A Meta-Heuristic Optimization Based Less Imperceptible Adversarial Attack on Gait Based Surveillance Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Maqsood, Muazzam | - |
dc.contributor.author | Ghazanfar, Mustansar Ali | - |
dc.contributor.author | Mehmood, Irfan | - |
dc.contributor.author | Hwang, Eenjun | - |
dc.contributor.author | Rho, Seungmin | - |
dc.date.accessioned | 2022-06-12T07:41:01Z | - |
dc.date.available | 2022-06-12T07:41:01Z | - |
dc.date.created | 2022-06-10 | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 1939-8018 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/142118 | - |
dc.description.abstract | In today's digital realm, global safety concerns have given rise to intelligent surveillance technologies. Currently, Gait-based surveillance systems have lately got increasing attention and are widely used because they employed human distinctive and behavioral characteristics as well as recognize them without their cooperation. They play a vital role in smart video monitoring systems and have a broad array of applications, especially in public security applications. Gait recognition is the process of validating a person looking at the way they walk. Behind these surveillance systems, superior computer vision-based deep learning algorithms are deployed for the effective identification of individuals. On the other hand, the vulnerable nature of these algorithms is the main factor for potential security threats in these surveillance systems. Different researchers design several kinds of adversarial attacks for different computer vision domains to exploit their vulnerabilities. In most of these attacks, the resulting adversarial noise in form of either patches or pixels is apparent and clearly identifiable by the human naked eye. From this line of research, this study presents a new variant of the attack, to highlight the vulnerability of gait recognition systems. The adversarial noise in the form of one pixel is added to that location of Gait energy images (GEI) which are less imperceptible by humans. More specifically, this can be accomplished using the Grey wolf optimization (GWO) method, which takes a GEI image and a calculated perturbation as input and starts working to find the optimum location on a given GEI image. This optimum candidate/location is the one where the texture is not excessively affected when it is disrupted by computed perturbation, and as a result, the attack is less perceptible. Moreover, the study investigates that CNN's based gait recognition systems encountered severe potential threats even when the noise is less imperceptible by the human naked eye. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | RECOGNITION | - |
dc.subject | FRAMEWORK | - |
dc.subject | NETWORKS | - |
dc.title | A Meta-Heuristic Optimization Based Less Imperceptible Adversarial Attack on Gait Based Surveillance Systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hwang, Eenjun | - |
dc.identifier.doi | 10.1007/s11265-022-01742-x | - |
dc.identifier.scopusid | 2-s2.0-85124564001 | - |
dc.identifier.wosid | 000753229800001 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | - |
dc.relation.isPartOf | JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | - |
dc.citation.title | JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Early Access | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | RECOGNITION | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordAuthor | Security surveillance systems | - |
dc.subject.keywordAuthor | Gait recognition | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | Adversarial attack | - |
dc.subject.keywordAuthor | Meta-Heuristic optimization | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.