Person re-identification (Re-Id) is a computer vision task useful to security-related applications of video surveillance systems. Recently it has been shown that Re-Id systems, currently based on deep neural networks, are vulnerable to adversarial attacks, some of which are based on manipulating the query image to prevent other images of the same individual from being retrieved. Whereas some ad hoc defence strategies have been proposed so far against different implementations of this kind of attack, we argue that the human-in-the-loop (HITL) approach, originally proposed for retrieval systems (including Re-Id) to improve retrieval accuracy under normal operational conditions, can also act as an effective and general defence strategy, with the notable advantage that it does not degrade accuracy in the absence of attacks, contrary to ad hoc defences. We provide empirical evidence of this fact on several benchmark data sets and state-of-the-art Re-Id models, using a simple HITL implementation based on relevance feedback algorithms.

Human-in-the-Loop Person Re-Identification as a Defence Against Adversarial Attacks

Delussu, Rita
;
Putzu, Lorenzo;Ledda, Emanuele;Fumera, Giorgio
2024-01-01

Abstract

Person re-identification (Re-Id) is a computer vision task useful to security-related applications of video surveillance systems. Recently it has been shown that Re-Id systems, currently based on deep neural networks, are vulnerable to adversarial attacks, some of which are based on manipulating the query image to prevent other images of the same individual from being retrieved. Whereas some ad hoc defence strategies have been proposed so far against different implementations of this kind of attack, we argue that the human-in-the-loop (HITL) approach, originally proposed for retrieval systems (including Re-Id) to improve retrieval accuracy under normal operational conditions, can also act as an effective and general defence strategy, with the notable advantage that it does not degrade accuracy in the absence of attacks, contrary to ad hoc defences. We provide empirical evidence of this fact on several benchmark data sets and state-of-the-art Re-Id models, using a simple HITL implementation based on relevance feedback algorithms.
2024
978-3-031-51022-9
978-3-031-51023-6
Person Re-Identification; Adversarial Attack; Defence Strategy; Human-in-the-loop
File in questo prodotto:
File Dimensione Formato  
Versione-IRIS-combinato.pdf

embargo fino al 25/01/2025

Descrizione: conference paper
Tipologia: versione post-print
Dimensione 433.05 kB
Formato Adobe PDF
433.05 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11584/388523
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact