generative-adversarial-netsGoogle ScholarGoogle Scholar
  11. [11].Goodfellow I., Shlens J., and Szegedy C.. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv: 1412.6572 (2014).Google ScholarGoogle Scholar
  12. [12].Metzen J. Hendrik et al. 2017. On Detecting Adversarial Perturbations. adsabs. harvard.edu/abs/2017arXiv170204267HGoogle ScholarGoogle Scholar
  13. [13].Howard A. et al. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv: 1704.04861 (2017).Google ScholarGoogle Scholar
  14. [14].Hyun D.K. et al. 2013. Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise. Sensors (Basel) 13, 9 (2013), 1260531. https://doi.org/10.3390/s130912605Google ScholarGoogle Scholar
  15. [15].Irie K. et al. 2008. A Model for Measurement of Noise in CCD Digital-Video Cameras. Meas Sci and Tech 19, 4 (2008), 045207. https://doi.org/Artn04520710.1088/0957-0233/19/4/045207Google ScholarGoogle ScholarCross RefCross Ref
  16. [16].Jia Y. et al. 2014. Caffe: Convolutional Architecture for Fast Feature Embedding. arXiv preprint arXiv: 1408.5093 (2014).Google ScholarGoogle Scholar
  17. [17].Krizhevsky A., Sutskever I., and Hinton G.E.. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25, Pereira F., Burges C.J.C., Bottou L., and Weinberger K.Q. (Eds.). Curran Associates, Inc., 10971105. papers.nips.cc/paper/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdfGoogle ScholarGoogle Scholar
  18. [18].Kurakin A., Goodfellow I., and Bengio S.. 2016. Adversarial Examples in the Physical World. Computing Research Repository abs/1607.02533 (2016). arxiv. org/abs/1607.02533.Google ScholarGoogle Scholar
  19. [19].Li C.T.. 2010. Source Camera Identification Using Enhanced Sensor Pattern Noise. IEEE Trans on Inf Forensics and Sec 5, 2 (2010), 280287. https://doi.org/10.1109/Tifs.2010.2046268Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20].Li X. and Li F.. 2016. Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. Computing Research Repository abs/1612.07767 (2016). arxiv.org/abs/1612.07767.Google ScholarGoogle Scholar
  21. [21].Liu Y. et al. 2016. Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv: 1611.02770 (2016).Google ScholarGoogle Scholar
  22. [22].Lukas J., Fridrich J., and Goljan M.. 2006. Digital Camera Identification from Sensor Pattern Noise. IEEE Trans on Inf Forensics and Sec 1, 2 (2006), 205214. https://doi.org/10.1109/Tifs.2006.873602Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23].Luo Y. et al. 2015. Foveation-Based Mechanisms Alleviate Adversarial Examples. Computing Research Repository abs/1511.06292 (2015). arxiv. org/abs/1511.06292.Google ScholarGoogle Scholar
  24. [24].Metzen J., Genewein T., Fischer V., and Bischoff B.. 2017. On detecting adversarial perturbations. arXiv preprint arXiv: 1702.04267 (2017).Google ScholarGoogle Scholar
  25. [25].Papernot N. et al. 2017. Practical Black-Box Attacks against Machine Learning. 506519 pages. https://doi.org/10.1145/3052973.3053009Google ScholarGoogle Scholar
  26. [26].Salama K. and El Gamal A.. 2003. Analysis of Active Pixel Sensor Readout Circuit. IEEE Trans on Circ and Sys I-Fundamental Theory and Applications 50, 7 (2003), 941944. https://doi.org/10.1109/Tsci.2003.813977Google ScholarGoogle Scholar
  27. [27].Sharif M. et al. 2016. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. 15281540 pages. https://doi.org/10.1145/2976749.2978392Google ScholarGoogle Scholar
  28. [28].Song C. et al. 2017. A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks. Computing Research Repository abs/1705.09764 (2017). arxiv. org/abs/1705.09764.Google ScholarGoogle Scholar

Index Terms

  1. SPN Dash - Fast Detection of Adversarial Attacks on Mobile via Sensor Pattern Noise Fingerprinting
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image Guide Proceedings
            2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
            Nov 2018
            939 pages

            Copyright © 2018

            Publisher

            IEEE Press

            Publication History

            • Published: 5 November 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Qualifiers

            • research-article