I think what you are looking for is called "Adversarial Design".
Article: https://news.ycombinator.com/item?id=21482372 Archive: https://archive.today/HuanH
Defcon: Tutorial on hacking Facial Recognition systems. https://www.youtube.com/watch?v=b-lkYtprgVw
[PDF] Adversarial Examples that Fool both Computer Vision and Time-Limited Humans
I think what you are looking for is called "Adversarial Design".
Article: https://news.ycombinator.com/item?id=21482372
Archive: https://archive.today/HuanH
Defcon: Tutorial on hacking Facial Recognition systems.
https://www.youtube.com/watch?v=b-lkYtprgVw
[PDF] Adversarial Examples that Fool both Computer
Vision and Time-Limited Humans
https://personal.utdallas.edu/~muratk/courses/adv-ml-19f/Adversarial%20Examples%20that%20Fool%20both%20Computer%20Vision%20and%20Time-Limited%20Humans.pdf
(post is archived)