The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition
Yuan, Han, Li et al.
Recently, traffic sign recognition (TSR) systems have become a prominent target for physical adversarial attacks. These attacks typically rely on conspicuous stickers and projections, or using invisible light and acoustic signals that can be easily blocked. In this paper, we introduce a novel attack medium, i.e., fluorescent ink, to design a stealthy and effective physical adversarial patch, namely FIPatch, to advance the state-of-the-art. Specifically, we first model the fluorescence effect in the digital domain to identify the optimal attack settings, which guide the real-world fluorescence parameters. By applying a carefully designed fluorescence perturbation to the target sign, the attacker can later trigger a fluorescent effect using invisible ultraviolet light, causing the TSR system to misclassify the sign and potentially leading to traffic accidents. We conducted a comprehensive evaluation to investigate the effectiveness of FIPatch, which shows a success rate of 98.31% in low-light conditions. Furthermore, our attack successfully bypasses five popular defenses and achieves a success rate of 96.72%.
academic
The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition
This paper proposes a novel physical adversarial attack method against traffic sign recognition (TSR) systems. Existing attack methods rely on conspicuous stickers, projections, or easily-blocked invisible light and acoustic signals. The authors introduce fluorescent ink as a new attack medium and design a stealthy and effective physical adversarial patch called FIPatch. The method first models fluorescent effects in the digital domain to determine optimal attack parameters, then applies carefully designed fluorescent perturbations to target signs. Attackers can trigger the fluorescent effect through invisible ultraviolet light, causing the TSR system to misclassify and potentially trigger traffic accidents. Experiments demonstrate that FIPatch achieves a 98.31% success rate under low-light conditions and can bypass five mainstream defense methods with a 96.72% success rate.
Traffic sign recognition systems, as critical components of autonomous driving, are vulnerable to adversarial sample attacks. Existing physical adversarial attacks have the following limitations:
Visibility Issues: Sticker-based attacks are visually suspicious and easily detected
Lack of Selectivity: Once deployed, they indiscriminately attack all vehicles
Easy to Defend Against: Visible light projections are easily tracked, and infrared lasers can be filtered
Poor Practicality: Acoustic signal attacks are easily blocked by physical signal protection mechanisms
First introduction of fluorescent ink to construct physical adversarial patches, pioneering a new attack vector
Design of the FIPatch attack framework, comprising four modules: automatic localization, fluorescent modeling, optimization, and robustness enhancement
Proposal of three attack objectives: hiding attacks, generation attacks, and misclassification attacks
Comprehensive evaluation validating attack effectiveness and robustness in both digital and physical worlds
FIPatch attacks aim to apply fluorescent ink perturbations on traffic signs to cause the TSR system to produce three types of errors when triggered by UV light:
Hiding Attack: Makes the system unable to detect the traffic sign
Generation Attack: Makes the system detect fabricated traffic signs
Misclassification Attack: Makes the system classify the traffic sign into an incorrect category
Expectation Over Transformation (EOT): Extends transformation distribution to adapt to physical environmental changes of fluorescent materials, including:
Background variations
Brightness adjustments
Perspective transformations
Distance variations
Rotation and motion blur
Transparency Transformation: Simulates fluorescent ink transparency changes over time
The paper cites extensive related work, primarily including:
Adversarial sample foundational theory (Goodfellow et al., Carlini & Wagner, etc.)
Physical adversarial attack methods (Eykholt et al., Song et al., etc.)
Traffic sign recognition systems (YOLO, Faster R-CNN, etc.)
Defense mechanisms (Cohen et al., Madry et al., etc.)
Overall Assessment: This is a high-quality security research paper proposing an innovative attack method with sufficient experimental validation. Despite some limitations, it holds significant academic value and practical importance, positively contributing to advancing autonomous driving system security research.