Invisible backdoor attack with attention and steganography

被引:0
作者
Chen, Wenmin [1 ]
Xu, Xiaowei [1 ]
Wang, Xiaodong [1 ]
Zhou, Huasong [1 ]
Li, Zewen [1 ]
Chen, Yangming [1 ]
机构
[1] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266000, Peoples R China
关键词
Backdoor attack; Steganography; Spatial attention;
D O I
10.1016/j.cviu.2024.104208
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, with the development and widespread application of deep neural networks (DNNs), backdoor attacks have posed new security threats to the training process of DNNs. Backdoor attacks on neural networks undermine the security and trustworthiness of DNNs by implanting hidden, unauthorized triggers, leading to benign behavior on clean samples while exhibiting malicious behavior on samples containing backdoor triggers. Existing backdoor attacks typically employ triggers that are sample-agnostic and identical for each sample, resulting in poisoned images that lack naturalness and are ineffective against existing backdoor defenses. To address these issues, this paper proposes a novel stealthy backdoor attack, where the backdoor trigger is dynamic and specific to each sample. Specifically, we leverage spatial attention on images and pre- trained models to obtain dynamic triggers, which are then injected using an encoder-decoder network. The design of the injection network benefits from recent advances in steganography research. To demonstrate the effectiveness of the proposed steganographic network, we design two backdoor attack modes named ASBA and ATBA, where ASBA utilizes the steganographic network for attack, while ATBA is a backdoor attack without steganography. Subsequently, we conducted attacks on Deep Neural Networks (DNNs) using four standard datasets. Our extensive experiments show that ASBA surpasses ATBA in terms of stealthiness and resilience against current defensive measures. Furthermore, both ASBA and ATBA demonstrate superior attack efficiency.
引用
收藏
页数:14
相关论文
共 67 条
  • [1] [Anonymous], 2009, Learning multiple layers of features from tiny images
  • [2] Barni M, 2019, IEEE IMAGE PROC, P101, DOI [10.1109/icip.2019.8802997, 10.1109/ICIP.2019.8802997]
  • [3] Chen XY, 2017, Arxiv, DOI arXiv:1712.05526
  • [4] SGD:: Saccharomyces Genome Database
    Cherry, JM
    Adler, C
    Ball, C
    Chervitz, SA
    Dwight, SS
    Hester, ET
    Jia, YK
    Juvik, G
    Roe, T
    Schroeder, M
    Weng, SA
    Botstein, D
    [J]. NUCLEIC ACIDS RESEARCH, 1998, 26 (01) : 73 - 79
  • [5] Learning a similarity metric discriminatively, with application to face verification
    Chopra, S
    Hadsell, R
    LeCun, Y
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, : 539 - 546
  • [6] Chou S.-Y., 2024, P ADV NEUR INF PROC, V36
  • [7] Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
  • [8] Deng L., 2012, IEEE SIGNAL PROC MAG, V29, P141, DOI [DOI 10.1109/MSP.2012.2211477, 10.1109/MSP.2012.2211477]
  • [9] FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis
    Feng, Yu
    Ma, Benteng
    Zhang, Jing
    Zhao, Shanshan
    Xia, Yong
    Tao, Dacheng
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 20844 - 20853
  • [10] Fridrich J., 2001, P ACM WORKSH MULT SE, P27, DOI DOI 10.1145/1232454.1232466