Targeted Attack for Deep Hashing Based Retrieval

被引:55
作者
Bai, Jiawang [1 ,2 ]
Chen, Bin [1 ,2 ]
Li, Yiming [1 ]
Wu, Dongxian [1 ,2 ]
Guo, Weiwei [3 ]
Xia, Shu-Tao [1 ,2 ]
Yang, En-Hui [4 ]
机构
[1] Tsinghua Univ, Tsinghua Shenzhen Int Grad Sch, Shenzhen, Peoples R China
[2] Peng Cheng Lab, PCL Res Ctr Networks & Commun, Shenzhen, Peoples R China
[3] Vivo AI Lab, Shenzhen, Peoples R China
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
来源
COMPUTER VISION - ECCV 2020, PT I | 2020年 / 12346卷
基金
中国国家自然科学基金;
关键词
Targeted attack; Deep hashing; Adversarial attack; Similarity retrieval;
D O I
10.1007/978-3-030-58452-8_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The deep hashing based retrieval method is widely adopted in large-scale image and video retrieval. However, there is little investigation on its security. In this paper, we propose a novel method, dubbed deep hashing targeted attack (DHTA), to study the targeted attack on such retrieval. Specifically, we first formulate the targeted attack as a point-to-set optimization, which minimizes the average distance between the hash code of an adversarial example and those of a set of objects with the target label. Then we design a novel component-voting scheme to obtain an anchor code as the representative of the set of hash codes of objects with the target label, whose optimality guarantee is also theoretically derived. To balance the performance and perceptibility, we propose to minimize the Hamming distance between the hash code of the adversarial example and the anchor code under the l(infinity) restriction on the perturbation. Extensive experiments verify that DHTA is effective in attacking both deep hashing based image retrieval and video retrieval.
引用
收藏
页码:618 / 634
页数:17
相关论文
共 54 条
[1]  
Bai Y., 2020, ECCV 2020
[2]   Deep Cauchy Hashing for Hamming Space Retrieval [J].
Cao, Yue ;
Long, Mingsheng ;
Liu, Bin ;
Wang, Jianmin .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :1229-1237
[3]   HashNet: Deep Learning to Hash by Continuation [J].
Cao, Zhangjie ;
Long, Mingsheng ;
Wang, Jianmin ;
Yu, Philip S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :5609-5618
[4]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[5]   Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J].
Carlini, Nicholas ;
Wagner, David .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :1-7
[6]  
Chen W., 2020, ECCV
[7]   Deep Supervised Hashing with Anchor Graph [J].
Chen, Yudong ;
Lai, Zhihui ;
Ding, Yujuan ;
Lin, Kaiyi ;
Wong, Wai Keung .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, :9795-9803
[8]   Deep Hashing via Discrepancy Minimization [J].
Chen, Zhixiang ;
Yuan, Xin ;
Lu, Jiwen ;
Tian, Qi ;
Zhou, Jie .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :6838-6847
[9]  
Chua T. -S., 2009, P ACM INT C IM VID R, V1, P9
[10]   Efficient Decision-based Black-box Adversarial Attacks on Face Recognition [J].
Dong, Yinpeng ;
Su, Hang ;
Wu, Baoyuan ;
Li, Zhifeng ;
Liu, Wei ;
Zhang, Tong ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :7706-7714