
Table 5: Conditional average distortion
¯
D and attack success rate (ASR) per compression setting q in a white box scenario.
This ablation study compares C&W (Carlini and Wagner, 2017), a robust iterative attack with a fixed q for compression
approximation, and RCW, which uses the JPEG approximation and CAS.
Ablation
CAD ASR ASR ASR
Attack
¯
D q=70 q=80 q=90
C&W (Carlini and Wagner, 2017) 0.0665 0.061 0.109 0.221
+ Appr. JPEG 0.0684 0.131 0.664 0.115
+ CAS 0.1210 0.642 0.662 0.663
6 CONCLUSION & FUTURE
WORK
Constrained adversarial optimization formulations
provide an optimal basis for integrating differentiable
JPEG approximations. However, using ensemble
methods to account for different compression qual-
ity settings (Shin and Song, 2017) in target applica-
tions leads to long runtimes for attack methods that
optimize to find a good balance between effectiveness
and visual fidelity. We present a method that interro-
gates the target system once per sample and performs
a compression adaptation search to find an optimal
quality setting for the attack. Our approach allows us
to compute adversarial samples that successfully de-
feat JPEG compression while maintaining high visual
fidelity to the original sample. For nearly impercepti-
ble amounts of distortion, our model outperforms the
current state of the art in terms of success per pertur-
bation in all experiments conducted, even overcoming
a combination of compression and defensive strate-
gies.
We now discuss possible future work. Replacing
the gradient ensemble approach of existing methods
Shin and Song (2017); Reich et al. (2024) with our
compression adaptation search (CAS) suggests an ad-
vantage in terms of computational complexity, since
we avoid the need for an additional inner loop in the
optimization procedure (see Section 3.2.2). However,
for future work, these advantages need to be investi-
gated by conducting a performance benchmark that
compares RCW to an adversarial optimization pro-
cedure that incorporates the established gradient en-
semble method found in Shin and Song (2017) and
Reich et al. (2024). Furthermore, although our attack
can successfully bypass JPEG at different compres-
sion rates, there are other compression schemes that
work differently internally. For example, JPEG2000
replaces the DCT with a wavelet transform to com-
pute high frequency components (Taubman and Mar-
cellin, 2002). Future work is needed to address these
types of compression and have attacks successfully
bypass them.
REFERENCES
Akhtar, N., Mian, A., Kardan, N., and Shah, M. (2021). Ad-
vances in adversarial attacks and defenses in computer
vision: A survey. IEEE Access, 9:155161–155196.
Carlini, N. and Wagner, D. A. (2017). Towards evaluating
the robustness of neural networks. In 2017 IEEE Sym-
posium on Security and Privacy, SP 2017, San Jose,
CA, USA, May 22-26, 2017, pages 39–57. IEEE Com-
puter Society.
Cozzolino, D., Poggi, G., Corvi, R., Nießner, M., and Ver-
doliva, L. (2023). Raising the bar of ai-generated im-
age detection with CLIP. CoRR, abs/2312.00195.
Ding, K., Ma, K., Wang, S., and Simoncelli, E. P. (2022).
Image quality assessment: Unifying structure and tex-
ture similarity. IEEE Trans. Pattern Anal. Mach. In-
tell., 44(5):2567–2581.
Fezza, S. A., Bakhti, Y., Hamidouche, W., and D
´
eforges, O.
(2019). Perceptual evaluation of adversarial attacks
for cnn-based image classification. In 11th Interna-
tional Conference on Quality of Multimedia Experi-
ence QoMEX 2019, Berlin, Germany, June 5-7, 2019,
pages 1–6. IEEE.
Goodfellow, I. J., Shlens, J., and Szegedy, C. (2015). Ex-
plaining and harnessing adversarial examples. In Ben-
gio, Y. and LeCun, Y., editors, 3rd International Con-
ference on Learning Representations, ICLR 2015, San
Diego, CA, USA, May 7-9, 2015, Conference Track
Proceedings.
He, K., Zhang, X., Ren, S., and Sun, J. (2016). Deep resid-
ual learning for image recognition. In 2016 IEEE Con-
ference on Computer Vision and Pattern Recognition,
CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016,
pages 770–778. IEEE Computer Society.
Kurakin, A., Goodfellow, I. J., and Bengio, S. (2017). Ad-
versarial examples in the physical world. In 5th In-
ternational Conference on Learning Representations,
ICLR 2017, Toulon, France, April 24-26, 2017, Work-
shop Track Proceedings. OpenReview.net.
Kurakin, A., Goodfellow, I. J., Bengio, S., Dong, Y., Liao,
F., Liang, M., Pang, T., Zhu, J., Hu, X., Xie, C., Wang,
J., Zhang, Z., Ren, Z., Yuille, A. L., Huang, S., Zhao,
Y., Zhao, Y., Han, Z., Long, J., Berdibekov, Y., Akiba,
T., Tokui, S., and Abe, M. (2018). Adversarial attacks
and defences competition. CoRR, abs/1804.00097.
Liu, Z., Liu, Q., Liu, T., Xu, N., Lin, X., Wang, Y., and Wen,
W. (2019). Feature distillation: Dnn-oriented JPEG
compression against adversarial examples. In IEEE
VISAPP 2025 - 20th International Conference on Computer Vision Theory and Applications
176