Köhler et al., 2021 - Google Patents
They see me rollin': Inherent vulnerability of the rolling shutter in cmos image sensorsKöhler et al., 2021
View PDF- Document ID
- 7612659329835324134
- Author
- Köhler S
- Lovisotto G
- Birnbach S
- Baker R
- Martinovic I
- Publication year
- Publication venue
- Proceedings of the 37th Annual Computer Security Applications Conference
External Links
Snippet
In this paper, we describe how the electronic rolling shutter in CMOS image sensors can be exploited using a bright, modulated light source (eg, an inexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We demonstrate the attack on seven different CMOS …
- 238000005096 rolling process 0 abstract description 62
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/222—Studio circuitry; Studio devices; Studio equipment; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
- H04N5/225—Television cameras; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Köhler et al. | They see me rollin’: Inherent vulnerability of the rolling shutter in cmos image sensors | |
| Man et al. | {GhostImage}: Remote perception attacks against camera-based image classification systems | |
| Yan et al. | Rolling colors: Adversarial laser exploits against traffic light recognition | |
| Liu et al. | “seeing is not always believing”: Detecting perception error attacks against autonomous vehicles | |
| Ji et al. | Poltergeist: Acoustic adversarial machine learning against cameras and computer vision | |
| Lovisotto et al. | {SLAP}: Improving physical adversarial examples with {Short-Lived} adversarial perturbations | |
| US11856290B2 (en) | Method and apparatus of processing a signal from an event-based sensor | |
| Zhu et al. | Automating visual privacy protection using a smart led | |
| Nagothu et al. | Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. | |
| CN102859565A (en) | Method and system for security system tampering detection | |
| Bhupathiraju et al. | Emi-lidar: uncovering vulnerabilities of lidar sensors in autonomous driving setting using electromagnetic interference | |
| Fu et al. | Remote attacks on drones vision sensors: An empirical study | |
| Saglam et al. | Real-time adaptive camera tamper detection for video surveillance | |
| Zhou et al. | Stealthy and effective physical adversarial attacks in autonomous driving | |
| Zhang et al. | Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection | |
| Wang et al. | The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition | |
| DH et al. | Autonomous vehicles camera blinding attack detection using sequence modelling and predictive analytics | |
| EP4207736B1 (en) | Image processing device, method for training machine learning model, identification device, and image processing method | |
| Man et al. | Ghostimage: Perception domain attacks against vision-based object classification systems | |
| KR101288248B1 (en) | Human tracking system and method for privacy masking | |
| Xu et al. | Laserguider: A laser based physical backdoor attack against deep neural networks | |
| Liu et al. | BriGuard: A lightweight indoor intrusion detection system based on infrared light spot displacement | |
| Nassi et al. | Protecting autonomous cars from phantom attacks | |
| Xia et al. | Moiré Injection Attack (MIA): Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign | |
| KR20240080013A (en) | Method and system for preventing thefe in unmanned store environment |