Imperceptible and multi-channel backdoor attack

被引:0
|
作者
Mingfu Xue
Shifeng Ni
Yinghao Wu
Yushu Zhang
Weiqiang Liu
机构
[1] Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology
[2] Nanjing University of Aeronautics and Astronautics,College of Electronic and Information Engineering
来源
Applied Intelligence | 2024年 / 54卷
关键词
Backdoor attack; Deep neural network; Artificial intelligence security; Imperceptible and multi-channel trigger;
D O I
暂无
中图分类号
学科分类号
摘要
Recent researches demonstrate that Deep Neural Networks (DNN) models are vulnerable to backdoor attacks. The backdoored DNN model will behave maliciously when images containing backdoor triggers arrive. To date, almost all the existing backdoor attacks are single-trigger and single-target attacks, and the triggers of most existing backdoor attacks are obvious thus are easy to be detected or noticed. In this paper, we propose a novel imperceptible and multi-channel backdoor attack method against Deep Neural Networks by exploiting Discrete Cosine Transform (DCT) steganography. The proposed method injects backdoor instances into the training set and does not require controlling the whole training process. Specifically, for a colored image, we utilize DCT steganography to construct and embed trigger into different channels of the image in frequency domain. As a result, the trigger shown in the time domain is stealthy and natural. Then the generated backdoor instances are injected into the training dataset to train the DNN model. Based on the proposed backdoor attack method, we implement two cunning variants of backdoor attacks, imperceptible N-to-N (multi-target) backdoor attack and imperceptible N-to-One (multi-trigger) backdoor attack. Experimental results demonstrate that the attack success rate of the N-to-N backdoor attack is 95.09% on CIFAR-10 dataset, 93.33% on TinyImageNet dataset and 92.45% on ImageNet dataset, respectively. The attack success rate of the N-to-One attack is 90.22% on CIFAR-10 dataset, 89.56% on TinyImageNet dataset and 88.29% on ImageNet dataset, respectively. Meanwhile, the proposed backdoor attack does not affect the classification accuracy of the DNN models. Moreover, the proposed attack is demonstrated to be robust against two state-of-the-art backdoor defenses, including the recent frequency domain defense.
引用
收藏
页码:1099 / 1116
页数:17
相关论文
共 50 条
  • [1] Imperceptible and multi-channel backdoor attack
    Xue, Mingfu
    Ni, Shifeng
    Wu, Yinghao
    Zhang, Yushu
    Liu, Weiqiang
    [J]. APPLIED INTELLIGENCE, 2024, 54 (01) : 1099 - 1116
  • [2] Backdoor Attack with Imperceptible Input and Latent Modification
    Khoa Doan
    Lao, Yingjie
    Li, Ping
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [3] Imperceptible and Robust Backdoor Attack in 3D Point Cloud
    Gao, Kuofeng
    Bai, Jiawang
    Wu, Baoyuan
    Ya, Mengxi
    Xia, Shu-Tao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1267 - 1282
  • [4] RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
    Phan, Huy
    Shi, Cong
    Xie, Yi
    Zhang, Tianfang
    Li, Zhuohang
    Zhao, Tianming
    Liu, Jian
    Wang, Yan
    Chen, Yingying
    Yuan, Bo
    [J]. COMPUTER VISION - ECCV 2022, PT IV, 2022, 13664 : 708 - 724
  • [5] Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger
    Xue, Mingfu
    Wu, Yinghao
    Ni, Shifeng
    Zhang, Leo Yu
    Zhang, Yushu
    Liu, Weiqiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 5004 - 5013
  • [6] SilentTrig: An imperceptible backdoor attack against speaker identification with hidden triggers
    Tang, Yu
    Sun, Lijuan
    Xu, Xiaolong
    [J]. PATTERN RECOGNITION LETTERS, 2024, 117 : 103 - 109
  • [7] Investigating the Backdoor on DNNs Based on Recolorization and Reconstruction: From a Multi-Channel Perspective
    Chen, Honglong
    Gao, Yudong
    Zhang, Anqing
    Sun, Peng
    Jiang, Nan
    Liu, Weifeng
    Wang, Xingang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6923 - 6934
  • [8] Shadow backdoor attack: Multi-intensity backdoor attack against federated learning
    Ren, Qixian
    Zheng, Yu
    Yang, Chao
    Li, Yue
    Ma, Jianfeng
    [J]. COMPUTERS & SECURITY, 2024, 139
  • [9] Imperceptible Adversarial Attack on S Channel of HSV Colorspace
    Zhu, Tong
    Yin, Zhaoxia
    Lyu, Wanli
    Zhang, Jiefei
    Luo, Bin
    [J]. 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [10] Stealthy attack detection in multi-channel multi-radio wireless networks
    Varatharajan, R.
    Preethi, Angelin Peace
    Manogaran, Gunasekaran
    Kumar, Priyan Malarvizhi
    Sundarasekar, Revathi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18503 - 18526