Adversarial collision attacks on image hashing functions

11/18/2020
by   Brian Dolhansky, et al.
0

Hashing images with a perceptual algorithm is a common approach to solving duplicate image detection problems. However, perceptual image hashing algorithms are differentiable, and are thus vulnerable to gradient-based adversarial attacks. We demonstrate that not only is it possible to modify an image to produce an unrelated hash, but an exact image hash collision between a source and target image can be produced via minuscule adversarial perturbations. In a white box setting, these collisions can be replicated across nearly every image pair and hash type (including both deep and non-learned hashes). Furthermore, by attacking points other than the output of a hashing function, an attacker can avoid having to know the details of a particular algorithm, resulting in collisions that transfer across different hash sizes or model architectures. Using these techniques, an adversary can poison the image lookup table of a duplicate image detection service, resulting in undefined or unwanted behavior. Finally, we offer several potential mitigations to gradient-based image hash attacks.

READ FULL TEXT

page 1

page 4

page 7

page 8

research
11/12/2021

Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

Apple recently revealed its deep perceptual hashing system NeuralHash to...
research
02/01/2020

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

With the growth in social media, there is a huge amount of images of fac...
research
06/18/2013

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

Image perceptual hashing finds applications in content indexing, large-s...
research
04/18/2021

HalftimeHash: Modern Hashing without 64-bit Multipliers or Finite Fields

HalftimeHash is a new algorithm for hashing long strings. The goals are ...
research
05/04/2021

Hardness-Preserving Reductions via Cuckoo Hashing

The focus of this work is hardness-preserving transformations of somewha...
research
06/15/2018

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains

Message digest algorithms are one of the underlying building blocks of b...
research
05/28/2023

Image Hash Minimization for Tamper Detection

Tamper detection using image hash is a very common problem of modern day...

Please sign up or login with your details

Forgot password? Click here to reset