电信科学 ›› 2023, Vol. 39 ›› Issue (11): 96-106.doi: 10.11959/j.issn.1000-0801.2023246

• 研究与开发 • 上一篇    

用于攻击深度哈希图像检索模型的双分支自编码器网络

符思政, 曹春杰, 刘志远, 陶方舰, 孙敬张   

  1. 海南大学网络空间安全学院,海南 海口 570228
  • 修回日期:2023-11-10 出版日期:2023-11-01 发布日期:2023-11-01
  • 作者简介:符思政(1999- ),男,海南大学硕士生,主要研究方向为人工智能安全、对抗样本攻防、图像检索
    曹春杰(1977- ),男,博士,海南大学博士生导师,主要研究方向为认知无线网络安全、区块链、人工智能安全等
    刘志远(1999- ),男,海南大学硕士生,主要研究方向为对抗样本攻防、异常检测、图对比学习
    陶方舰(1991- ),男,海南大学博士生,主要研究方向为人工智能安全、对抗样本攻防
    孙敬张(1993- ),男,博士,海南大学硕士生导师,主要研究方向为无线安全、深度学习、图像处理
  • 基金资助:
    国家自然科学基金联合基金资助项目(U19B2044);海南省重点研发计划项目(ZDYF2020012)

Dual-branch autoencoder network for attacking deep hashing image retrieval models

Sizheng FU, Chunjie CAO, Zhiyuan LIU, Fangjian TAO, Jingzhang SUN   

  1. School of Cyberspace Security, Hainan University, Haikou 570228, China
  • Revised:2023-11-10 Online:2023-11-01 Published:2023-11-01
  • Supported by:
    The National Natural Science Foundation of China(U19B2044);The Key Research and Development Project of Hainan Province, China(ZDYF2020012)

摘要:

由于其强大的表示学习能力和高效的计算能力,基于深度学习的哈希(深度哈希)方法在大规模图像检索中被广泛应用。然而,对深度哈希模型的安全性研究较少。提出了双分支自编码器网络(DBAE)来研究这种检索的目标攻击。DBAE 的主要目标是生成难以察觉的对抗样本作为查询图像,使深度哈希模型检索的图像在语义上与原始图像无关,与目标图像相关。大量实验证明,DBAE 可以成功地生成具有小扰动的对抗样本来误导深度哈希模型,验证了这些扰动在各种设置下的可迁移性。

关键词: 目标攻击, 深度哈希, 对抗攻击, 图像检索

Abstract:

Due to its powerful representation learning capabilities and efficient computing capabilities, deep learning-based hashing (deep hashing) methods are widely used in large-scale image retrieval.However, there are less studies on the security of deep hashing models.A dual-branch autoencoder network (DBAE) to study targeted attacks on such retrieval was proposed.The main goal of DBAE was to generate imperceptible adversarial samples as query images in order to make the images retrieved by the deep hashing model semantically irrelevant to the original image and relevant to the target image.Numerous experiments demonstrate that DBAE can successfully generate adversarial samples with small perturbations to mislead deep hashing models, and italso verifies the transferability of these perturbations under various settings.

Key words: targeted attack, deep hashing, adversarial attack, image retrieval

中图分类号: 

No Suggested Reading articles found!