Coder Social home page Coder Social logo

iqa_attackssurvey's Introduction

IQA_AttacksSurvey

Contents

  1. Abstract
  2. General Attack Outline
  3. Examples
  4. Usage
  5. Citation
  6. Acknowledgements
  7. Contact

Abstract

The rapid development of Deep Learning (DL) and, more specifically, Convolutional Neural Networks (CNNs) has achieved high accuracy over the past decade, becoming the standard approach in computer vision in a short time. However, recent studies have discovered that CNNs are vulnerable to adversarial attacks in image classification tasks. While most studies have focused on DL models for image classification, only a few works have addressed this issue in the context of Image Quality Assessment (IQA). This paper investigates the robustness of different CNN models against adversarial attacks when used for an IQA task. We propose an adaptation of state-of-the- art image classification attacks in both targeted and untargeted modes for an IQA regression task. We also analyze the correlation between the perturbation’s visibility and the attack’s success. Our experimental results show that DL-based IQA methods are vulnerable to such attacks, with a significant decrease in correlation scores when subjected to adversarial perturbations. Consequently, the development of countermeasures against such attacks is essential for improving the reliability and accuracy of DL-based IQA models.

General Attack Outline

Examples

Usage

AttacksGenerationOnDataset.ipynb provides a guideline on how to launch the attack on a dataset.

  1. Set the path to the target dataset's repository db = "../Databases/tid2013/"
  2. Define the maximum scale of the ground truth quality score: scale = int(input())
  3. Define the victim model and load its weights model = initialize_model('inception',False,True) weights_path = '../pretrained/iqaModel_tid_inception.pth'
  4. Define the parametters of the attack iterations = [10] epsilons = [0.001,0.01,0.1] attacks = ["bim","pgd","fgm"] losses = ['mse(y_tielda,y)']

Citation

We kindly ask you to cite our paper if you find the repository useful to your work:

@inproceedings{meftah2023evaluating,
  title={Evaluating the Vulnerability of Deep Learning-based Image Quality Assessment Methods to Adversarial Attacks},
  author={Meftah, Hanene FZ Brachemi and Fezza, Sid Ahmed and Hamidouche, Wassim and D{\'e}forges, Olivier},
  booktitle={2023 11th European Workshop on Visual Information Processing (EUVIP)},
  pages={1--6},
  year={2023},
  organization={IEEE}
}

Acknowledgements

This project is funded by both Région Bretagne (Brittany region), France, CREACH Labs and Direction Générale de l’Armement (DGA). We also used the code provided by the CleverHans software library to which we added further modifications in order to adapt it to the context of our study.

Contact

Hanene F.Z Brachemi Meftah , [email protected]

iqa_attackssurvey's People

Contributors

hbrachemi avatar safezza avatar

Stargazers

 avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.