skip to main content
research-article

Evaluating Compressive Sensing on the Security of Computer Vision Systems

Authors Info & Claims
Published:13 March 2024Publication History
Skip Abstract Section

Abstract

The rising demand for utilizing fine-grained data in deep-learning (DL) based intelligent systems presents challenges for the collection and transmission abilities of real-world devices. Deep compressive sensing, which employs deep learning algorithms to compress signals at the sensing stage and reconstruct them with high quality at the receiving stage, provides a state-of-the-art solution for the problem of large-scale fine-grained data. However, recent works have proven that fatal security flaws exist in current deep learning methods and such instability is universal for DL-based image reconstruction methods. In this article, we assess the security risks introduced by deep compressive sensing in the widely used computer vision system in the face of adversarial example attacks and poisoning attacks. To implement the security inspection in an unbiased and complete manner, we develop a comprehensive methodology and a set of evaluation metrics to manage all potential combinations of attack methods, datasets (application scenarios), categories of deep compressive sensing models, and image classifiers. The results demonstrate that deep compressive sensing models unknown to adversaries can protect the computer vision system from adversarial example attacks and poisoning attacks, whereas the ones exposed to adversaries can cause the system to become more vulnerable.

REFERENCES

  1. [1] Antun Vegard, Renna Francesco, Poon Clarice, Adcock Ben, and Hansen Anders C.. 2020. On instabilities of deep learning in image reconstruction and the potential costs of AI. Proceedings of the National Academy of Sciences (PNAS’20) 117, 48 (2020), 3008830095.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Bevacqua M. T., Crocco L., Donato L. Di, and Isernia T.. 2014. Microwave imaging of nonweak targets via compressive sensing and virtual experiments. IEEE Antennas and Wireless Propagation Letters 14 (2014), 10351038.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Boche Holger, Calderbank Robert, Kutyniok Gitta, and Vybíral Jan. 2015. A survey of compressed sensing. In Compressed Sensing and Its Applications. Springer, 139.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Carlini Nicholas and Wagner David. 2017. Towards evaluating the robustness of neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP’17). 3957.Google ScholarGoogle Scholar
  5. [5] Chen Pin-Yu, Zhang Huan, Sharma Yash, Yi Jinfeng, and Hsieh Cho-Jui. 2017. ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec’17). 1526.Google ScholarGoogle Scholar
  6. [6] Muhammad E. H. Chowdhury, Tawsifur Rahman, Amith Khandakar, Rashid Mazhar, Muhammad Abdul Kadir, Zaid Bin Mahbub, Khandakar Reajul Islam, Muhammad Salman Khan, Atif Iqbal, Nasser Al Emadi, Mamun Bin Ibne Reaz, and Mohammad Tariqul Islam. 2020. Can AI help in screening viral and COVID-19 Pneumonia? IEEE Access 8 (2020), 132665132676.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Darestani Mohammad Zalbagi, Chaudhari Akshay S., and Heckel Reinhard. 2021. Measuring robustness in deep learning based compressive sensing. In Proceedings of the 38th International Conference on Machine Learning (ICML’21). 24332444.Google ScholarGoogle Scholar
  8. [8] Dhaliwal Jasjeet and Hambrook Kyle. 2020. Compressive recovery defense: Defending neural networks against \(\mathbf {L}\_2\), \(\mathbf {L}\_\infty\) and \(\mathbf {L}\_0\) norm attacks. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN’20). 18.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Djelouat Hamza, Baali Hamza, Amira Abbes, and Bensaali Faycal. 2017. IoT based compressive sensing for ECG monitoring. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 183189.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Dong Yinpeng, Liao Fangzhou, Pang Tianyu, Su Hang, Zhu Jun, Hu Xiaolin, and Li Jianguo. 2018. Boosting adversarial attacks with momentum. In Proceedings of the 2018 IEEE Conference on Computer vision and Pattern Recognition (CVPR’18). 91859193.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Donoho David L.. 2006. Compressed sensing. IEEE Transactions on Information Theory 52, 4 (2006), 12891306.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Dziugaite Gintare Karolina, Ghahramani Zoubin, and Roy Daniel M.. 2016. A study of the effect of JPG compression on adversarial images. arXiv preprint arXiv:1608.00853 (2016).Google ScholarGoogle Scholar
  13. [13] Fadadu Sudeep, Pandey Shreyash, Hegde Darshan, Shi Yi, Chou Fang-Chieh, Djuric Nemanja, and Vallespi-Gonzalez Carlos. 2022. Multi-view fusion of sensor data for improved perception and prediction in autonomous driving. In Proceedings of the 2022 IEEE/CVF Winter Conference on Applications of Computer Vision. 23492357.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Genzel Martin, MacDonald Jan, and Marz Maximilian. 2022. Solving inverse problems with deep neural networksRobustness included. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022), 11.Google ScholarGoogle Scholar
  15. [15] Goodfellow Ian J., Shlens Jonathon, and Szegedy Christian. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).Google ScholarGoogle Scholar
  16. [16] Gottschling Nina M., Antun Vegard, Adcock Ben, and Hansen Anders C.. 2020. The troublesome kernel: Why deep learning for inverse problems is typically unstable. arXiv preprint arXiv:2001.01258 (2020).Google ScholarGoogle Scholar
  17. [17] Gu Tianyu, Liu Kang, Dolan-Gavitt Brendan, and Garg Siddharth. 2019. Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access 7 (2019), 4723047244.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Huang Yixing, Würfl Tobias, Breininger Katharina, Liu Ling, Lauritsch Günter, and Maier Andreas. 2018. Some investigations on robustness of deep learning in limited angle tomography. In Proceedings of the 2018 Medical Image Computing and Computer Assisted Intervention (MICCAI’18). 145153.Google ScholarGoogle Scholar
  19. [19] Kim Cheolsun, Park Dongju, and Lee Heung-No. 2020. Compressive sensing spectroscopy using a residual convolutional neural network. Sensors 20, 3 (2020), 594.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Kravets Vladislav, Javidi Bahram, and Stern Adrian. 2021. Compressive imaging for defending deep neural networks from adversarial attacks. Optics Letters 46, 8 (2021), 19511954.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Kravets Vladislav, Javidi Bahram, and Stern Adrian. 2021. Compressive imaging for thwarting adversarial attacks on 3D point cloud classifiers. Optics Express 29, 26 (2021), 4272642737.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Alex Krizhevsky and Geoffrey Hinton. 2009. Learning multiple layers of features from tiny images. Technical report University of Toronto (2009).Google ScholarGoogle Scholar
  23. [23] Li Shancang, Xu Li Da, and Wang Xinheng. 2012. Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things. IEEE Transactions on Industrial Informatics 9 (2012), 21772186.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Liao Fangzhou, Liang Ming, Dong Yinpeng, Pang Tianyu, Hu Xiaolin, and Zhu Jun. 2018. Defense against adversarial attacks using high-level representation guided denoiser. In Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 17781787.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Liu Ziwei, Luo Ping, Wang Xiaogang, and Tang Xiaoou. 2018. Large-scale celebfaces attributes (Celeba) dataset. Retrieved August 15, 2018 (2018), 11.Google ScholarGoogle Scholar
  26. [26] Lozano Adolfo, Hayes Jody C., Compton Lindsay M., Azarnoosh Jamasp, and Hassanipour Fatemeh. 2020. Determining the thermal characteristics of breast cancer based on high-resolution infrared imaging, 3D breast scans, and magnetic resonance imaging. Scientific Reports 10 (2020), 114.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Ma Yuxin, Xie Tiankai, Li Jundong, and Maciejewski Ross. 2019. Explaining vulnerabilities to adversarial machine learning through visual analytics. IEEE Transactions on Visualization and Computer Graphics 26 (2019), 10751085.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Madry Aleksander, Makelov Aleksandar, Schmidt Ludwig, Tsipras Dimitris, and Vladu Adrian. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017).Google ScholarGoogle Scholar
  29. [29] Mousavi Ali, Patel Ankit B., and Baraniuk Richard G.. 2015. A deep learning approach to structured signal recovery. In Proceedings of the 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton’15). 13361343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Muñoz-González Luis, Pfitzner Bjarne, Russo Matteo, Carnerero-Cano Javier, and Lupu Emil C.. 2019. Poisoning attacks with generative adversarial nets. arXiv preprint arXiv:1906.07773 (2019).Google ScholarGoogle Scholar
  31. [31] Rudin Leonid I., Osher Stanley, and Fatemi Emad. 1992. Nonlinear total variation based noise removal algorithms. Physica D: Nonlinear Phenomena 60, 1-4 (1992), 259268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Schlemper Jo, Caballero Jose, Hajnal Joseph V., Price Anthony N., and Rueckert Daniel. 2017. A deep cascade of convolutional neural networks for dynamic MR image reconstruction. IEEE transactions on Medical Imaging 37, 2 (2017), 491503.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Shi Wuzhen, Jiang Feng, Liu Shaohui, and Zhao Debin. 2019. Image compressed sensing using convolutional neural network. IEEE Transactions on Image Processing 29 (2019), 375388.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Song Dawn, Eykholt Kevin, Evtimov Ivan, Fernandes Earlence, Li Bo, Rahmati Amir, Tramer Florian, Prakash Atul, and Kohno Tadayoshi. 2018. Physical adversarial examples for object detectors. In Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT’18).Google ScholarGoogle Scholar
  35. [35] Wang Jia, Su Wuqiang, Luo Chengwen, Chen Jie, Song Houbing, and Li Jianqiang. 2022. CSG: Classifier-aware defense strategy based on compressive sensing and generative networks for visual recognition in autonomous vehicle systems. IEEE Transactions on Intelligent Transportation Systems (2022), 111.Google ScholarGoogle Scholar
  36. [36] Wang Zhou, Bovik Alan C., Sheikh Hamid R., and Simoncelli Eero P.. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600612.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Wu Yan, Rosca Mihaela, and Lillicrap Timothy. 2019. Deep compressed sensing. In Proceedings of the 36th International Conference on Machine Learning (ICML’19). 68506860.Google ScholarGoogle Scholar
  38. [38] Xu Weilin, Evans David, and Qi Yanjun. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017).Google ScholarGoogle Scholar
  39. [39] Yang Haotian, Zhu Hao, Wang Yanru, Huang Mingkai, Shen Qiu, Yang Ruigang, and Cao Xun. 2020. Facescape: A large-scale high quality 3D face dataset and detailed riggable 3D face prediction. In Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR’20). 601610.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Zhang Jian and Ghanem Bernard. 2018. ISTA-Net: Interpretable optimization-inspired deep network for image compressive sensing. In Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 18281837.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Zhang Yuchen and Liang Percy. 2019. Defending against whitebox adversarial attacks via randomized discretization. In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS’19). 684693.Google ScholarGoogle Scholar
  42. [42] Zhao Hang, Gallo Orazio, Frosio Iuri, and Kautz Jan. 2016. Loss functions for image restoration with neural networks. IEEE Transactions on Computational Imaging 3, 1 (2016), 4757.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Evaluating Compressive Sensing on the Security of Computer Vision Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 20, Issue 3
        May 2024
        634 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3613571
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 March 2024
        • Online AM: 8 February 2024
        • Accepted: 22 January 2024
        • Revised: 5 December 2023
        • Received: 12 June 2023
        Published in tosn Volume 20, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)132
        • Downloads (Last 6 weeks)40

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text