Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks

Minxing Zhang,Michael Backes,Xiao Zhang
2024-10-10
Abstract:Human Pose Estimation (HPE) has been widely applied in autonomous systems such as self-driving cars. However, the potential risks of HPE to adversarial attacks have not received comparable attention with image classification or segmentation tasks. Existing works on HPE robustness focus on misleading an HPE system to provide wrong predictions that still indicate some human poses. In this paper, we study the vulnerability of HPE systems to disappearance attacks, where the attacker aims to subtly alter the HPE training process via backdoor techniques so that any input image with some specific trigger will not be recognized as involving any human pose. As humans are typically at the center of HPE systems, such attacks can induce severe security hazards, e.g., pedestrians' lives will be threatened if a self-driving car incorrectly understands the front scene due to disappearance attacks. To achieve the adversarial goal of disappearance, we propose IntC, a general framework to craft Invisibility Cloak in the HPE domain. The core of our work lies in the design of target HPE labels that do not represent any human pose. In particular, we propose three specific backdoor attacks based on our IntC framework with different label designs. IntC-S and IntC-E, respectively designed for regression- and heatmap-based HPE techniques, concentrate the keypoints of triggered images in a tiny, imperceptible region. Further, to improve the attack's stealthiness, IntC-L designs the target poisons to capture the label outputs of typical landscape images without a human involved, achieving disappearance and reducing detectability simultaneously. Extensive experiments demonstrate the effectiveness and generalizability of our IntC methods in achieving the disappearance goal. By revealing the vulnerability of HPE to disappearance and backdoor attacks, we hope our work can raise awareness of the potential risks ...
Cryptography and Security
What problem does this paper attempt to address?
### Problems Addressed by the Paper This paper primarily investigates the vulnerability of Human Pose Estimation (HPE) systems under adversarial attacks, specifically focusing on disappearance attacks. Specifically, the authors propose a general framework called "Invisibility Cloak" (IntC) to design adversarial examples that make human poses in input images unrecognizable. #### Main Objectives 1. **Reveal the Vulnerability of HPE Systems**: The paper reveals the potential risks of existing HPE systems under adversarial attacks, especially disappearance attacks, which can cause HPE systems to fail to recognize human poses in images. 2. **Propose New Attack Methods**: The paper proposes three specific backdoor attack methods (IntC-S, IntC-E, and IntC-L), which are based on different label designs and can achieve disappearance effects on trigger images. 3. **Raise Community Awareness**: By demonstrating the potential security risks of HPE systems in practical applications, the paper aims to increase the research community's attention to the security of HPE technology. #### Research Background - HPE systems are widely used in autonomous systems such as self-driving cars, but the risks of adversarial attacks have not been fully addressed. - Existing research mainly focuses on misleading HPE systems to output incorrect pose predictions rather than achieving a complete disappearance effect. - The proposed disappearance attacks aim to inject carefully designed HPE labels during training, using specific trigger patterns, so that any input image with the trigger pattern cannot be recognized for human poses. #### Methodology - **IntC-S**: For regression-based HPE techniques, all key points are concentrated in a very small area, making the prediction results difficult to notice. - **IntC-E**: For heatmap-based HPE techniques, the probability heatmap of each key point is set to be empty, directly achieving the disappearance effect. - **IntC-L**: Further enhances the stealthiness of the attack by capturing HPE labels of typical landscape images as target labels, making the trigger image mistaken for a landscape image, thus achieving disappearance and being hard to detect. Extensive experiments validate the effectiveness and generality of these methods, and possible defense directions are discussed. The paper hopes that these findings will raise awareness of the potential security risks of HPE technology in practical applications.