Person re-identification (Re-Id) is a computer vision task useful to security-related applications of video surveillance systems. Recently it has been shown that Re-Id systems, currently based on deep neural networks, are vulnerable to adversarial attacks, some of which are based on manipulating the query image to prevent other images of the same individual from being retrieved. Whereas some ad hoc defence strategies have been proposed so far against different implementations of this kind of attack, we argue that the human-in-the-loop (HITL) approach, originally proposed for retrieval systems (including Re-Id) to improve retrieval accuracy under normal operational conditions, can also act as an effective and general defence strategy, with the notable advantage that it does not degrade accuracy in the absence of attacks, contrary to ad hoc defences. We provide empirical evidence of this fact on several benchmark data sets and state-of-the-art Re-Id models, using a simple HITL implementation based on relevance feedback algorithms.
Human-in-the-Loop Person Re-Identification as a Defence Against Adversarial Attacks
Delussu, Rita
;Putzu, Lorenzo;Ledda, Emanuele;Fumera, Giorgio
2024-01-01
Abstract
Person re-identification (Re-Id) is a computer vision task useful to security-related applications of video surveillance systems. Recently it has been shown that Re-Id systems, currently based on deep neural networks, are vulnerable to adversarial attacks, some of which are based on manipulating the query image to prevent other images of the same individual from being retrieved. Whereas some ad hoc defence strategies have been proposed so far against different implementations of this kind of attack, we argue that the human-in-the-loop (HITL) approach, originally proposed for retrieval systems (including Re-Id) to improve retrieval accuracy under normal operational conditions, can also act as an effective and general defence strategy, with the notable advantage that it does not degrade accuracy in the absence of attacks, contrary to ad hoc defences. We provide empirical evidence of this fact on several benchmark data sets and state-of-the-art Re-Id models, using a simple HITL implementation based on relevance feedback algorithms.File | Dimensione | Formato | |
---|---|---|---|
Versione-IRIS-combinato.pdf
embargo fino al 25/01/2025
Descrizione: conference paper
Tipologia:
versione post-print
Dimensione
433.05 kB
Formato
Adobe PDF
|
433.05 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.