Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Counter-reconnaissance escape attack method for deep pedestrian re-identification system

A pedestrian re-identification and evasion attack technology, applied in the field of artificial intelligence security design, can solve security threats, spy intrusion and other problems

Active Publication Date: 2019-11-08
WUHAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the deep person re-identification system is vulnerable to specific attacks, it will bring serious consequences and security threats, for example, criminals can evade the search and location of law enforcement agencies, or spies can infiltrate classified classified areas under surveillance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Counter-reconnaissance escape attack method for deep pedestrian re-identification system
  • Counter-reconnaissance escape attack method for deep pedestrian re-identification system
  • Counter-reconnaissance escape attack method for deep pedestrian re-identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention considers that the security issue of deep person re-identification has not been paid attention to, and it will bring potential security threats when it is widely used. Therefore, there is an urgent need for an anti-reconnaissance and evasion attack method for deep person re-identification systems.

[0033] The anti-reconnaissance escape attack method designed by the present invention for the deep pedestrian re-identification system includes the following steps:

[0034] 1) Given a pedestrian re-identification system, the query image is input, and the system outputs the similarity and similarity ranking between images captured by other cameras and the query image. The attacker can access the parameters and weights of the target model, and set the specific users that the attacker wants to match.

[0035] The target person re-identification system can be expressed as f θ (x, y)=sc, where x is the image that the system needs to query, y is the pedestr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a counter-reconnaissance escape attack method for a deep pedestrian re-identification system. A matching difference maximization-based optimization method is proposed, and cross-camera variable and position-expandable noise patterns are generated in combination with multi-position sampling, so that the same noise patterns cannot be matched with each other under shooting ofdifferent cameras at any position of a pedestrian re-identification system monitoring area. Besides, physical environment factors are fused into the noise pattern generation process, information lossof noise in the printing and shooting process is reduced, and the robustness of the method is improved. The noise pattern generated by the method can enable a pedestrian re-identification system not to correctly search and locate an attacker, thereby realizing invisibility under a security monitoring system.

Description

technical field [0001] The present invention designs the field of artificial intelligence security, and specifically refers to an anti-reconnaissance and escape attack method oriented to a deep pedestrian re-identification system. Background technique [0002] With the rapid development of the mobile Internet, the continuous upgrading of hardware equipment, the production of massive data and the updating of algorithms, the development of artificial intelligence (AI) has become unstoppable, and it is gradually penetrating and profoundly changing human life. At present, artificial intelligence technology based on machine learning and deep learning is widely used in various fields such as human-computer interaction, visual processing system, recommendation system, safety diagnosis and protection, and its application scenarios include unmanned driving, image recognition, malware detection, Malware filtering and more. It can be said that the advent of the era of artificial intel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00G06K15/02G06Q50/26
CPCG06K15/02G06K17/0022G06Q50/265
Inventor 王志波宋梦凯郑思言王骞
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products