Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks

被引:9
|
作者
Bouniot, Quentin [1 ]
Audigier, Romaric [1 ]
Loesch, Angelique [1 ]
机构
[1] CEA, LIST, Vis & Learning Lab Scene Anal, PC 184, F-91191 Gif Sur Yvette, France
关键词
D O I
10.1109/CVPRW50498.2020.00405
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Person re-identification (re-ID) is a key problem in smart supervision of camera networks. Over the past years, models using deep learning have become state of the art. However, it has been shown that deep neural networks are flawed with adversarial examples, i.e. human-imperceptible perturbations. Extensively studied for the task of image closed-set classification, this problem can also appear in the case of open-set retrieval tasks. Indeed, recent work has shown that we can also generate adversarial examples for metric learning systems such as re-ID ones. These models remain vulnerable: when faced with adversarial examples, they fail to correctly recognize a person, which represents a security breach. These attacks are all the more dangerous as they are impossible to detect for a human operator. Attacking a metric consists in altering the distances between the feature of an attacked image and those of reference images, i.e. guides. In this article, we investigate different possible attacks depending on the number and type of guides available. From this metric attack family, two particularly effective attacks stand out. The first one, called Self Metric Attack, is a strong attack that does not need any image apart from the attacked image. The second one, called Furthest-Negative Attack, makes full use of a set of images. Attacks are evaluated on commonly used datasets: Market1501 and DukeMTMC. Finally, we propose an efficient extension of adversarial training protocol adapted to metric learning as a defense that increases the robustness of re-ID models.(1)
引用
收藏
页码:3450 / 3459
页数:10
相关论文
共 50 条
  • [1] Adversarial Metric Attack and Defense for Person Re-Identification
    Bai, Song
    Li, Yingwei
    Zhou, Yuyin
    Li, Qizhu
    Torr, Philip H. S.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2021, 43 (06) : 2119 - 2126
  • [2] Human-in-the-Loop Person Re-Identification as a Defence Against Adversarial Attacks
    Delussu, Rita
    Putzu, Lorenzo
    Ledda, Emanuele
    Fumera, Giorgio
    IMAGE ANALYSIS AND PROCESSING - ICIAP 2023 WORKSHOPS, PT I, 2024, 14365 : 330 - 342
  • [3] REGULARIZATION IN METRIC LEARNING FOR PERSON RE-IDENTIFICATION
    Si, Jianlou
    Zhang, Honggang
    Li, Chun-Guang
    2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2015, : 2309 - 2313
  • [4] Deep Metric Learning for Person Re-Identification
    Yi, Dong
    Lei, Zhen
    Liao, Shengcai
    Li, Stan Z.
    2014 22ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2014, : 34 - 39
  • [5] An Enhanced Metric Learning for Person Re-identification
    Lei, Zhuochen
    Yu, Xiaoqing
    2018 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING (ICALIP), 2018, : 52 - 57
  • [6] Regularized Integrated Metric for Person Re-Identification
    Hanif, Muhammad Shehzad
    2018 12TH INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), 2018, : 48 - 53
  • [7] Adversarial Attribute-Image Person Re-identification
    Yin, Zhou
    Zheng, Wei-Shi
    Wu, Ancong
    Yu, Hong-Xing
    Wan, Hai
    Guo, Xiaowei
    Huang, Feiyue
    Lai, Jianhuang
    PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 1100 - 1106
  • [8] ADVERSARIAL BINARY CODING FOR EFFICIENT PERSON RE-IDENTIFICATION
    Liu, Zheng
    Qin, Jie
    Li, Annan
    Wang, Yunhong
    Van Gool, Luc
    2019 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2019, : 700 - 705
  • [9] Adversarial Open-World Person Re-Identification
    Li, Xiang
    Wu, Ancong
    Zheng, Wei-Shi
    COMPUTER VISION - ECCV 2018, PT II, 2018, 11206 : 287 - 303
  • [10] Adversarial perturbation and defense for generalizable person re-identification
    Tan, Hongchen
    Xu, Kaiqiang
    Tao, Pingping
    Liu, Xiuping
    NEURAL NETWORKS, 2025, 186