Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification

11/20/2022
by   Wenli Sun, et al.
0

In recent years, person Re-identification (ReID) has rapidly progressed with wide real-world applications, but also poses significant risks of adversarial attacks. In this paper, we focus on the backdoor attack on deep ReID models. Existing backdoor attack methods follow an all-to-one/all attack scenario, where all the target classes in the test set have already been seen in the training set. However, ReID is a much more complex fine-grained open-set recognition problem, where the identities in the test set are not contained in the training set. Thus, previous backdoor attack methods for classification are not applicable for ReID. To ameliorate this issue, we propose a novel backdoor attack on deep ReID under a new all-to-unknown scenario, called Dynamic Triggers Invisible Backdoor Attack (DT-IBA). Instead of learning fixed triggers for the target classes from the training set, DT-IBA can dynamically generate new triggers for any unknown identities. Specifically, an identity hashing network is proposed to first extract target identity information from a reference image, which is then injected into the benign images by image steganography. We extensively validate the effectiveness and stealthiness of the proposed attack on benchmark datasets, and evaluate the effectiveness of several defense methods against our attack.

READ FULL TEXT

page 1

page 3

page 6

page 7

research
11/29/2022

Similarity Distribution based Membership Inference Attack on Person Re-identification

While person Re-identification (Re-ID) has progressed rapidly due to its...
research
10/15/2020

Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing

Backdoor data poisoning is an emerging form of adversarial attack usuall...
research
03/04/2022

User-Level Membership Inference Attack against Metric Embedding Learning

Membership inference (MI) determines if a sample was part of a victim mo...
research
06/23/2020

Surpassing Real-World Source Training Data: Random 3D Characters for Generalizable Person Re-Identification

Person re-identification has seen significant advancement in recent year...
research
10/30/2019

Universal Adversarial Perturbations Against Person Re-Identification

Person re-identification (re-ID) has made great progress and achieved hi...
research
09/12/2023

Generalized Attacks on Face Verification Systems

Face verification (FV) using deep neural network models has made tremend...
research
02/20/2021

WaNet – Imperceptible Warping-based Backdoor Attack

With the thriving of deep learning and the widespread practice of using ...

Please sign up or login with your details

Forgot password? Click here to reset