Visible to the public Effectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples

TitleEffectiveness of Random Deep Feature Selection for Securing Image Manipulation Detectors Against Adversarial Examples
Publication TypeConference Paper
Year of Publication2020
AuthorsBarni, M., Nowroozi, E., Tondi, B., Zhang, B.
Conference NameICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Date PublishedMay 2020
PublisherIEEE
ISBN Number978-1-5090-6631-5
Keywordsadaptive filtering, Adversarial Machine Learning, adversarial multimedia forensics, CNN image manipulation detector, deep learning features, deep learning for forensics, feature extraction, feature randomization, feature selection, fully connected neural network, image classification, image manipulation detection, image manipulation detection tasks, image manipulation detectors, learning (artificial intelligence), linear SVM, Metrics, pubcrawl, random deep feature selection, random feature selection approach, randomization-based defences, resilience, Resiliency, Scalability, secure classification, security of data, Support vector machines
Abstract

We investigate if the random feature selection approach proposed in [1] to improve the robustness of forensic detectors to targeted attacks, can be extended to detectors based on deep learning features. In particular, we study the transferability of adversarial examples targeting an original CNN image manipulation detector to other detectors (a fully connected neural network and a linear SVM) that rely on a random subset of the features extracted from the flatten layer of the original network. The results we got by considering three image manipulation detection tasks (resizing, median filtering and adaptive histogram equalization), two original network architectures and three classes of attacks, show that feature randomization helps to hinder attack transferability, even if, in some cases, simply changing the architecture of the detector, or even retraining the detector is enough to prevent the transferability of the attacks.

URLhttps://ieeexplore.ieee.org/document/9053318
DOI10.1109/ICASSP40776.2020.9053318
Citation Keybarni_effectiveness_2020