2025-11-25T16:19:18.181446

The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition

Yuan, Han, Li et al.
Recently, traffic sign recognition (TSR) systems have become a prominent target for physical adversarial attacks. These attacks typically rely on conspicuous stickers and projections, or using invisible light and acoustic signals that can be easily blocked. In this paper, we introduce a novel attack medium, i.e., fluorescent ink, to design a stealthy and effective physical adversarial patch, namely FIPatch, to advance the state-of-the-art. Specifically, we first model the fluorescence effect in the digital domain to identify the optimal attack settings, which guide the real-world fluorescence parameters. By applying a carefully designed fluorescence perturbation to the target sign, the attacker can later trigger a fluorescent effect using invisible ultraviolet light, causing the TSR system to misclassify the sign and potentially leading to traffic accidents. We conducted a comprehensive evaluation to investigate the effectiveness of FIPatch, which shows a success rate of 98.31% in low-light conditions. Furthermore, our attack successfully bypasses five popular defenses and achieves a success rate of 96.72%.
academic

The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition

Basic Information

  • Paper ID: 2409.12394
  • Title: The Fluorescent Veil: A Stealthy and Effective Physical Adversarial Patch Against Traffic Sign Recognition
  • Authors: Shuai Yuan, Xingshuo Han, Hongwei Li, Guowen Xu, Wenbo Jiang, Tao Ni, Qingchuan Zhao, Yuguang Fang
  • Classification: cs.CV cs.AI
  • Conference: 39th Conference on Neural Information Processing Systems (NeurIPS 2025)
  • Paper Link: https://arxiv.org/abs/2409.12394

Abstract

This paper proposes a novel physical adversarial attack method against traffic sign recognition (TSR) systems. Existing attack methods rely on conspicuous stickers, projections, or easily-blocked invisible light and acoustic signals. The authors introduce fluorescent ink as a new attack medium and design a stealthy and effective physical adversarial patch called FIPatch. The method first models fluorescent effects in the digital domain to determine optimal attack parameters, then applies carefully designed fluorescent perturbations to target signs. Attackers can trigger the fluorescent effect through invisible ultraviolet light, causing the TSR system to misclassify and potentially trigger traffic accidents. Experiments demonstrate that FIPatch achieves a 98.31% success rate under low-light conditions and can bypass five mainstream defense methods with a 96.72% success rate.

Research Background and Motivation

Problem Definition

Traffic sign recognition systems, as critical components of autonomous driving, are vulnerable to adversarial sample attacks. Existing physical adversarial attacks have the following limitations:

  1. Visibility Issues: Sticker-based attacks are visually suspicious and easily detected
  2. Lack of Selectivity: Once deployed, they indiscriminately attack all vehicles
  3. Easy to Defend Against: Visible light projections are easily tracked, and infrared lasers can be filtered
  4. Poor Practicality: Acoustic signal attacks are easily blocked by physical signal protection mechanisms

Research Motivation

The authors identify unique advantages of fluorescent ink:

  • Stealth: Transparent in normal environments, difficult to perceive
  • Controllability: Fluorescent effects only appear under specific wavelength UV light
  • Anti-Defense: Emitted light falls within the visible spectrum, difficult to defend against with filters

Core Contributions

  1. First introduction of fluorescent ink to construct physical adversarial patches, pioneering a new attack vector
  2. Design of the FIPatch attack framework, comprising four modules: automatic localization, fluorescent modeling, optimization, and robustness enhancement
  3. Proposal of three attack objectives: hiding attacks, generation attacks, and misclassification attacks
  4. Comprehensive evaluation validating attack effectiveness and robustness in both digital and physical worlds

Method Details

Task Definition

FIPatch attacks aim to apply fluorescent ink perturbations on traffic signs to cause the TSR system to produce three types of errors when triggered by UV light:

  • Hiding Attack: Makes the system unable to detect the traffic sign
  • Generation Attack: Makes the system detect fabricated traffic signs
  • Misclassification Attack: Makes the system classify the traffic sign into an incorrect category

Model Architecture

1. Automatic Traffic Sign Localization Module

Employs a three-step procedure for precise traffic sign region localization:

Histogram Equalization: Applied when the image satisfies:

P99(t(x(i,j))) - P1(t(x(i,j))) / max(t(x(i,j))) - min(t(x(i,j))) < Th

Canny Edge Detection: Uses custom thresholds to detect traffic sign edges

Color-Based Detection: Defines HSV color ranges to detect yellow, blue, red, and black regions

2. Fluorescent Modeling Module

Fluorescence Definition: Circular fluorescent regions are parameterized as:

θ0 = ((x0, y0), r0, γ0, α0)

Where:

  • (x0, y0): Circle center coordinates
  • r0: Radius
  • γ0: RGB color
  • α0: Transparency

Perturbation Function: Single circular perturbation is defined as:

π(x; θ0)(i,j) = x(i,j) · (1-α(i,j)) + α(i,j) · γ0

Fluorescent Intensity Modeling: Simulates UV light effects through LAB color space conversion:

LAB(xadv)(i,j) = {
    LAB(x)(i,j) · [l1,1,1]T, (i,j) ∈ A ∧ (i,j) ∉ F
    LAB(x)(i,j) · [l2,1,1]T, (i,j) ∈ F  
    LAB(x)(i,j) · [1,1,1]T,  (i,j) ∉ A
}

3. Fluorescent Optimization Module

Objective Function:

min Ex∼X,t∼T [ℓgoal + λℓarea]

Goal-Based Loss Functions:

  • Hiding Attack: ℓgoal = Pr(object) · Pr(class) + βIoU
  • Generation Attack: ℓgoal = -Pr(object) · Pr(class)
  • Misclassification Attack: ℓgoal = log(py)

Area Loss: Minimizes perturbation area

ℓarea = min Σ(i=1 to K) πri²

Particle Swarm Optimization: Uses PSO algorithm to optimize discrete parameter space in black-box settings

4. Robustness Enhancement Module

Expectation Over Transformation (EOT): Extends transformation distribution to adapt to physical environmental changes of fluorescent materials, including:

  • Background variations
  • Brightness adjustments
  • Perspective transformations
  • Distance variations
  • Rotation and motion blur

Transparency Transformation: Simulates fluorescent ink transparency changes over time

Technical Innovations

  1. Digital Modeling of Fluorescent Effects: First parameterization of physical properties of fluorescent materials for adversarial attack optimization
  2. Multi-Objective Attack Strategy: Different loss functions designed for detection and classification tasks
  3. Physical Constraints Consideration: Automatic localization ensures perturbations can only be applied on actual sign surfaces
  4. Environmental Adaptability: Considers real-world factors such as lighting, distance, and angle

Experimental Setup

Datasets

  • GTSRB: German Traffic Sign Recognition Benchmark
  • CTSRD: Chinese Traffic Sign Recognition Database

Evaluation Metrics

Attack Success Rate (ASR):

ASR = (1/N) Σ I_{F(x,untri)=y & F(x,tri)≠y}(x)

Comparison Methods

Evaluated 10 different models:

  • Detectors: YOLOv3, Faster R-CNN
  • Classifiers: CNN, Inception v3, MobileNet v2, GoogleNet, ResNet50, ResNet101, VGG13, VGG16

Implementation Details

  • Input Size: 416×416 for detectors, 32×32 for classifiers (299×299 for Inception v3)
  • Query Count: 1500
  • PSO Parameters: 30 iterations, 5 random restarts
  • Physical Experiment Equipment: Tesla Model Y, multiple power UV lamps (40W-120W)

Experimental Results

Main Results

Physical World Attack Success Rate

ASR performance under different ambient lighting conditions:

Ambient Light (Lux)Generation Attack (YOLOv3)Hiding Attack (YOLOv3)Misclassification Attack (ResNet50)
20098.31%91.59%100%
50098.72%83.64%99.35%
100095.22%69.19%94.26%
200094.06%53.81%90.59%
300089.63%31.48%84.12%

Digital World Attack Success Rate

In black-box settings, most models achieve ASR close to 100%, with transfer attack success rates between 69%-95%.

Ablation Studies

Environmental Factor Impact

  1. Distance and Angle: CNN model maintains ASR >91% at all distances; Inception v3 drops to 70%-77% at long distances
  2. UV Lamp Power: Inception v3 achieves minimum ASR of 77% at 40W, exceeding 97% for all models at 120W
  3. Vehicle Speed Impact: ASR >93% at speeds <10 km/h; significant decline for some models above 15 km/h
  4. UV Lamp Distance: ASR remains above 81% at 8 meters distance

Parameter Impact Analysis

  • Radius: Larger radius generally yields higher ASR
  • Color: C(255,255,0) and C(127,127,255) perform best
  • Position: Center regions of images achieve highest attack success rates
  • Shape: Circles are more effective than lines and curves

Defense Bypass Capability

Tested five mainstream defense methods:

Defense MethodResNet50Inception v3Average ASR Reduction
Image Smoothing-0.93%+0.39%Minimal Impact
Feature Squeezing-1.65%-0.39%<2%
Input Randomization-0.29%-0.21%<1%
Adversarial Training-0.84%+0.42%Minimal Impact
Defensive Dropout-2.30%-2.03%Most Effective (2-3%)

Classification of Physical Adversarial Attacks

  1. Sticker-Based Attacks: Easy to deploy but visually suspicious, indiscriminate attacks
  2. Light Signal-Based Attacks:
    • Visible Light (projection/laser): Easily tracked
    • Infrared Laser: Can be filtered by IR filters
  3. Acoustic Signal-Based Attacks: Easily blocked by physical signal protection mechanisms

Advantages of This Work

Compared to existing methods, FIPatch offers:

  • Higher stealth (transparent ink)
  • Stronger anti-defense capability (visible light emission)
  • Flexible triggering mechanism (UV light control)
  • Better practicality (low-cost materials)

Conclusions and Discussion

Main Conclusions

  1. Feasibility of Fluorescent Ink Attacks: First demonstration that fluorescent materials can effectively attack TSR systems
  2. High Attack Success Rate: Achieves 98.31% success rate under low-light conditions
  3. Strong Defense Bypass Capability: Existing defense methods are largely ineffective, reducing success rate by at most 2-3%
  4. Practical Threat: Demonstrates significant security threats in real environments

Limitations

  1. Environmental Light Sensitivity: Strong ambient light (>1000 Lux) significantly reduces attack effectiveness
  2. Insufficient System-Level Evaluation: Testing primarily at AI component level, lacking complete autonomous driving system evaluation
  3. Detection Distance Constraints: Requires relatively close distance for effective attacks

Future Directions

  1. Curved Surface Application: Research challenges of applying fluorescent materials on curved surfaces
  2. Defense Mechanisms: Develop effective defense methods against FIPatch
  3. Multi-Vehicle Collaboration: Leverage vehicle-to-vehicle collaborative perception to enhance system robustness

In-Depth Evaluation

Strengths

  1. Strong Innovation: First introduction of fluorescent ink as adversarial attack medium, pioneering new research direction
  2. Complete Methodology: Comprehensive attack framework from theoretical modeling to practical deployment
  3. Sufficient Experiments: Comprehensive evaluation in both digital and physical worlds, considering multiple environmental factors
  4. High Practical Value: Reveals new security vulnerabilities in TSR systems with important security implications

Weaknesses

  1. Ethical Considerations: Although ethical approval is claimed, the attack method could be maliciously exploited
  2. Insufficient Defense Research: Proposed defense schemes are relatively simple, lacking in-depth investigation
  3. Missing Cost Analysis: Lacks detailed analysis of attack cost and detection difficulty trade-offs
  4. Long-Term Stability Unclear: Long-term stability and environmental impact of fluorescent ink insufficiently discussed

Impact

  1. Academic Contribution: Provides new attack vectors and modeling methods for adversarial attack research
  2. Security Alert: Reminds autonomous driving system developers of new physical attack threats
  3. Technology Advancement: May promote development of more robust TSR systems and defense mechanisms

Applicable Scenarios

  1. Security Assessment: Evaluate security and robustness of TSR systems
  2. Defense Research: Serve as benchmark attack method for developing and testing defense mechanisms
  3. System Hardening: Guide safe design and deployment of autonomous driving systems

References

The paper cites extensive related work, primarily including:

  • Adversarial sample foundational theory (Goodfellow et al., Carlini & Wagner, etc.)
  • Physical adversarial attack methods (Eykholt et al., Song et al., etc.)
  • Traffic sign recognition systems (YOLO, Faster R-CNN, etc.)
  • Defense mechanisms (Cohen et al., Madry et al., etc.)

Overall Assessment: This is a high-quality security research paper proposing an innovative attack method with sufficient experimental validation. Despite some limitations, it holds significant academic value and practical importance, positively contributing to advancing autonomous driving system security research.