What is suspicious about the books in the image above? Is it that there is no bookend? How about the radio waves pouring out of them? [Clay Weiland] does not like the way a bare router looks in the living room, but he appreciates the coverage gained by putting it in the middle of his house. He added a layer of home decorating camouflage in the form of some second-hand book covers to hide the unsightly bit of tech.
There isn’t a blog post or video about this particular build anywhere. The photos were submitted to our tip line as-is with the note that a table-saw is involved. We can safely infer that book covers are stripped of their pages and filled with wooden blanks painted white and stuck together to look like a cluster of literature. The takeaway from this example is that our tech does not have to be hidden away like a secret, or disrupt the decor, it can be placed as functionally as possible without sacrificing Feng Shui.
If hiding behind books piques your interest, try a full-fledged version, or this smooth operator.
Thank you, [George Graves], for encouraging people to use our tip line.
The good people at MIT’s Computer Science and Artificial Intelligence Laboratory [CSAIL] have found a way of tricking Google’s InceptionV3 image classifier into seeing a rifle where there actually is a turtle. This is achieved by presenting the classifier with what is called ‘adversary examples’.
Adversary examples are a proven concept for 2D stills. In 2014 [Goodfellow], [Shlens] and [Szegedy] added imperceptible noise to the image of a panda that from then on was classified as gibbon. This method relies on the image being undisturbed and can be overcome by zooming, blurring or rotating the image.
The applicability for real world shenanigans has been seriously limited but this changes everything. This weaponized turtle is a color 3D print that is reliably misclassified by the algorithm from any point of view. To achieve this, some knowledge about the classifier is required to generate misleading input. The image transformations, such as rotation, scaling and skewing but also color corrections and even print errors are added to the input and the result is then optimized to reliably mislead the algorithm. The whole process is documented in [CSAIL]’s paper on the method.
What this amounts to is camouflage from machine vision. Assuming that the method also works the other way around, the possibility of disguising guns (or anything else) as turtles has serious implications for automated security systems.
As this turtle targets the Inception algorithm, it should be able to fool the DIY image recognition talkbox that Hackaday’s own [Steven Dufresne] built.
Thanks to [Adam] for the tip.
[Kemper Smith] built a little piece of nature in Processing. He was inspired by a biology experiment that excited squid cells using electricity. The result is an interactive display that mimics that biology.
Last August we saw a peculiar experiment that forced Cyprus Hill music on the color changing cells of a squid. The cells make colors by stretching sacs of pigment; the larger they get the more of that color is shown. Normally this is used for camouflage. The image on the left is the reaction from connecting headphone wires while music is being played.
But we can’t all get our hands on this type of wet-ware — especially if life far inland. So [Kemper] got to work writing some Processing code. The result is seen on the right. It does a good job of replicating the motion and color palette of the original. He’s put together a web-based demonstration which you can interact with using your mouse cursor. But we also saw him demonstrate a Kinect based version at our local hackerspace.
Continue reading “Modeling Squid Cells In Code Foregoes Connecting Voltage To Animals”
Though much of [citizenFinerran]’s intent in designing a suit that camouflages the wearer from security camera footage was philosophical, it is designed with a very tangible purpose in mind. The suit does not provide true camouflage (to say nothing of true invisibility), but it does create enough moving visual obstructions to make the wearer completely anonymous on film. More details on this and other invisibility cloaks after the break.
Continue reading “Anonymizing Clothing”