Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks

06/11/2020
by   Nataniel Ruiz, et al.
8

In this work, we develop efficient disruptions of black-box image translation deepfake generation systems. We are the first to demonstrate black-box deepfake generation disruption by presenting image translation formulations of attacks initially proposed for classification models. Nevertheless, a naive adaptation of classification black-box attacks results in a prohibitive number of queries for image translation systems in the real-world. We present a frustratingly simple yet highly effective algorithm Leaking Universal Perturbations (LUP), that significantly reduces the number of queries needed to attack an image. LUP consists of two phases: (1) a short leaking phase where we attack the network using traditional black-box attacks and gather information on successful attacks on a small dataset and (2) and an exploitation phase where we leverage said information to subsequently attack the network with improved efficiency. Our attack reduces the total number of queries necessary to attack GANimation and StarGAN by 30

READ FULL TEXT

page 8

page 15

page 16

research
09/13/2023

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

In this paper, we propose PhantomSound, a query-efficient black-box atta...
research
11/24/2022

CycleGANWM: A CycleGAN watermarking method for ownership verification

Due to the proliferation and widespread use of deep neural networks (DNN...
research
10/06/2021

Attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack

With the successful creation of high-quality image-to-image (Img2Img) tr...
research
07/14/2022

Explaining Image Enhancement Black-Box Methods through a Path Planning Based Algorithm

Nowadays, image-to-image translation methods, are the state of the art f...
research
07/13/2021

A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation

Through international regulations (most prominently the latest UNECE reg...
research
05/20/2021

An Exact Poly-Time Membership-Queries Algorithm for Extraction a three-Layer ReLU Network

As machine learning increasingly becomes more prevalent in our everyday ...
research
06/05/2023

Evading Black-box Classifiers Without Breaking Eggs

Decision-based evasion attacks repeatedly query a black-box classifier t...

Please sign up or login with your details

Forgot password? Click here to reset