Skip to main content
Erschienen in: The Journal of Supercomputing 17/2022

08.06.2022

Exploiting vulnerability of convolutional neural network-based gait recognition system

verfasst von: Maryam Bukhari, Mehr Yahya Durrani, Saira Gillani, Sadaf Yasmin, Seungmin Rho, Sang-Soo Yeo

Erschienen in: The Journal of Supercomputing | Ausgabe 17/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s era of advanced technologies, the concerns related to global security have led to video surveillance gadgets. Human gait recognition as a biometric is considered an evolving technology for intelligent surveillance monitoring. This research study exploits vulnerabilities associated with a convolutional neural network (CNN)-based gait recognition system under various walking conditions involving clothing, carrying items, and speed. In the first stage, we design a CNN model capable of identifying individuals based on their gait characteristics. Subsequently, in the next stage, we design a five-pixel adversarial attack in which we perturb the gait features of individuals computed using the fast gradient sign method. The resulting perturbation is added to only five random pixels to create naturalistic adversarial samples similar to the original samples. Further, the main aim of this study is to determine and analyze the performance of the CNN-based gait recognition system under an adversarial attack. The research concludes that gait recognition systems based on CNN models are highly susceptible to adversarial attacks, motivating researchers to design defense mechanisms to mitigate the effect of these attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Galvez RL, Bandala AA, Dadios EP, Vicerra RRP, Maningo JMZ (2018) Object detection using convolutional neural networks. In: TENCON 2018–2018 IEEE Region 10 Conference, IEEE, pp 2023–2027 Galvez RL, Bandala AA, Dadios EP, Vicerra RRP, Maningo JMZ (2018) Object detection using convolutional neural networks. In: TENCON 2018–2018 IEEE Region 10 Conference, IEEE, pp 2023–2027
2.
Zurück zum Zitat Sun W, Wang R (2018) Fully convolutional networks for semantic segmentation of very high resolution remotely sensed images combined with DSM. IEEE Geosci Remote Sens Lett 15(3):474–478CrossRef Sun W, Wang R (2018) Fully convolutional networks for semantic segmentation of very high resolution remotely sensed images combined with DSM. IEEE Geosci Remote Sens Lett 15(3):474–478CrossRef
3.
Zurück zum Zitat Tian Y, Cheng G, Gelernter J, Yu S, Song C, Yang B (2020) Joint temporal context exploitation and active learning for video segmentation. Pattern Recogn 100:107158CrossRef Tian Y, Cheng G, Gelernter J, Yu S, Song C, Yang B (2020) Joint temporal context exploitation and active learning for video segmentation. Pattern Recogn 100:107158CrossRef
4.
Zurück zum Zitat Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097–1105 Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097–1105
5.
Zurück zum Zitat Liu F, Shen C, Lin G (2015) Deep convolutional neural fields for depth estimation from a single image. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 5162–5170 Liu F, Shen C, Lin G (2015) Deep convolutional neural fields for depth estimation from a single image. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 5162–5170
6.
Zurück zum Zitat Maqsood M, Yasmin S, Mehmood I, Bukhari M, Kim M (2021) An Efficient DA-net architecture for lung nodule segmentation. Mathematics 9(13):1457CrossRef Maqsood M, Yasmin S, Mehmood I, Bukhari M, Kim M (2021) An Efficient DA-net architecture for lung nodule segmentation. Mathematics 9(13):1457CrossRef
7.
Zurück zum Zitat Maqsood M, Bukhari M, Ali Z, Gillani S, Mehmood I, Rho S, Jung Y (2021) A residual-learning-based multi-scale parallel-convolutions-assisted efficient CAD system for liver tumor detection. Mathematics 9(10):1133CrossRef Maqsood M, Bukhari M, Ali Z, Gillani S, Mehmood I, Rho S, Jung Y (2021) A residual-learning-based multi-scale parallel-convolutions-assisted efficient CAD system for liver tumor detection. Mathematics 9(10):1133CrossRef
8.
Zurück zum Zitat Ali Z, Irtaza A, Maqsood M (2021) An IOMT assisted lung nodule segmentation using enhanced receptive field-based modified UNet. Pers Ubiquitous Comput:1–15 Ali Z, Irtaza A, Maqsood M (2021) An IOMT assisted lung nodule segmentation using enhanced receptive field-based modified UNet. Pers Ubiquitous Comput:1–15
9.
Zurück zum Zitat Nawaz H, Maqsood M, Afzal S, Aadil F, Mehmood I, Rho S (2020) A deep feature-based real-time system for Alzheimer disease stage detection. Multimed Tools Appl:1–19 Nawaz H, Maqsood M, Afzal S, Aadil F, Mehmood I, Rho S (2020) A deep feature-based real-time system for Alzheimer disease stage detection. Multimed Tools Appl:1–19
10.
Zurück zum Zitat Ramadhani AM, Goo HS (2017) Twitter sentiment analysis using deep learning methods. In: 2017 7th International Annual Engineering Seminar (InAES), IEEE, pp 1–4 Ramadhani AM, Goo HS (2017) Twitter sentiment analysis using deep learning methods. In: 2017 7th International Annual Engineering Seminar (InAES), IEEE, pp 1–4
11.
Zurück zum Zitat Zhang Z, He Q, Gao J, Ni M (2018) A deep learning approach for detecting traffic accidents from social media data. Transp Res Part C Emerging Technol 86:580–596CrossRef Zhang Z, He Q, Gao J, Ni M (2018) A deep learning approach for detecting traffic accidents from social media data. Transp Res Part C Emerging Technol 86:580–596CrossRef
12.
Zurück zum Zitat Yasir M, Durrani MY, Afzal S, Maqsood M, Aadil F, Mehmood I, Rho S (2019) An intelligent event-sentiment-based daily foreign exchange rate forecasting system. Appl Sci 9(15):2980CrossRef Yasir M, Durrani MY, Afzal S, Maqsood M, Aadil F, Mehmood I, Rho S (2019) An intelligent event-sentiment-based daily foreign exchange rate forecasting system. Appl Sci 9(15):2980CrossRef
13.
Zurück zum Zitat Yuan L, Qu Z, Zhao Y, Zhang H, Nian Q (2017) A convolutional neural network based on TensorFlow for face recognition. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), IEEE, pp 525–529 Yuan L, Qu Z, Zhao Y, Zhang H, Nian Q (2017) A convolutional neural network based on TensorFlow for face recognition. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), IEEE, pp 525–529
14.
Zurück zum Zitat Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Appl 21(3):783–802MathSciNetCrossRef Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Appl 21(3):783–802MathSciNetCrossRef
15.
Zurück zum Zitat Wani MA, Bhat FA, Afzal S, Khan AI (2020) Supervised deep learning in fingerprint recognition. In: Advances in Deep Learning. Springer, pp 111–132 Wani MA, Bhat FA, Afzal S, Khan AI (2020) Supervised deep learning in fingerprint recognition. In: Advances in Deep Learning. Springer, pp 111–132
16.
Zurück zum Zitat Lee TK, Belkhatir M, Sanei S (2014) A comprehensive review of past and present vision-based techniques for gait recognition. Multimed Tools Appl 72(3):2833–2869CrossRef Lee TK, Belkhatir M, Sanei S (2014) A comprehensive review of past and present vision-based techniques for gait recognition. Multimed Tools Appl 72(3):2833–2869CrossRef
17.
Zurück zum Zitat Yang SX, Larsen PK, Alkjær T, Simonsen EB, Lynnerup N (2014) Variability and similarity of gait as evaluated by joint angles: implications for forensic gait analysis. J For Sci 59(2):494–504 Yang SX, Larsen PK, Alkjær T, Simonsen EB, Lynnerup N (2014) Variability and similarity of gait as evaluated by joint angles: implications for forensic gait analysis. J For Sci 59(2):494–504
18.
Zurück zum Zitat BenAbdelkader C, Cutler R, Davis L (2002) Stride and cadence as a biometric in automatic person identification and verification. In: Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, IEEE, pp 372–377 BenAbdelkader C, Cutler R, Davis L (2002) Stride and cadence as a biometric in automatic person identification and verification. In: Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, IEEE, pp 372–377
19.
Zurück zum Zitat Alotaibi M, Mahmood A (2017) Improved gait recognition based on specialized deep convolutional neural network. Comput Vis Image Underst 164:103–110CrossRef Alotaibi M, Mahmood A (2017) Improved gait recognition based on specialized deep convolutional neural network. Comput Vis Image Underst 164:103–110CrossRef
20.
Zurück zum Zitat Hawas AR, El-Khobby HA, Abd-Elnaby M, Abd El-Samie FE (2019) Gait identification by convolutional neural networks and optical flow. Multimed Tools Appl 78(18):25873–25888CrossRef Hawas AR, El-Khobby HA, Abd-Elnaby M, Abd El-Samie FE (2019) Gait identification by convolutional neural networks and optical flow. Multimed Tools Appl 78(18):25873–25888CrossRef
21.
Zurück zum Zitat Linda GM, Themozhi G, Bandi SR (2020) Color-mapped contour gait image for cross-view gait recognition using deep convolutional neural network. Int J Wavelets Multiresolut Inf Process 18(01):1941012MathSciNetCrossRefMATH Linda GM, Themozhi G, Bandi SR (2020) Color-mapped contour gait image for cross-view gait recognition using deep convolutional neural network. Int J Wavelets Multiresolut Inf Process 18(01):1941012MathSciNetCrossRefMATH
22.
Zurück zum Zitat Arshad H, Khan MA, Sharif MI, Yasmin M, Tavares JMR, Zhang YD, Satapathy SC (2020) A multilevel paradigm for deep convolutional neural network features selection with an application to human gait recognition. Expert Systems:e12541 Arshad H, Khan MA, Sharif MI, Yasmin M, Tavares JMR, Zhang YD, Satapathy SC (2020) A multilevel paradigm for deep convolutional neural network features selection with an application to human gait recognition. Expert Systems:e12541
23.
Zurück zum Zitat Wu X, Yang T, Xia Z (2020) Gait recognition based on densenet transfer learning. Int J Sci Environ 9(1):1–14 Wu X, Yang T, Xia Z (2020) Gait recognition based on densenet transfer learning. Int J Sci Environ 9(1):1–14
24.
Zurück zum Zitat Zhu Z-A, Lu Y-Z, Chiang C-K (2019) Generating adversarial examples by makeup attacks on face recognition. In: 2019 IEEE International Conference on Image Processing (ICIP), IEEE, pp 2516–2520 Zhu Z-A, Lu Y-Z, Chiang C-K (2019) Generating adversarial examples by makeup attacks on face recognition. In: 2019 IEEE International Conference on Image Processing (ICIP), IEEE, pp 2516–2520
25.
Zurück zum Zitat Dong Y, Su H, Wu B, Li Z, Liu W, Zhang T, Zhu J (2019) Efficient decision-based black-box adversarial attacks on face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 7714–7722 Dong Y, Su H, Wu B, Li Z, Liu W, Zhang T, Zhu J (2019) Efficient decision-based black-box adversarial attacks on face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 7714–7722
26.
Zurück zum Zitat Abiew NAK, Jnr MD, Banning SO (2020) Design and implementation of cost effective multi-factor authentication framework for ATM systems. Asian J Res Comput Sci:7–20 Abiew NAK, Jnr MD, Banning SO (2020) Design and implementation of cost effective multi-factor authentication framework for ATM systems. Asian J Res Comput Sci:7–20
27.
Zurück zum Zitat Kotia J, Kotwal A, Bharti R (2019) Risk susceptibility of brain tumor classification to adversarial attacks. In: International Conference on Man–Machine Interactions, Springer, pp 181–187 Kotia J, Kotwal A, Bharti R (2019) Risk susceptibility of brain tumor classification to adversarial attacks. In: International Conference on Man–Machine Interactions, Springer, pp 181–187
28.
Zurück zum Zitat Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn 110:107332CrossRef Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn 110:107332CrossRef
29.
Zurück zum Zitat Fawaz HI, Forestier G, Weber J, Idoumghar L, Muller P-A (2019) Adversarial attacks on deep neural networks for time series classification. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8 Fawaz HI, Forestier G, Weber J, Idoumghar L, Muller P-A (2019) Adversarial attacks on deep neural networks for time series classification. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8
31.
Zurück zum Zitat Xu J (2021) A deep learning approach to building an intelligent video surveillance system. Multimed Tools Appl 80(4):5495–5515CrossRef Xu J (2021) A deep learning approach to building an intelligent video surveillance system. Multimed Tools Appl 80(4):5495–5515CrossRef
32.
Zurück zum Zitat Jung S, Lee H, Hwang S, Shim DH (2018) Real time embedded system framework for autonomous drone racing using deep learning techniques. In: 2018 AIAA Information Systems-AIAA Infotech@ Aerospace, p 2138 Jung S, Lee H, Hwang S, Shim DH (2018) Real time embedded system framework for autonomous drone racing using deep learning techniques. In: 2018 AIAA Information Systems-AIAA Infotech@ Aerospace, p 2138
33.
Zurück zum Zitat Boles A, Rad P (2017) Voice biometrics: deep learning-based voiceprint authentication system. In: 2017 12th System of Systems Engineering Conference (SoSE), IEEE, pp 1–6 Boles A, Rad P (2017) Voice biometrics: deep learning-based voiceprint authentication system. In: 2017 12th System of Systems Engineering Conference (SoSE), IEEE, pp 1–6
35.
Zurück zum Zitat Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828–841CrossRef Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828–841CrossRef
36.
Zurück zum Zitat Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J (2017) Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 15–26 Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J (2017) Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 15–26
38.
Zurück zum Zitat Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world
39.
Zurück zum Zitat Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, pp 372–387 Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, pp 372–387
40.
Zurück zum Zitat Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp), IEEE, pp 39–57 Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp), IEEE, pp 39–57
42.
Zurück zum Zitat Li Y, Zhang H, Bermudez C, Chen Y, Landman BA, Vorobeychik Y (2020) Anatomical context protects deep learning from adversarial perturbations in medical imaging. Neurocomputing 379:370–378CrossRef Li Y, Zhang H, Bermudez C, Chen Y, Landman BA, Vorobeychik Y (2020) Anatomical context protects deep learning from adversarial perturbations in medical imaging. Neurocomputing 379:370–378CrossRef
43.
Zurück zum Zitat Cheng G, Ji H (2020) Adversarial perturbation on MRI modalities in brain tumor segmentation. IEEE Access 8:206009–206015CrossRef Cheng G, Ji H (2020) Adversarial perturbation on MRI modalities in brain tumor segmentation. IEEE Access 8:206009–206015CrossRef
47.
Zurück zum Zitat Kuppa A, Grzonkowski S, Asghar MR, Le-Khac N-A (2019) Black box attacks on deep anomaly detectors. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1–10 Kuppa A, Grzonkowski S, Asghar MR, Le-Khac N-A (2019) Black box attacks on deep anomaly detectors. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1–10
48.
Zurück zum Zitat Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805–2824MathSciNetCrossRef Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805–2824MathSciNetCrossRef
49.
Zurück zum Zitat Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, pp 582–597 Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, pp 582–597
51.
Zurück zum Zitat Liang B, Li H, Su M, Li X, Shi W, Wang X (2018) Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Transactions on Dependable and Secure Computing Liang B, Li H, Su M, Li X, Shi W, Wang X (2018) Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Transactions on Dependable and Secure Computing
52.
Zurück zum Zitat Carlini N, Wagner D (2017) Adversarial examples are not easily detected: Bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 3–14 Carlini N, Wagner D (2017) Adversarial examples are not easily detected: Bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 3–14
54.
Zurück zum Zitat Bukhari M, Bajwa KB, Gillani S, Maqsood M, Durrani MY, Mehmood I, Ugail H, Rho S (2020) An efficient gait recognition method for known and unknown covariate conditions. IEEE Access Bukhari M, Bajwa KB, Gillani S, Maqsood M, Durrani MY, Mehmood I, Ugail H, Rho S (2020) An efficient gait recognition method for known and unknown covariate conditions. IEEE Access
55.
Zurück zum Zitat Yu S, Tan D, Tan TA (2006) framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: 18th International Conference on Pattern Recognition (ICPR'06), IEEE, pp 441–444 Yu S, Tan D, Tan TA (2006) framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: 18th International Conference on Pattern Recognition (ICPR'06), IEEE, pp 441–444
Metadaten
Titel
Exploiting vulnerability of convolutional neural network-based gait recognition system
verfasst von
Maryam Bukhari
Mehr Yahya Durrani
Saira Gillani
Sadaf Yasmin
Seungmin Rho
Sang-Soo Yeo
Publikationsdatum
08.06.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 17/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-04611-3

Weitere Artikel der Ausgabe 17/2022

The Journal of Supercomputing 17/2022 Zur Ausgabe

Premium Partner