Adversarial Camouflage

Cover image
🌏 Source

🔬 Downloadable at: CVPR 2020.

Adversarial Camouflage, AdvCam, transfers large adversarial perturbations into customized styles, which are then “hidden” on-target object or off-target background. Focuses on physical-world scenarios, are well camouflaged and highly stealthy, while remaining effective in fooling state-of-the-art DNN image classifiers.

Main contributions

  • Propose a flexible adversarial camouflage approach, AdvCam, to craft and camouflage adversarial examples.
  • AdvCam allows the generation of large perturbations, customizable attack regions and camouflage styles.
  • It is very flexible and useful for vulnerability evaluation of DNNs against large perturbations for physical-world attacks.


Adversarial attack settings

  • Digital settings.
  • Physical-world settings.

Adversarial attack properties

  • Adversarial strength: represents the ability to fool DNNs.
  • Adversarial stealthiness: describes whether the adversarial perturbations can be detected by human observers.
  • Camouflage flexibility: the degree to which the attacker can control the appearance of adversarial image.

Existing attacks

Algorithm for AdvCam

Normal attacks try to find an adversarial example for a given image by solving the following optimization problem:

minimize D(x,x)+λLadv(x) such that x[0,255]m\textrm{minimize}\ \mathcal{D}(x,x')+\lambda\cdot\mathcal{L}_{adv}(x')\ \textrm{such that}\ x'\in[0,255]^m

Where the D(x,x)\mathcal{D}(x,x') defines the "stealthiness" property of the adversarial example, and the Ladv\mathcal{L}_{adv}​ is the adversarial loss. Which means that there is a trade off between stealthiness and adversarial strength.

We use style transfer techniques to achieve the goal of camouflage and adversarial attack techniques to achieve adversarial strength. In order to do so, the loss function, which we call the adversarial camouflage loss, becomes:


The final overview of the AdvCam approach:


Camouflaged adversarial images crafted by AdvCam attack and their original versions.

◀ Factorial, Gamma Function, and MoreRiemann-Stieltjes Integration and Asymptotics ▶