Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Meta-Heuristic Optimization Based Less Imperceptible Adversarial Attack on Gait Based Surveillance Systems

Full metadata record
DC Field Value Language
dc.contributor.authorMaqsood, Muazzam-
dc.contributor.authorGhazanfar, Mustansar Ali-
dc.contributor.authorMehmood, Irfan-
dc.contributor.authorHwang, Eenjun-
dc.contributor.authorRho, Seungmin-
dc.date.accessioned2022-06-12T07:41:01Z-
dc.date.available2022-06-12T07:41:01Z-
dc.date.created2022-06-10-
dc.date.issued2022-
dc.identifier.issn1939-8018-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/142118-
dc.description.abstractIn today's digital realm, global safety concerns have given rise to intelligent surveillance technologies. Currently, Gait-based surveillance systems have lately got increasing attention and are widely used because they employed human distinctive and behavioral characteristics as well as recognize them without their cooperation. They play a vital role in smart video monitoring systems and have a broad array of applications, especially in public security applications. Gait recognition is the process of validating a person looking at the way they walk. Behind these surveillance systems, superior computer vision-based deep learning algorithms are deployed for the effective identification of individuals. On the other hand, the vulnerable nature of these algorithms is the main factor for potential security threats in these surveillance systems. Different researchers design several kinds of adversarial attacks for different computer vision domains to exploit their vulnerabilities. In most of these attacks, the resulting adversarial noise in form of either patches or pixels is apparent and clearly identifiable by the human naked eye. From this line of research, this study presents a new variant of the attack, to highlight the vulnerability of gait recognition systems. The adversarial noise in the form of one pixel is added to that location of Gait energy images (GEI) which are less imperceptible by humans. More specifically, this can be accomplished using the Grey wolf optimization (GWO) method, which takes a GEI image and a calculated perturbation as input and starts working to find the optimum location on a given GEI image. This optimum candidate/location is the one where the texture is not excessively affected when it is disrupted by computed perturbation, and as a result, the attack is less perceptible. Moreover, the study investigates that CNN's based gait recognition systems encountered severe potential threats even when the noise is less imperceptible by the human naked eye.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectRECOGNITION-
dc.subjectFRAMEWORK-
dc.subjectNETWORKS-
dc.titleA Meta-Heuristic Optimization Based Less Imperceptible Adversarial Attack on Gait Based Surveillance Systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Eenjun-
dc.identifier.doi10.1007/s11265-022-01742-x-
dc.identifier.scopusid2-s2.0-85124564001-
dc.identifier.wosid000753229800001-
dc.identifier.bibliographicCitationJOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY-
dc.relation.isPartOfJOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY-
dc.citation.titleJOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY-
dc.type.rimsART-
dc.type.docTypeArticle; Early Access-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusRECOGNITION-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordAuthorSecurity surveillance systems-
dc.subject.keywordAuthorGait recognition-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorAdversarial attack-
dc.subject.keywordAuthorMeta-Heuristic optimization-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Een jun photo

Hwang, Een jun
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE