Research Article
Adv-Plate Attack: Adversarially Perturbed Plate for License Plate Recognition System
Figure 5
An example of an adversarial example generated by the second type of the proposed method according to the alpha value and iteration.
| (a) Source image |
| (b) Source license |
| (c) = 0.2 (iteration 50) |
| (d) = 0.4 (iteration 50) |
| (e) = 0.2 (iteration 100) |
| (f) = 0.4 (iteration 100) |
| (g) = 0.2 (iteration 500) |
| (h) = 0.4 (iteration 500) |
| (i) = 0.2 (iteration 1000) |
| (j) = 0.4 (iteration 1000) |
| (k) Proposed image with (i) |
| (l) Proposed image with (j) |