[go: up one dir, main page]

CN113869233A - A multi-expert adversarial attack detection method based on inconsistency of contextual features - Google Patents

A multi-expert adversarial attack detection method based on inconsistency of contextual features Download PDF

Info

Publication number
CN113869233A
CN113869233A CN202111156899.2A CN202111156899A CN113869233A CN 113869233 A CN113869233 A CN 113869233A CN 202111156899 A CN202111156899 A CN 202111156899A CN 113869233 A CN113869233 A CN 113869233A
Authority
CN
China
Prior art keywords
image
adversarial
support
benign
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111156899.2A
Other languages
Chinese (zh)
Inventor
刘敏
张铸
王学平
汪嘉正
王耀南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan University
Original Assignee
Hunan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan University filed Critical Hunan University
Priority to CN202111156899.2A priority Critical patent/CN113869233A/en
Publication of CN113869233A publication Critical patent/CN113869233A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/53Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Image Analysis (AREA)

Abstract

本发明公开了一种基于上下文特征不一致性的多专家对抗攻击检测方法,包括步骤:建立行人重识别数据集,行人重识别数据集包括良性查询图像集、对抗查询图像集和图库;选取多个行人重识别专家模型,并将行人重识别数据集输入到多个行人重识别专家模型中,提取出行人重识别数据集中图像的图像特征;在图库中进行检索,得到支撑集;给查询图像集及其支撑集打上标签,并形成训练集;根据训练集,得到上下文特征;将上下文特征输入到对抗攻击检测器中训练;将待查询图像的上下文特征输入到对抗攻击检测器中,输出被攻击的概率,并根据输出的概率,评估对抗攻击检测器的性能;通过上下文特征训练对抗攻击检测器,可成功检测得到对抗训练样本的攻击方法。

Figure 202111156899

The invention discloses a multi-expert confrontation attack detection method based on the inconsistency of context features, comprising the steps of: establishing a pedestrian re-identification data set, the pedestrian re-identification data set including a benign query image set, an confrontation query image set and a gallery; selecting a plurality of The pedestrian re-identification expert model is used, and the pedestrian re-identification data set is input into multiple pedestrian re-identification expert models to extract the image features of the images in the pedestrian re-identification data set; search in the gallery to obtain the support set; give the query image set and its support set are labeled, and form a training set; according to the training set, contextual features are obtained; the contextual features are input into the adversarial attack detector for training; the contextual features of the image to be queried are input into the adversarial attack detector, and the output is attacked and evaluate the performance of the adversarial attack detector according to the probability of the output; the adversarial attack detector can be successfully detected by training the adversarial attack detector through the context feature, and the attack method of the adversarial training sample can be successfully detected.

Figure 202111156899

Description

Multi-expert anti-attack detection method based on context feature inconsistency
Technical Field
The invention belongs to the field of pedestrian re-identification counterattack detection, and particularly relates to a multi-expert counterattack detection method based on context feature inconsistency.
Background
The success of Deep Neural Networks (DNNs) has benefited many computer vision tasks, particularly the pedestrian identification (ReID) task. ReID is a key task aimed at retrieving pedestrians through multiple non-overlapping cameras. Through the significant feature learning and the metric learning, the accuracy rate in video monitoring and crime identification can be improved by the ReID model based on the deep neural network. However, the ReID model inherits the vulnerability of DNN to the antagonistic sample, i.e. a slightly perturbed input image, which can result in the DNN making a wrong prediction. Therefore, testing challenge samples is a basic requirement for stabilization of the ReID system. However, ReID is defined as a ranking problem, unlike the classification task where the training set and the test set share the same category, there is no category overlap between the two sets in ReID. Therefore, the existing anti-attack detection method for image classification is not suitable for the ReID problem.
Disclosure of Invention
The invention aims to overcome the defect that the prior art cannot effectively detect and defend the counterattack in the task of re-identifying pedestrians, and provides a multi-expert counterattack detection method based on the inconsistency of contextual characteristics.
The invention provides a multi-expert anti-attack detection method based on context feature inconsistency, which comprises the following steps:
in the training phase, the training phase is carried out,
s1: establishing a pedestrian re-identification data set, wherein the pedestrian re-identification data set comprises a query image set and a gallery; the query image set comprises a benign query image set and a confrontational query image set;
s2: selecting a plurality of pedestrian re-identification expert models, inputting the benign query image set, the confrontation query image set and the gallery in the S1 into the plurality of pedestrian re-identification expert models, and extracting image features in the benign query image set, the confrontation query image set and the gallery; searching in a gallery by adopting a query image set, and taking a set of search results as a support set of the query image set; wherein the support set of the benign query image set is a benign support set, and the support set of the confrontation query image set is a confrontation support set;
s3: labeling the characteristics of the benign query image set and the benign support set, and forming a benign training set according to the labels on the characteristics; labeling the characteristics of the confrontation query image set and the confrontation support set, and forming a confrontation training set according to the labels on the characteristics;
s4: obtaining context characteristics according to the benign training set and the confrontation training set; inputting the context characteristics into a multi-layer perceptron for training, and taking the multi-layer perceptron as an anti-attack detector;
in the application phase, the application phase is,
s5: establishing a pedestrian re-identification test set, acquiring an image to be inquired in the pedestrian re-identification test set, inputting the image to be inquired into a plurality of pedestrian re-identification expert models, and extracting context characteristics of the image to be inquired;
s6: inputting the context characteristics of the image to be queried into a counter attack detector, wherein the counter attack detector outputs the attacked probability;
s7: and evaluating the performance of the anti-attack detector according to the output result of the anti-attack detector on the pedestrian re-identification test set.
Preferably, in S1, the benign query image set includes benign query samples, and the benign query samples are query samples of a training set in the pedestrian re-identification benchmark test data set; the challenge query image set interferes the benign query image set by adopting a challenge attack method, so that a challenge query sample is generated; the gallery comprises gallery samples, images of pedestrians are randomly selected from the training set in the Market1501 data set to serve as query image samples, and unselected images serve as gallery samples.
Preferably, S2 includes the steps of:
s2.1: inputting the benign query image set, the confrontation query image set and the gallery in S1Re-identifying the expert models to a plurality of pedestrians; by using Fn(. N) is a function of the nth pedestrian re-identification expert model, and F is adoptedn(I) The image characteristics of a benign query image set, the image characteristics of a confrontation query image set and the image characteristics of a map library extracted by the nth pedestrian re-identification expert model are referred to;
s2.2: calculating the distance between the image features of the query image set and the image features of the gallery according to the image features in the S2.1, returning K images of the image features of the gallery with the closest distance to the image features of the query image set, taking the set of the K images as a support set of the query image set, and recording the support set as Sn={Sn,jJ ═ 1,. K }; n represents the nth pedestrian re-identification expert model, and j represents the jth image in the support set;
preferably, in S3, the features of the benign query image set and the benign support set are labeled with a label y00 and forming a benign training set according to the labels on the features, wherein the benign training set is recorded as { (x)i,y0) 1,. M }; labeling the features of the confrontation query image set and the confrontation support set with a label of y 11 and forming a confrontation training set according to the labels on the features, wherein the confrontation training set is marked as { (x)i,y1) 1,. M }; where M is the size of the benign training set or the antagonistic training set.
Preferably, in S4, the context features include query-support neighbor features, support-support neighbor features, and cross-expert neighbor features.
Preferably, the step of obtaining the contextual characteristics comprises:
s4.1: according to the benign training set and the confrontation training set, calculating the characteristics of the image I in the query image set and the corresponding support concentrated image S in each pedestrian re-identification expert modeljCosine similarity A 'between features of'q-sIdentifying again a 'of expert models for a plurality of pedestrians'q-sStack derived query-support neighbor feature Aq-s
To obtain A'q-sThe calculation formula of (2) is as follows:
A'q-s[j]=CosSimilarity(F(I),F(Sj))
wherein F (I) represents the image characteristics of the query image set in the expert model for pedestrian re-identification, F (S)j) Re-identifying the image characteristics of the jth image of the support set corresponding to the query image set in the expert model for the pedestrian; a'q-sStacking to obtain N x K dimensionality inquiry-support neighbor characteristic Aq-s,Aq-sA two-dimensional matrix is formed; n is the number of pedestrian re-identification expert models, and K is the number of support concentrated images;
s4.2: according to the benign training set and the confrontation training set, calculating cosine similarity A between the feature of the ith image in the support set and the feature of the jth image in the support set in each pedestrian re-recognition expert model1 s-s[i,j](ii) a Re-identifying A in expert model for multiple pedestrians1 s-s[i,j]Stacked supported-supported neighbor feature A1 s-s
To obtain A1 s-s[i,j]The calculation formula of (2) is as follows:
A1 s-s[i,j]=CosSimilarity(F(Si),F(Sj))
wherein, F (S)i) Image features expressed as the ith image of the support set, F (S)j) Image features represented as the jth image of the support set; a. the1 s-sFor K x K dimensional matrices, keep K x (K-1)/2 elements in the upper right (lower left) matrix;
s4.3: a in S4.21 s-sLeft-up (left-down) matrix elements of (c) to a new vector A's-s[i,j]And then identifying A 'in the expert models by the pedestrians's-s[i,j]Stacking results in a new support-support neighbor feature As-s;A's-s[i,j]The dimension of (a) is K' ═ K (K-1)/2; a. thes-sHas the dimension of N x K', As-sA two-dimensional matrix is formed;
s4.4: taking the nth pedestrian re-identification expert model as a basic model, calculating the frequency of the jth image of the support set in the basic model appearing in the support sets in other pedestrian re-identification expert models, and recording the frequency as Ac-e[n,j]Finally, cross-expert neighbor feature A is obtainedc-e
Ac-e[n,j]The calculation formula of (2) is as follows:
Figure BDA0003288944080000031
wherein n is represented as the nth pedestrian re-identification expert model, F (-) is an indicator function, when the parameter is true, 1 is output, otherwise 0 is output; slA set of support sets representing remaining pedestrian re-identification expert models excluding the base model; a. thec-eHas a dimension of N x K, Ac-eA two-dimensional matrix is formed;
s4.5: a is to beq-s,As-s,Ac-eReducing the two-dimensional matrix into a one-dimensional vector, and reducing A of the one-dimensional vectorq-s,As-s,Ac-eConnecting to obtain a context feature x of a single query image sample, wherein the dimension of x is d, and d is N K + N K' + N K;
s4.6: the context features are input into the multi-layer perceptron to train, and the multi-layer perceptron is used as an anti-attack detector.
Preferably, in S6, according to the probability of being attacked output by the counter attack detector, when the probability is greater than a set probability threshold, the image to be queried is a counter query sample, otherwise, the image is a benign query sample.
Preferably, in S7, the performance of the countering attack detector is evaluated according to the output result of the countering detector for the pedestrian re-identification test set, and using the classification precision, the area under the receiver operation characteristic curve, and the harmonic mean value of the determination precision and the recall rate.
Preferably, the counterattack method includes a deep misordering counterattack method and a hostile template counterattack method.
Has the advantages that:
1. according to the method, the ReID networks with different architectures are used as expert models in the scheme, the context inconsistent features are extracted, the multi-layer perceptron is trained to detect the counterattack to the ReID system, and the problem of stability when the ReID system encounters the counterattack method can be effectively solved.
2. The context characteristics based on the context inconsistency, provided by the invention, more effectively utilize rich information contained in top-K retrieval obtained by the output of the ReID system, more fully excavate the context inconsistency of the result output by the ReID system caused by the anti-attack sample under the comparison with benign query samples, wherein the context inconsistency comprises the inconsistency of the characteristic distance between the anti-query image and the top-K retrieval thereof with the benign query image, the inconsistency of the distance between images in a support set of the anti-query image with the benign query image, the inconsistency of top-K retrieval of the benign query image obtained by a plurality of expert ReID models with the anti-query image, and the like, and the success rate of anti-attack detection is improved.
3. The invention obtains the context characteristics through the benign training set and the countertraining set, thereby training the attack counterattack detector, not only successfully detecting the counterattack method of the countertraining sample, but also effectively defending other counterattack methods, and having adaptability aiming at different counterattack methods.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a multi-expert attack-fight detection method in the implementation of the present invention.
FIG. 2 is a logic diagram of a multi-expert attack-fighting detection method in the implementation of the present invention.
Fig. 2a is a view of a portion in fig. 2.
Fig. 2b is a view of the portion b in fig. 2.
Fig. 2c is a view of the portion c in fig. 2.
Fig. 2d is a view of the portion d in fig. 2.
FIG. 3 shows top-10 support set results obtained by five pedestrian re-identification expert models before and after an image sample is queried.
FIG. 4 is a diagram illustrating the distribution of AlignedReID expert model query image samples and support sets in feature space in the practice of the present invention.
FIG. 5a is a schematic view of a query-support relationship.
Fig. 5b is a schematic view of the support-support relationship.
FIG. 5c is a cross-expert support relationship diagram.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For resisting attack, in a person re-identification (ReID) problem, an attacker aims to enable a ReID system to retrieve a person image with a wrong identity, and in the embodiment, the attacker is assumed to attack the ReID system by disturbing an inquiry image; when the countermeasures sample deception ReID system causes retrieval of wrong images from its library set, confusing retrieval results are caused, in the embodiment, the first K retrieval results returned by the ReID system are defined as support sets, each retrieval result in the support sets is defined as a support sample, and the support set of the normal query example is called a benign support set, and the support set of the disturbance query example is called a countermeasures support set;
as shown in fig. 1, fig. 2a, fig. 2b, fig. 2c, and fig. 2d, the method for detecting multi-expert counterattack based on context feature inconsistency according to this embodiment includes the following steps:
in the training phase, the training phase is carried out,
s1: establishing a pedestrian re-identification data set, wherein the pedestrian re-identification data set comprises a query image set and a gallery; the query image set comprises a benign query image set and a confrontational query image set;
the benign query image set comprises benign query samples, and the benign query samples adopt query samples of a training set in a pedestrian re-identification benchmark test data set (in the embodiment, a Market1501 data set); the training set contains 12936 cropped images of 751 total pedestrian identities, and the image resolution is 64x 128; the countercheck query image set adopts a countercheck attack method to interfere the benign query image set so as to generate countercheck query samples, and in the embodiment, two countercheck attack methods, namely a deep Mis-ordering countercheck attack method (deep gas-ranking) and an adversary template countercheck attack method (advPattern), are adopted; the gallery comprises a gallery sample, an image of a pedestrian is randomly selected as a query image sample in a training set in the Market1501 data set, and an unselected image is used as the gallery sample; no samples of the query image set are separated from the gallery samples of the gallery in the training set;
s2: selecting a plurality of pedestrian re-identification expert models, inputting the benign query image set, the confrontation query image set and the gallery in the S1 into the plurality of pedestrian re-identification expert models, and extracting image features in the benign query image set, the confrontation query image set and the gallery; searching in a gallery by adopting a query image set, and taking a set of search results as a support set of the query image set; wherein the support set of the benign query image set is a benign support set, and the support set of the confrontation query image set is a confrontation support set;
s2.1: inputting the benign query image set, the confrontation query image set and the gallery in the S1 into a plurality of pedestrian re-identification expert models; by using Fn(. N) is a function of the nth pedestrian re-identification expert model, and F is adoptedn(I) The image characteristics of a benign query image set, the image characteristics of a confrontation query image set and the image characteristics of a map library extracted by the nth pedestrian re-identification expert model are referred to;
s2.2: calculating the distance between the image features of the query image set and the image features of the gallery according to the image features in the S2.1, returning K images of the image features of the gallery with the closest distance to the image features of the query image set, taking the set of the K images as a support set of the query image set, and recording the support set as Sn={Sn,jJ ═ 1,. K }; n represents the nth pedestrian re-identification expert modelJ denotes the jth image in the support set;
s3: labeling the characteristics of the benign query image set and the benign support set with the label of y00 and forming a benign training set according to the labels on the features, wherein the benign training set is recorded as { (x)i,y0) 1,. M }; labeling the features of the confrontation query image set and the confrontation support set with a label of y 11 and forming a confrontation training set according to the labels on the features, wherein the confrontation training set is marked as { (x)i,y1) 1,. M }; wherein M is the size of the benign training set or the antagonistic training set;
s4: obtaining context characteristics according to the benign training set and the confrontation training set; inputting the context characteristics into a multi-layer perceptron for training, and taking the multi-layer perceptron as an anti-attack detector; the context features include query-support neighbor features, support-support neighbor features, and cross-expert neighbor features;
s4.1: according to the benign training set and the confrontation training set, calculating the characteristics of the image I in the query image set and the corresponding support concentrated image S in each pedestrian re-identification expert modeljCosine similarity A 'between features of'q-sIdentifying again a 'of expert models for a plurality of pedestrians'q-sStack derived query-support neighbor feature Aq-s
To obtain A'q-sThe calculation formula of (2) is as follows:
A'q-s[j]=CosSimilarity(F(I),F(Sj))
wherein F (I) represents the image characteristics of the query image set in the expert model for pedestrian re-identification, F (S)j) Re-identifying the image characteristics of the jth image of the support set corresponding to the query image set in the expert model for the pedestrian; a'q-sStacking to obtain N x K dimensionality inquiry-support neighbor characteristic Aq-s,Aq-sA two-dimensional matrix is formed; n is the number of pedestrian re-identification expert models, and K is the number of support concentrated images;
the pedestrian re-identification expert model adopts four candidate models with superior performance acquired from a Market1501 data set, namely a PCB (printed Circuit Board), an AlignedReiD (AR), a HACNN (Hacnn) and an LSRO (false least squares) as a pedestrian re-identification expert model;
the formula for cosine similarity is:
Figure BDA0003288944080000071
wherein A ist,BtThe t-th dimension values of the vectors A and B are respectively;
s4.2: according to the benign training set and the confrontation training set, calculating cosine similarity A between the feature of the ith image in the support set and the feature of the jth image in the support set in each pedestrian re-recognition expert model1 s-s[i,j](ii) a Re-identifying A in expert model for multiple pedestrians1 s-s[i,j]Stacked supported-supported neighbor feature A1 s-s
To obtain A1 s-s[i,j]The calculation formula of (2) is as follows:
A1 s-s[i,j]=CosSimilarity(F(Si),F(Sj))
wherein, F (S)i) Image features expressed as the ith image of the support set, F (S)j) Image features represented as the jth image of the support set; a. the1 s-sThe matrix is a K-K dimensional matrix, the elements of the matrix are uniform, the matrix is a symmetrical matrix, the diagonal elements are always 1, and K-1/2 elements are kept in an upper right (lower left) matrix;
s4.3: a in S4.21 s-sLeft-up (left-down) matrix elements of (c) to a new vector A's-s[i,j]And then identifying A 'in the expert models by the pedestrians's-s[i,j]Stacking results in a new support-support neighbor feature As-s;A's-s[i,j]The dimension of (a) is K' ═ K (K-1)/2; a. thes-sHas the dimension of N x K', As-sA two-dimensional matrix is formed;
s4.4: taking the nth pedestrian re-identification expert model as a basic model, calculating the frequency of the jth image of the support set in the basic model appearing in the support sets in other pedestrian re-identification expert models, and recording the frequency as Ac-e[n,j]Finally, cross-expert neighbor feature A is obtainedc-e
Ac-e[n,j]The calculation formula of (2) is as follows:
Figure BDA0003288944080000081
wherein n is represented as the nth pedestrian re-identification expert model, F (-) is an indicator function, when the parameter is true, 1 is output, otherwise 0 is output; slA set of support sets representing remaining pedestrian re-identification expert models excluding the base model; a. thec-eHas a dimension of N x K, Ac-eA two-dimensional matrix is formed;
s4.5: a is to beq-s,As-s,Ac-eReducing the two-dimensional matrix into a one-dimensional vector, and reducing A of the one-dimensional vectorq-s,As-s,Ac-eConnecting to obtain a context feature x of a single query image sample, wherein the dimension of x is d, and d is N K + N K' + N K;
s4.6: inputting the context characteristics into a multi-layer perceptron (MLP) for training, and taking the multi-layer perceptron as an anti-attack detector; the multi-layer perceptron comprises two hidden layers, wherein the two hidden layers comprise 512 nodes and 256 nodes, and a ReLU function is used as an activation function and is used as a binary classification problem for training;
in the training of the multilayer perceptron, an SGD optimizer with momentum of 0.9 is adopted for training, and the learning rate is 1 e-4; the multi-layer perceptron training is completed after 5000 iterations, the batch processing size is set to 1024 times, and a pyroch frame is adopted on the NVIDIA GTX 2080TI GPU;
in the application phase, the application phase is,
s5: establishing a pedestrian re-identification test set, acquiring an image to be inquired in the pedestrian re-identification test set, inputting the image to be inquired into a plurality of pedestrian re-identification expert models, and extracting context characteristics of the image to be inquired;
s6: inputting the context characteristics of the image to be queried into a counter attack detector, wherein the counter attack detector outputs the attacked probability; according to the attacked probability output by the anti-attack detector, when the probability is greater than a set probability threshold, the image to be inquired is an anti-inquiry sample, otherwise, the image to be inquired is a benign inquiry sample; the probability threshold set in this embodiment is 0.5;
s7: the performance of the counter attack detector is evaluated according to the output result of the counter attack detector for the pedestrian re-identification test set, and by adopting the classification precision (Acc), the area under the receiver operation characteristic curve (AUC) and the harmonic mean value of the judgment precision and the recall rate (F1).
The specific performance of the application phase anti-attack detection method is shown by the following three tables:
table 1: the detection performance of the different numbers of pedestrian re-recognition expert models on the Market1501 data set against the resistant attacks;
expert model Acc(%) AUC(%) F1(%)
AR* 95.2 99.1 95.5
AR*+PCB 97.8 99.7 97.9
AR*+PCB+LSRO 98.4 99.8 98.4
AR*+PCB+LSRO+HACNN 98.5 99.8 98.6
As can be seen from table 1, more pedestrian re-identification expert models have better detection performance, that is, more pedestrian re-identification expert models bring more context features, so that the extracted context features can distinguish benign samples from confrontation samples;
table 2: the attack target model is used/not used on the Market1501 data set as the adversarial attack detection performance of the pedestrian re-identification expert model;
expert model Acc(%) AUC(%) F1(%)
AR* 95.2 99.1 95.5
AR*+PCB+LSRO+HACNN 98.5 99.8 98.6
PCB 88.2 95.1 88.7
PCB+LSRO 93.7 98.5 93.9
PCB+LSRO+HACNN 94.2 98.5 94.2
As can be seen from table 2, the number indicates the known anti-attack target model of the anti-attack method, and it can be seen in the table that it is beneficial to use the attack target model as one of the pedestrian re-identification expert models;
table 3: the detection performance of the antagonistic attacks with different numbers of support sets on the Market1501 data set;
number of support set searches Acc(%) AUC(%) F1(%)
K=1 92.3 99.2 92.9
K=5 94.4 99.7 94.7
K=10 97.5 99.8 97.6
K=15 98.5 99.8 98.6
K=20 98.5 99.8 98.5
K=20 98.5 99.8 98.6
As can be seen from table 3, the attack detection performance was evaluated when K ═ 1, 5, 10, 15, 20, 30, where K ═ 1 indicates that there is no support-support neighbor feature, and only the query-support neighbor feature and cross-expert neighbor feature functions were used; it can be seen that using a larger support set can provide a better attack detection rate, and when K is 15, a detection accuracy of 98.5% is achieved, which is 6.2% higher than that of K1; and table 1 and table 2 were evaluated using K15.
As shown in fig. 3, the top-10 benign support set results obtained by the five pedestrian re-identification expert models before and after the benign query sample is attacked; in this embodiment, a Deep Mis-ranking attack method is adopted, and an aligndreid expert model is adopted as an attack object.
As shown in fig. 4, the benign query sample (corresponding to the benign sample in the graph) is marked with a diamond pattern, and the search result (corresponding to the benign support sample in the graph) is marked with a snowflake pattern; the confrontation query sample (confrontation sample in the corresponding graph) is marked by a square pattern, and the retrieval result of the confrontation query sample (confrontation support sample in the corresponding graph) is marked by a circular pattern; as can be seen from the figure, in the embedding space, the retrieval results of the benign query samples are tightly clustered around the benign query samples, while the retrieval results of the countermeasure query samples are more dispersed.
As shown in fig. 5a, 5b, and 5c, in fig. 5a, the left peak is a disturbance sample, the right peak is a benign sample, and the query-support relationship is defined as an average value of cosine similarities between the features of the benign query sample (corresponding to the benign sample in the figure), the features of the countermeasure query sample (corresponding to the disturbance sample in the figure), and the image features of the support set, respectively; as can be seen from the graph, a challenge query sample generally has lower similarity to its support set in feature space than a benign query sample; in fig. 5b, the left peak is a disturbance sample, the right peak is a benign sample, and the support-support relationship is defined as the average value of cosine similarity between image features of the support set of each query image in the same support set, and it can be seen from the figure that images of the countermeasure support set (corresponding to the disturbance samples in the figure) have lower similarity in feature space compared to images of the benign support set (corresponding to the benign samples in the figure); in FIG. 5c, the left peak is a perturbed sample and the right peak is a benign sample, described for the number of images of the common support set over all support sets; as can be seen from the figure, benign support sets returned by different pedestrian re-identification expert models are overlapped with each other greatly; for benign query samples (corresponding to benign samples in the graph), different expert models tend to return the same search;
the multi-expert attack-fighting detection method based on the context feature inconsistency provided by the embodiment has the following beneficial effects:
1. by using a plurality of ReID networks with different architectures as expert models in the scheme and extracting context inconsistent features to train the multi-layer perceptron to detect counterattack to the ReID system, the problem of stability when the ReID system encounters counterattack methods can be effectively solved.
2. The proposed context characteristics based on the context inconsistency more effectively utilize rich information contained in top-K retrieval obtained by the output of the ReID system, more fully excavate the context inconsistency of results output by the ReID system caused by the anti-attack samples under the condition of comparison with benign query samples, wherein the context inconsistency comprises inconsistency of characteristic distances between the anti-query images and top-K retrieval of the anti-query images with benign query images, inconsistency of distances between images in a support set of the anti-query images with the benign query images, inconsistency of top-K retrieval of the benign query images obtained by a plurality of expert ReID models with the anti-query images, and the like, and the success rate of anti-attack detection is improved.
3. The attack counterattack detector obtained by training the benign and counterattack samples can successfully detect the counterattack method of the counterattack training samples, can effectively defend other counterattack methods, and has adaptability to different counterattack methods.
The present invention is not limited to the above preferred embodiments, and any modification, equivalent replacement or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1.一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,包括步骤:1. a multi-expert confrontation attack detection method based on inconsistency of context features, is characterized in that, comprises the steps: 训练阶段,training phase, S1:建立行人重识别数据集,所述行人重识别数据集包括查询图像集和图库;所述查询图像集包括良性查询图像集和对抗查询图像集;S1: establish a pedestrian re-identification data set, the pedestrian re-identification data set includes a query image set and a gallery; the query image set includes a benign query image set and an adversarial query image set; S2:选取多个行人重识别专家模型,并将S1中良性查询图像集、对抗查询图像集和图库输入到多个行人重识别专家模型中,提取出良性查询图像集、对抗查询图像集和图库中的图像特征;采用查询图像集在图库中进行检索,将检索结果的集合作为查询图像集的支撑集;其中良性查询图像集的支撑集为良性支撑集,对抗查询图像集的支撑集为对抗支撑集;S2: Select multiple person re-identification expert models, and input the benign query image set, adversarial query image set and gallery in S1 into multiple person re-identification expert models, and extract the benign query image set, adversarial query image set and gallery The image features in the query image set are used for retrieval in the gallery, and the set of retrieval results is used as the support set of the query image set; the support set of the benign query image set is the benign support set, and the support set of the adversarial query image set is the adversarial set. support set; S3:给良性查询图像集和良性支撑集的特征打上标签,并根据特征上的标签形成良性训练集;给对抗查询图像集和对抗支撑集的特征打上标签,并根据特征上的标签形成对抗训练集;S3: Label the features of the benign query image set and the benign support set, and form a benign training set according to the labels on the features; label the features of the adversarial query image set and the adversarial support set, and form adversarial training according to the labels on the features set; S4:根据所述良性训练集和对抗训练集,得到上下文特征;将上下文特征输入到多层感知器中训练,将多层感知器作为对抗攻击检测器;S4: obtain contextual features according to the benign training set and the confrontational training set; input the contextual features into the multi-layer perceptron for training, and use the multi-layer perceptron as an adversarial attack detector; 应用阶段,application phase, S5:建立行人重识别测试集,在行人重识别测试集内获取待查询的图像,并将待查询的图像输入到多个行人重识别专家模型中,提取出待查询图像的上下文特征;S5: establish a pedestrian re-identification test set, obtain the image to be queried in the pedestrian re-identification test set, and input the to-be-queried image into a plurality of pedestrian re-identification expert models to extract the contextual features of the to-be-queried image; S6:将待查询图像的上下文特征输入到对抗攻击检测器中,对抗攻击检测器将输出被攻击的概率;S6: Input the contextual features of the image to be queried into the adversarial attack detector, and the adversarial attack detector will output the probability of being attacked; S7:根据对抗检测器对于行人重识别测试集的输出结果,评估对抗攻击检测器的性能。S7: Evaluate the performance of the adversarial attack detector based on the output of the adversarial detector for the pedestrian re-identification test set. 2.根据权利要求1所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S1中,所述良性查询图像集包括良性查询样本,所述良性查询样本采用行人重识别基准测试数据集中训练集的查询样本;所述对抗查询图像集采用对抗攻击方法干扰良性查询图像集,从而产生对抗查询样本;所述图库包括图库样本,在Market1501数据集中的训练集随机选择一个行人的图像作为查询图像样本,则未被选择的图像作为所述图库样本。2. A multi-expert adversarial attack detection method based on inconsistency of context features according to claim 1, characterized in that, in S1, the benign query image set comprises a benign query sample, and the benign query sample adopts the pedestrian weight. Identify the query samples of the training set in the benchmark data set; the adversarial query image set uses the adversarial attack method to interfere with the benign query image set, thereby generating adversarial query samples; the gallery includes gallery samples, and one randomly selected from the training set in the Market1501 dataset The images of pedestrians are used as query image samples, and the unselected images are used as the gallery samples. 3.根据权利要求2所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S2中,包括步骤:3. a kind of multi-expert confrontation attack detection method based on the inconsistency of context features according to claim 2, is characterized in that, in S2, comprises the step: S2.1:将S1中良性查询图像集、对抗查询图像集和图库输入到多个行人重识别专家模型;采用Fn(·),n=1,2,...,N指代第n个行人重识别专家模型的函数,采用Fn(I)指代第n个行人重识别专家模型所提取出的良性查询图像集图像特征、对抗查询图像集图像特征和图库图像特征;S2.1: Input the benign query image set, adversarial query image set and gallery in S1 into multiple person re-identification expert models; use F n ( ), n=1,2,...,N to refer to the nth The function of the individual person re-identification expert model, using F n (I) to refer to the image feature of the benign query image set, the image feature of the adversarial query image set and the image feature of the gallery extracted by the nth person re-identification expert model; S2.2:根据S2.1中的图像特征,计算查询图像集图像特征与图库图像特征的距离,返回前K个与查询图像集图像特征距离最近的图库图像特征的图像,该K个图像的集合作为查询图像集的支撑集,支撑集记为Sn={Sn,j|j=1,..K};n表示第n个行人重识别专家模型,j表示支撑集中第j个图像。S2.2: According to the image features in S2.1, calculate the distance between the image feature of the query image set and the image feature of the gallery, and return the top K images with the image feature of the gallery that are closest to the image feature of the query image set, and the K images are The set is used as the support set of the query image set, and the support set is denoted as Sn = {S n ,j |j=1,..K}; n represents the nth person re-identification expert model, and j represents the jth image in the support set . 4.根据权利要求3所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S3中,给良性查询图像集和良性支撑集的特征打上标签,标签为y0=0,并根据特征上的标签形成良性训练集,良性训练集记为{(xi,y0)|i=1,2,..M};给对抗查询图像集和对抗支撑集的特征打上标签,标签为y1=1,并根据特征上的标签形成对抗训练集,对抗训练集记为{(xi,y1)|i=1,2,..M};其中M为良性训练集或对抗训练集的大小。4. a kind of multi-expert adversarial attack detection method based on the inconsistency of context features according to claim 3, is characterized in that, in S3, label the feature of benign query image set and benign support set, and the label is y 0 = 0, and form a benign training set according to the labels on the features. The benign training set is recorded as {(x i ,y 0 )|i=1,2,..M}; mark the features of the adversarial query image set and adversarial support set with Label, the label is y 1 =1, and the adversarial training set is formed according to the label on the feature, and the adversarial training set is recorded as {(x i ,y 1 )|i=1,2,..M}; where M is benign training set or adversarial training set size. 5.根据权利要求4所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S4中,所述上下文特征包括查询-支撑近邻特征、支撑-支撑近邻特征以及跨专家近邻特征。5. A multi-expert confrontation attack detection method based on inconsistency of context features according to claim 4, wherein in S4, the context features include query-support neighbor features, support-support neighbor features, and cross-expert features Neighbor features. 6.根据权利要求5所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,得到所述上下文特征的步骤包括:6. a kind of multi-expert confrontation attack detection method based on inconsistency of context features according to claim 5, is characterized in that, the step of obtaining described context features comprises: S4.1:根据所述良性训练集和对抗训练集,计算每个行人重识别专家模型中查询图像集中图像I的特征与其对应的支撑集中图像Sj的特征之间的余弦相似性A'q-s,将多个行人重识别专家模型的A'q-s堆叠得到查询-支撑近邻特征Aq-sS4.1: According to the benign training set and the adversarial training set, calculate the cosine similarity A' qs between the features of the image I in the query image set and the features of the corresponding image S j in the support set in each person re-identification expert model , stacking the A' qs of multiple person re-identification expert models to obtain the query-support nearest neighbor feature A qs ; 得到A'q-s的计算公式为:The formula for obtaining A' qs is: A'q-s[j]=CosSimilarity(F(I),F(Sj))A' qs [j]=CosSimilarity(F(I),F(S j )) 其中,F(I)表示为行人重识别专家模型中查询图像集的图像特征,F(Sj)为行人重识别专家模型中与查询图像集对应的支撑集的第j个图像的图像特征;将A'q-s堆叠得到N*K个维度的查询-支撑近邻特征Aq-s,Aq-s为一个二维矩阵;N为行人重识别专家模型数量,K为支撑集中图像的数量;Wherein, F(I) represents the image feature of the query image set in the person re-identification expert model, and F(S j ) is the image feature of the j-th image of the support set corresponding to the query image set in the person re-identification expert model; Stack A' qs to obtain N*K dimensions of query-support neighbor features A qs , where A qs is a two-dimensional matrix; N is the number of pedestrian re-identification expert models, and K is the number of images in the support set; S4.2:根据所述良性训练集和对抗训练集,计算每个行人重识别专家模型中支撑集中第i个图像的特征与支撑集中第j个图像的特征之间的余弦相似性A1 s-s[i,j];将多个行人重识别专家模型中的A1 s-s[i,j]堆叠得到支撑-支撑近邻特征A1 s-sS4.2: According to the benign training set and the adversarial training set, calculate the cosine similarity A 1 ss between the feature of the i-th image in the support set and the feature of the j-th image in the support set in each person re-identification expert model [i,j]; stack A 1 ss [i, j] in multiple person re-identification expert models to obtain support-support neighbor feature A 1 ss ; 得到A1 s-s[i,j]的计算公式为:The calculation formula to get A 1 ss [i,j] is: A1 s-s[i,j]=CosSimilarity(F(Si),F(Sj))A 1 ss [i,j]=CosSimilarity(F(S i ),F(S j )) 其中,F(Si)表示为支撑集第i个图像的图像特征,F(Sj)表示为支撑集第j个图像的图像特征;A1 s-s为K*K维度的矩阵,将K*(K-1)/2个元素保持在右上(左下)矩阵;Among them, F(S i ) is the image feature of the ith image of the support set, F(S j ) is the image feature of the jth image of the support set; A 1 ss is a matrix of K*K dimension, and K* (K-1)/2 elements remain in the upper right (lower left) matrix; S4.3:将S4.2中A1 s-s的右上(左下)矩阵元素保留得到新的向量A's-s[i,j],再将多个行人重识别专家模型中的A's-s[i,j]堆叠得到新的支撑-支撑近邻特征As-s;A's-s[i,j]的维度为K'=K*(K-1)/2;As-s的维度为N*K',As-s为一个二维矩阵;S4.3: Retain the upper right (lower left) matrix elements of A 1 ss in S4.2 to obtain a new vector A' ss [i,j], and then re-identify the multiple pedestrians in the expert model A' ss [i, j] stacking to obtain a new support-support neighbor feature A ss ; the dimension of A' ss [i,j] is K'=K*(K-1)/2; the dimension of A ss is N*K', A ss is a two-dimensional matrix; S4.4:将第n个行人重识别专家模型作为基本模型,计算基本模型中支撑集的第j个图像出现在其他行人重识别专家模型中支撑集的频率,所述频率记为Ac-e[n,j],最终得到跨专家近邻特征Ac-eS4.4: Take the nth person re-identification expert model as the basic model, and calculate the frequency of the j-th image of the support set in the basic model appearing in the support set of other person re-identification expert models, and the frequency is recorded as A ce [ n,j], and finally get the cross-expert neighbor feature A ce ; Ac-e[n,j]的计算公式为:The calculation formula of A ce [n,j] is:
Figure FDA0003288944070000031
Figure FDA0003288944070000031
其中,n表示为第n个行人重识别专家模型,F(·)是指示器函数,当参数为真时,输出1,否则输出0;Ac-e的维度为N*K,Ac-e为一个二维矩阵,Sl表示不包括基本模型的其余行人重识别专家模型的支撑集集合;Among them, n represents the nth pedestrian re-identification expert model, F( ) is the indicator function, when the parameter is true, output 1, otherwise output 0; the dimension of A ce is N*K, and A ce is a two dimensional matrix, S l represents the support set set of the remaining pedestrian re-identification expert models excluding the basic model; S4.5:将Aq-s,As-s,Ac-e二维矩阵降为一维向量,并将一维向量的Aq-s,As-s,Ac-e连接,得到上下文特征x,x的维度为d,其中d=N*K+N*K'+N*K;S4.5: Reduce A qs , A ss , A ce two-dimensional matrix to one-dimensional vector, and connect A qs , A ss , A ce of one-dimensional vector to obtain context feature x, and the dimension of x is d, where d=N*K+N*K'+N*K; S4.6:将上下文特征输入到多层感知器中训练,并将多层感知器作为对抗攻击检测器。S4.6: The contextual features are input into a multilayer perceptron for training, and the multilayer perceptron is used as an adversarial attack detector.
7.根据权利要求6所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S6中,根据对抗攻击检测器输出的被攻击的概率,当概率大于设定的概率阈值时,该待查询的图像为对抗查询样本,否则为良性查询样本。7. a kind of multi-expert confrontation attack detection method based on the inconsistency of context features according to claim 6, is characterized in that, in S6, according to the probability of being attacked that the confrontation attack detector outputs, when the probability is greater than the set probability When the threshold is set, the image to be queried is an adversarial query sample, otherwise it is a benign query sample. 8.根据权利要求7所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,S7中,根据对抗检测器对于行人重识别测试集的输出结果,并采用分类精度、接受者操作特征曲线下的面积、以及判定精度与召回率的谐波平均值,评估对抗攻击检测器的性能。8. a kind of multi-expert confrontation attack detection method based on inconsistency of context features according to claim 7, is characterized in that, in S7, according to the output result of confrontation detector for pedestrian re-identification test set, and adopt classification accuracy, The area under the receiver operating characteristic curve, and the harmonic mean of the decision precision and recall, evaluates the performance of the adversarial attack detector. 9.根据权利要求2所述的一种基于上下文特征不一致性的多专家对抗攻击检测方法,其特征在于,所述对抗攻击方法包括深度误排序对抗攻击方法和敌对模板对抗攻击方法。9 . The multi-expert adversarial attack detection method based on inconsistency of context features according to claim 2 , wherein the adversarial attack method comprises a deep misordering adversarial attack method and an adversarial template adversarial attack method. 10 .
CN202111156899.2A 2021-09-30 2021-09-30 A multi-expert adversarial attack detection method based on inconsistency of contextual features Withdrawn CN113869233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111156899.2A CN113869233A (en) 2021-09-30 2021-09-30 A multi-expert adversarial attack detection method based on inconsistency of contextual features

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111156899.2A CN113869233A (en) 2021-09-30 2021-09-30 A multi-expert adversarial attack detection method based on inconsistency of contextual features

Publications (1)

Publication Number Publication Date
CN113869233A true CN113869233A (en) 2021-12-31

Family

ID=79001002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111156899.2A Withdrawn CN113869233A (en) 2021-09-30 2021-09-30 A multi-expert adversarial attack detection method based on inconsistency of contextual features

Country Status (1)

Country Link
CN (1) CN113869233A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278680A (en) * 2022-07-29 2022-11-01 国网区块链科技(北京)有限公司 A mobile application attack detection method, device, device and storage medium
CN115311528A (en) * 2022-06-23 2022-11-08 广州大学 Anti-attack defense method applied to pedestrian re-identification
US12260674B2 (en) 2022-11-09 2025-03-25 Mohamed bin Zayed University of Artificial Intelligence System and method for attention-aware relation mixer for person search

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110674938A (en) * 2019-08-21 2020-01-10 浙江工业大学 Anti-attack defense method based on cooperative multi-task training
CN111160217A (en) * 2019-12-25 2020-05-15 中山大学 Method and system for generating confrontation sample of pedestrian re-identification system
CN111401407A (en) * 2020-02-25 2020-07-10 浙江工业大学 Countermeasure sample defense method based on feature remapping and application
CN112115781A (en) * 2020-08-11 2020-12-22 西安交通大学 Unsupervised pedestrian re-identification method based on anti-attack sample and multi-view clustering
CN112668557A (en) * 2021-01-29 2021-04-16 南通大学 Method for defending image noise attack in pedestrian re-identification system
CN113111963A (en) * 2021-04-23 2021-07-13 清华大学深圳国际研究生院 Method for re-identifying pedestrian by black box attack

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110674938A (en) * 2019-08-21 2020-01-10 浙江工业大学 Anti-attack defense method based on cooperative multi-task training
CN111160217A (en) * 2019-12-25 2020-05-15 中山大学 Method and system for generating confrontation sample of pedestrian re-identification system
CN111401407A (en) * 2020-02-25 2020-07-10 浙江工业大学 Countermeasure sample defense method based on feature remapping and application
CN112115781A (en) * 2020-08-11 2020-12-22 西安交通大学 Unsupervised pedestrian re-identification method based on anti-attack sample and multi-view clustering
CN112668557A (en) * 2021-01-29 2021-04-16 南通大学 Method for defending image noise attack in pedestrian re-identification system
CN113111963A (en) * 2021-04-23 2021-07-13 清华大学深圳国际研究生院 Method for re-identifying pedestrian by black box attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XUEPING WANG等: "《Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency》", 《ARXIV:2108.09891》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311528A (en) * 2022-06-23 2022-11-08 广州大学 Anti-attack defense method applied to pedestrian re-identification
CN115278680A (en) * 2022-07-29 2022-11-01 国网区块链科技(北京)有限公司 A mobile application attack detection method, device, device and storage medium
US12260674B2 (en) 2022-11-09 2025-03-25 Mohamed bin Zayed University of Artificial Intelligence System and method for attention-aware relation mixer for person search

Similar Documents

Publication Publication Date Title
Yu et al. Spatial pyramid-enhanced NetVLAD with weighted triplet loss for place recognition
Zheng et al. SIFT meets CNN: A decade survey of instance retrieval
US11288314B2 (en) Method and apparatus for multi-dimensional content search and video identification
Chaudhuri et al. Multilabel remote sensing image retrieval using a semisupervised graph-theoretic method
CN102105901B (en) Annotating images
CN113869233A (en) A multi-expert adversarial attack detection method based on inconsistency of contextual features
CN110598543B (en) Model training method based on attribute mining and reasoning and pedestrian re-identification method
Zhuo et al. Efficient graph similarity computation with alignment regularization
CN112668557B (en) Method for defending image noise attack in pedestrian re-identification system
Ross et al. Augmenting ridge curves with minutiae triplets for fingerprint indexing
Kobyshev et al. Matching features correctly through semantic understanding
Wang et al. Multiple pedestrian tracking with graph attention map on urban road scene
Beyan et al. Extracting statistically significant behaviour from fish tracking data with and without large dataset cleaning
JP4937395B2 (en) Feature vector generation apparatus, feature vector generation method and program
JP5014479B2 (en) Image search apparatus, image search method and program
Korrapati et al. Vision-based sparse topological mapping
Li et al. Shoeprint image retrieval based on dual knowledge distillation for public security Internet of Things
Chen et al. DVHN: A deep hashing framework for large-scale vehicle re-identification
Du et al. Large-scale signature matching using multi-stage hashing
Muniswamaiah et al. Applications of binary similarity and distance measures
JP2013246739A (en) Search device and program for precisely searching content represented by set of high dimensional feature vectors
Parekh et al. Review of Parameters of Fingerprint Classification Methods Based on Algorithmic Flow
CN117437567A (en) Multi-fingernail target online tracking method, equipment and storage medium
Gao et al. Feature tracking for target identification in acoustic image sequences
El-Mashad et al. Evaluating the robustness of feature correspondence using different feature extractors

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20211231

WW01 Invention patent application withdrawn after publication