Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An anti-reconnaissance evasion attack method for deep person re-identification system

A pedestrian re-identification and evasion attack technology, applied in the field of artificial intelligence security design, can solve problems such as spy intrusion and security threats

Active Publication Date: 2021-09-14
WUHAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the deep person re-identification system is vulnerable to specific attacks, it will bring serious consequences and security threats, for example, criminals can evade the search and location of law enforcement agencies, or spies can infiltrate classified classified areas under surveillance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-reconnaissance evasion attack method for deep person re-identification system
  • An anti-reconnaissance evasion attack method for deep person re-identification system
  • An anti-reconnaissance evasion attack method for deep person re-identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention considers that the security issue of deep person re-identification has not been paid attention to, and it will bring potential security threats when it is widely used. Therefore, there is an urgent need for an anti-reconnaissance and evasion attack method for deep person re-identification systems.

[0033] The anti-reconnaissance escape attack method designed by the present invention for the deep pedestrian re-identification system includes the following steps:

[0034] 1) Given a pedestrian re-identification system, the query image is input, and the system outputs the similarity and similarity ranking between images captured by other cameras and the query image. The attacker can access the parameters and weights of the target model, and set the specific users that the attacker wants to match.

[0035] The target person re-identification system can be expressed as f θ (x,y)=sc, where x is the image that the system needs to query, y is the pedestri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-reconnaissance evasion attack method oriented to a deep pedestrian re-identification system, and proposes an optimization method based on the maximization of matching differences, and combines multi-position sampling to generate noise patterns that are variable across cameras and can be expanded in position, so that pedestrians Any position in the monitoring area of ​​the re-identification system, the same noise pattern cannot be matched with each other under different camera shots. In addition, this method integrates physical environment factors into the noise pattern generation process, reduces noise information loss during printing and shooting, and improves its robustness. The noise pattern generated by this method can prevent the pedestrian re-identification system from correctly searching and locating the attacker, and realize "invisibility" under the security monitoring system.

Description

technical field [0001] The present invention designs the field of artificial intelligence security, and specifically refers to an anti-reconnaissance and escape attack method oriented to a deep pedestrian re-identification system. Background technique [0002] With the rapid development of the mobile Internet, the continuous upgrading of hardware equipment, the production of massive data and the updating of algorithms, the development of artificial intelligence (AI) has become unstoppable, and it is gradually penetrating and profoundly changing human life. At present, artificial intelligence technology based on machine learning and deep learning is widely used in various fields such as human-computer interaction, visual processing system, recommendation system, safety diagnosis and protection, and its application scenarios include unmanned driving, image recognition, malware detection, Malware filtering and more. It can be said that the advent of the era of artificial intel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06K15/02G06Q50/26
CPCG06K15/02G06K17/0022G06Q50/265
Inventor 王志波宋梦凯郑思言王骞
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products