[go: up one dir, main page]

Köhler et al., 2021 - Google Patents

They see me rollin': Inherent vulnerability of the rolling shutter in cmos image sensors

Köhler et al., 2021

View PDF
Document ID
7612659329835324134
Author
Köhler S
Lovisotto G
Birnbach S
Baker R
Martinovic I
Publication year
Publication venue
Proceedings of the 37th Annual Computer Security Applications Conference

External Links

Snippet

In this paper, we describe how the electronic rolling shutter in CMOS image sensors can be exploited using a bright, modulated light source (eg, an inexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We demonstrate the attack on seven different CMOS …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/222Studio circuitry; Studio devices; Studio equipment; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
    • H04N5/225Television cameras; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Köhler et al. They see me rollin’: Inherent vulnerability of the rolling shutter in cmos image sensors
Man et al. {GhostImage}: Remote perception attacks against camera-based image classification systems
Yan et al. Rolling colors: Adversarial laser exploits against traffic light recognition
Liu et al. “seeing is not always believing”: Detecting perception error attacks against autonomous vehicles
Ji et al. Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
Lovisotto et al. {SLAP}: Improving physical adversarial examples with {Short-Lived} adversarial perturbations
US11856290B2 (en) Method and apparatus of processing a signal from an event-based sensor
Zhu et al. Automating visual privacy protection using a smart led
Nagothu et al. Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge.
CN102859565A (en) Method and system for security system tampering detection
Bhupathiraju et al. Emi-lidar: uncovering vulnerabilities of lidar sensors in autonomous driving setting using electromagnetic interference
Fu et al. Remote attacks on drones vision sensors: An empirical study
Saglam et al. Real-time adaptive camera tamper detection for video surveillance
Zhou et al. Stealthy and effective physical adversarial attacks in autonomous driving
Zhang et al. Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Wang et al. The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
DH et al. Autonomous vehicles camera blinding attack detection using sequence modelling and predictive analytics
EP4207736B1 (en) Image processing device, method for training machine learning model, identification device, and image processing method
Man et al. Ghostimage: Perception domain attacks against vision-based object classification systems
KR101288248B1 (en) Human tracking system and method for privacy masking
Xu et al. Laserguider: A laser based physical backdoor attack against deep neural networks
Liu et al. BriGuard: A lightweight indoor intrusion detection system based on infrared light spot displacement
Nassi et al. Protecting autonomous cars from phantom attacks
Xia et al. Moiré Injection Attack (MIA): Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign
KR20240080013A (en) Method and system for preventing thefe in unmanned store environment