Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval

03/22/2023
by   Xunguang Wang, et al.
0

Deep hashing has been extensively applied to massive image retrieval due to its efficiency and effectiveness. Recently, several adversarial attacks have been presented to reveal the vulnerability of deep hashing models against adversarial examples. However, existing attack methods suffer from degraded performance or inefficiency because they underutilize the semantic relations between original samples or spend a lot of time learning these relations with a deep neural network. In this paper, we propose a novel Pharos-guided Attack, dubbed PgA, to evaluate the adversarial robustness of deep hashing networks reliably and efficiently. Specifically, we design pharos code to represent the semantics of the benign image, which preserves the similarity to semantically relevant samples and dissimilarity to irrelevant ones. It is proven that we can quickly calculate the pharos code via a simple math formula. Accordingly, PgA can directly conduct a reliable and efficient attack on deep hashing-based retrieval by maximizing the similarity between the hash code of the adversarial example and the pharos code. Extensive experiments on the benchmark datasets verify that the proposed algorithm outperforms the prior state-of-the-arts in both attack strength and speed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/18/2022

Centralized Adversarial Learning for Robust Deep Hashing

Deep hashing has been extensively utilized in massive image retrieval be...
research
07/01/2022

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

Due to its powerful feature learning capability and high efficiency, dee...
research
05/17/2021

Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing

Due to its powerful capability of representation learning and high-effic...
research
03/17/2021

Improved Deep Classwise Hashing With Centers Similarity Learning for Image Retrieval

Deep supervised hashing for image retrieval has attracted researchers' a...
research
09/28/2022

Weighted Contrastive Hashing

The development of unsupervised hashing is advanced by the recent popula...
research
06/23/2020

Security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Cancellable biometrics (CB) intentionally distorts biometric template fo...
research
01/06/2023

Adversarial Attacks on Neural Models of Code via Code Difference Reduction

Deep learning has been widely used to solve various code-based tasks by ...

Please sign up or login with your details

Forgot password? Click here to reset