这是indexloc提供的服务,不要输入任何密码
Skip to main content
Log in

Edge-Oriented Adversarial Attack for Deep Gait Recognition

  • Published:
International Journal of Computer Vision Aims and scope Submit manuscript

Abstract

Gait recognition is a non-intrusive method that captures unique walking patterns without subject cooperation, which has emerged as a promising technique across various fields. Recent studies based on Deep Neural Networks (DNNs) have notably improved the performance, however, the potential vulnerability inherent in DNNs and their resistance to interference in practical gait recognition systems remain under-explored. To fill the gap, in this paper, we focus on imperceptible adversarial attack for deep gait recognition and propose an edge-oriented attack strategy tailored for silhouette-based approaches. Specifically, we make a pioneering attempt to explore the intrinsic characteristics of binary silhouettes, with a primary focus on injecting noise perturbations into the edge area. This simple yet effective solution enables sparse attack in both the spatial and temporal dimensions, which largely ensures imperceptibility and simultaneously achieves high success rate. In particular, our solution is built on a unified framework, allowing seamless switching between untargeted and targeted attack modes. Extensive experiments conducted on in-the-lab and in-the-wild benchmarks validate the effectiveness of our attack strategy and emphasize the necessity to study adversarial attack and defense strategy in the near future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available from CASIA-B4, OUMVLP5 Gait3D6 and GREW7, upon reasonable request.

Notes

  1. We asked the volunteers to check whether the imperceptibility is acceptable. The group consists of ten volunteers where one half are researchers who are familiar with gait recognition and the other half are recruited from other majors rather than computer science. We ask the volunteers to check whether the generated silhouettes for adversarial attack are significantly altered compared to the raw input.

  2. GaitBase3D is implemented by replacing 2D convolution of GaitBase with 3D convolution (Fan et al., 2023b)

  3. The sequence-based GaitPart and GaitGL rely on the continuous frames for temporal modeling, as a result, it is infeasible to transform them into GEI-based methods that squeeze the temporal dimension in the input phase.

  4. http://www.cbsr.ia.ac.cn/english/Gait%20Databases.asp.

  5. http://www.am.sanken.osaka-u.ac.jp/BiometricDB/GaitMVLP.html.

  6. https://gait3d.github.io/.

  7. https://www.grew-benchmark.org/.

References

  • An, W., Yu, S., Makihara, Y., Wu, X., Xu, C., Yu, Y., Liao, R., & Yagi, Y. (2020). Performance evaluation of model-based gait on multi-view very large population database with pose sequences. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(4), 421–430. https://doi.org/10.1109/TBIOM.2020.3008862

    Article  Google Scholar 

  • Arnab, A., Miksik, O., & Torr, P. H. (2018). On the robustness of semantic segmentation models to adversarial attacks. in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 888–897.

  • Bai, S., Li, Y., Zhou, Y., Li, Q., & Torr, P. H. (2020). Adversarial metric attack and defense for person re-identification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(6), 2119–2126. https://doi.org/10.1109/TPAMI.2020.3031625

    Article  MATH  Google Scholar 

  • Brendel, W., Rauber, J., & Bethge, M. (2017). Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248

  • Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., & Mukhopadhyay, D. (2018). Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069

  • Chao, H., He, Y., Zhang, J., & Feng, J. (2019). GaitSet: Regarding gait as a set for cross-view gait recognition. in Proceedings of the AAAI conference on artificial intelligence, vol. 33, pp. 8126–8133. https://doi.org/10.1609/aaai.v33i01.33018126

  • Cui, Y., & Kang, Y. (2023). Multi-modal gait recognition via effective spatial-temporal feature fusion. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 17949–17957.

  • Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., & Li, J. (2018). Boosting adversarial attacks with momentum. in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 9185–9193.

  • Fan, C., Hou, S., Huang, Y., & Yu, S. (2023). Exploring deep models for practical gait recognition. arXiv preprint arXiv:2303.03301

  • Fan, C., Liang, J., Shen, C., Hou, S., Huang, Y., & Yu, S. (2023). OpenGait: Revisiting gait recognition towards better practicality. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 9707–9716.

  • Fan, C., Ma, J., Jin, D., Shen, C., & Yu, S. (2024). SkeletonGait: Gait recognition using skeleton maps. in Proceedings of the AAAI conference on artificial intelligence, vol. 38, pp. 1662–1669. https://doi.org/10.1609/aaai.v38i2.27933

  • Fan, C., Peng, Y., Cao, C., Liu, X., Hou, S., Chi, J., Huang, Y., Li, Q., & He, Z. (2020). GaitPart: Temporal part-based model for gait recognition. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 14225–14233.

  • Goldblum, M., Fowl, L., Feizi, S., & Goldstein, T. (2020). Adversarially robust distillation. in Proceedings of the AAAI conference on artificial intelligence, vol. 34, pp. 3996–4003. https://doi.org/10.1609/aaai.v34i04.5816

  • Goodfellow, I. J., Shlens, J., & Szegedy, C. (2015). Explaining and harnessing adversarial examples. in ICLR.

  • Han, J., & Bhanu, B. (2005). Individual recognition using gait energy image. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(2), 316–322. https://doi.org/10.1109/TPAMI.2006.38

    Article  MATH  Google Scholar 

  • Hendrik Metzen, J., Chaithanya Kumar, M., Brox, T., & Fischer, V. (2017). Universal adversarial perturbations against semantic image segmentation. in Proceedings of the IEEE international conference on computer vision, pp. 2755–2764.

  • He, Z., Wang, W., Dong, J., & Tan, T. (2023). Temporal sparse adversarial attack on sequence-based gait recognition. Pattern Recognition, 133, 109028. https://doi.org/10.1016/j.patcog.2022.109028

    Article  MATH  Google Scholar 

  • Hou, S., Cao, C., Liu, X., & Huang, Y. (2020). Gait lateral network: Learning discriminative and compact representations for gait recognition. in European conference on computer vision. https://doi.org/10.1007/978-3-030-58545-7_22

  • Hou, S., Fan, C., Cao, C., Liu, X., & Huang, Y. (2022). A comprehensive study on the evaluation of silhouette-based gait recognition. IEEE Transactions on Biometrics, Behavior, and Identity Science. https://doi.org/10.1109/TBIOM.2022.3216857

    Article  MATH  Google Scholar 

  • Hou, S., Liu, X., Cao, C., & Huang, Y. (2021). Set residual network for silhouette-based gait recognition. IEEE Transactions on Biometrics, Behavior, and Identity Science. https://doi.org/10.1109/TBIOM.2021.3074963

    Article  MATH  Google Scholar 

  • Hou, S., Liu, X., Cao, C., & Huang, Y. (2022). Gait quality aware network: Toward the interpretability of silhouette-based gait recognition. IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2022.3154723

    Article  MATH  Google Scholar 

  • Huang, S., Papernot, N., Goodfellow, I., Duan, Y., & Abbeel, P. (2017). Adversarial attacks on neural network policies. arXiv preprint arXiv:1702.02284

  • Huang, Z., Xue, D., Shen, X., Tian, X., Li, H., Huang, J., & Hua, X. -S. (2021). 3d local convolutional neural networks for gait recognition. in Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 14920–14929.

  • Huang, X., Zhu, D., Wang, H., Wang, X., Yang, B., He, B., Liu, W., & Feng, B. (2021). Context-sensitive temporal feature learning for gait recognition. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 12909–12918.

  • Jia, M., Yang, H., Huang, D., & Wang, Y. (2019). Attacking gait recognition systems via silhouette guided GANs. in Proceedings of the 27th ACM international conference on multimedia, pp. 638–646. https://doi.org/10.1145/3343031.3351018

  • Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. in ICLR.

  • Kos, J., Fischer, I., & Song, D. (2018). Adversarial examples for generative models. in IEEE security and privacy workshops, pp. 36–42. https://doi.org/10.1109/SPW.2018.00014

  • Kurakin, A., Goodfellow, I. J., & Bengio, S. (2016). Adversarial examples in the physical world. in Artificial intelligence safety and security, pp. 99–112.

  • Li, X., Makihara, Y., Xu, C., Yagi, Y., Yu, S., & Ren, M. (2020). End-to-end model-based gait recognition. in Proceedings of the Asian conference on computer vision.

  • Li, S., Zhu, S., Paul, S., Roy-Chowdhury, A., Song, C., Krishnamurthy, S., Swami, A., & Chan, K. S. (2020). Connecting the dots: Detecting adversarial perturbations using context inconsistency. in Computer vision–ECCV 2020: 16th European conference, pp. 396–413. https://doi.org/10.1007/978-3-030-58592-1_24

  • Liang, J., Fan, C., Hou, S., Shen, C., Huang, Y., & Yu, S. (2022). GaitEdge: Beyond plain end-to-end gait recognition for better practicality. in European conference on computer vision. https://doi.org/10.1007/978-3-031-20065-6_22

  • Liao, R., Yu, S., An, W., & Huang, Y. (2020). A model-based gait recognition method with body pose and human prior knowledge. Pattern Recognition, 98, 107069. https://doi.org/10.1016/j.patcog.2019.107069

    Article  MATH  Google Scholar 

  • Lin, Y. -C., Hong, Z. -W., Liao, Y. -H., Shih, M. -L., Liu, M. -Y., & Sun, M. (2017). Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748

  • Lin, B., Zhang, S., & Yu, X. (2021) Gait recognition via effective global-local feature representation and local temporal aggregation. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 14648–14656.

  • Liu, Z., Zhao, Z., & Larson, M. (2019). Who’s afraid of adversarial queries? The impact of image modifications on content-based image retrieval. in Proceedings of the 2019 on international conference on multimedia retrieval, pp. 306–314. https://doi.org/10.1145/3323873.3325052

  • Li, N., & Zhao, X. (2022). A strong and robust skeleton-based gait recognition method with gait periodicity priors. IEEE Transactions on Multimedia. https://doi.org/10.1109/TMM.2022.3154609

    Article  MATH  Google Scholar 

  • Loper, M., Mahmood, N., Romero, J., Pons-Moll, G., & Black, M. J. (2015). SMPL: A skinned multi-person linear model. ACM Transactions on Graphics, 34(6), 1–16. https://doi.org/10.1145/2816795.2818013

    Article  Google Scholar 

  • Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2018). Towards deep learning models resistant to adversarial attacks. in ICLR.

  • Maqsood, M., Yasmin, S., Gillani, S., Aadil, F., Mehmood, I., Rho, S., & Yeo, S.-S. (2023). An autonomous decision-making framework for gait recognition systems against adversarial attack using reinforcement learning. ISA Transactions, 132, 80–93. https://doi.org/10.1016/j.isatra.2022.11.016

    Article  Google Scholar 

  • Narodytska, N., & Kasiviswanathan, S. P. (2017). Simple black-box adversarial attacks on deep neural networks. in CVPR workshops, vol. 2, p. 2.

  • Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (2016). Distillation as a defense to adversarial perturbations against deep neural networks. in 2016 IEEE symposium on security and privacy (SP), pp. 582–597. https://doi.org/10.1109/SP.2016.41

  • Qi, C. R., Su, H., Mo, K., & Guibas, L. J. (2017). PointNet: Deep learning on point sets for 3d classification and segmentation. in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 652–660.

  • Qi, C. R., Yi, L., Su, H., & Guibas, L. J. (2017). PointNet++: Deep hierarchical feature learning on point sets in a metric space. in NeurIPS, vol. 30.

  • Rony, J., Hafemann, L. G., Oliveira, L. S., Ayed, I. B., Sabourin, R., & Granger, E. (2019). Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 4322–4330.

  • Ruder, S. (2016). An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747

  • Sepas-Moghaddam, A., & Etemad, A. (2021). Deep gait recognition: A survey. arXiv preprint arXiv:2102.09546

  • Shen, C., Fan, C., Wu, W., Wang, R., Huang, G. Q., & Yu, S. (2023). LidarGait: Benchmarking 3d gait recognition with point clouds. in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1054–1063.

  • Shen, C., Yu, S., Wang, J., Huang, G. Q., & Wang, L. (2022). A comprehensive survey on deep gait recognition: Algorithms, datasets and challenges. arXiv preprint arXiv:2206.13732

  • Soll, M., Hinz, T., Magg, S., & Wermter, S. (2019). Evaluating defensive distillation for defending text processing neural networks against adversarial examples. in International conference on artificial neural networks, pp. 685–696. https://doi.org/10.1007/978-3-030-30508-6_54

  • Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199

  • Tabacof, P., Tavares, J., & Valle, E. (2016). Adversarial images for variational autoencoders. arXiv preprint arXiv:1612.00155

  • Takemura, N., Makihara, Y., Muramatsu, D., Echigo, T., & Yagi, Y. (2018). Multi-view large population gait dataset and its performance evaluation for cross-view gait recognition. IPSJ Transactions on Computer Vision and Applications, 10(1), 4. https://doi.org/10.1186/s41074-018-0039-6

    Article  MATH  Google Scholar 

  • Teepe, T., Gilg, J., Herzog, F., Hörmann, S., & Rigoll, G. (2022). Towards a deeper understanding of skeleton-based gait recognition. in CVPR workshop, pp. 1569–1577.

  • Teepe, T., Khan, A., Gilg, J., Herzog, F., Hörmann, S., & Rigoll, G. (2021). GaitGraph: Graph convolutional network for skeleton-based gait recognition. in 2021 IEEE international conference on image processing, pp. 2314–2318. https://doi.org/10.1109/ICIP42928.2021.9506717

  • Tolias, G., Radenovic, F., & Chum, O. (2019). Targeted mismatch adversarial attack: Query with a flower to retrieve the tower. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 5037–5046.

  • Venkat, I., & De Wilde, P. (2011). Robust gait recognition by learning and exploiting sub-gait characteristics. International Journal of Computer Vision, 91, 7–23. https://doi.org/10.1007/s11263-010-0362-6

    Article  MATH  Google Scholar 

  • Wang, Y., Du, B., Shen, Y., Wu, K., Zhao, G., Sun, J., & Wen, H. (2019). EV-Gait: Event-based robust gait recognition using dynamic vision sensors. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 6358–6367.

  • Wang, M., Guo, X., Lin, B., Yang, T., Zhu, Z., Li, L., Zhang, S., & Yu, X. (2023). Dygait: Exploiting dynamic representations for high-performance gait recognition. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 13424–13433.

  • Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., & Yuille, A. (2017). Adversarial examples for semantic segmentation and object detection. in Proceedings of the IEEE international conference on computer vision, pp. 1369–1378.

  • Yin, M., Li, S., Cai, Z., Song, C., Asif, M. S., Roy-Chowdhury, A. K., & Krishnamurthy, S. V. (2021). Exploiting multi-object relationships for detecting adversarial attacks in complex scenes. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 7858–7867.

  • Yin, M., Li, S., Song, C., Asif, M. S., Roy-Chowdhury, A. K., & Krishnamurthy, S. V. (2022). ADC: Adversarial attacks against object detection that evade context consistency checks. in Proceedings of the IEEE/CVF winter conference on applications of computer vision, pp. 3278–3287.

  • Yu, S., Tan, D., & Tan, T. (2006). A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. ICPR, 4, 441–444. https://doi.org/10.1109/ICPR.2006.67

    Article  MATH  Google Scholar 

  • Zheng, T., Chen, C., Yuan, J., Li, B., & Ren, K. (2019). Pointcloud saliency maps. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 1598–1606.

  • Zheng, J., Liu, X., Liu, W., He, L., Yan, C., & Mei, T. (2022). Gait recognition in the wild with dense 3d representations and a benchmark. in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp. 20228–20237.

  • Zheng, Z., Zheng, L., Hu, Z., & Yang, Y. (2018). Open set adversarial examples. arXiv preprint arXiv:1809.02681

  • Zhu, Z., Guo, X., Yang, T., Huang, J., Deng, J., Huang, G., Du, D., Lu, J., & Zhou, J. (2021). Gait recognition in the wild: A benchmark. in Proceedings of the IEEE/CVF international conference on computer vision, pp. 14789–14799.

Download references

Acknowledgements

This work is jointly supported by National Natural Science Foundation of China (62276031, 62276025, 62206022), Beijing Municipal Science & Technology Commission (Z231100007423015) and Shenzhen Technology Plan Program (KQTD20170331093217368). The authors have no conflict of interest to declare that are relevant to the content of this article.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Man Zhang or Yongzhen Huang.

Additional information

Communicated by Segio Escalera.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hou, S., Wang, Z., Zhang, M. et al. Edge-Oriented Adversarial Attack for Deep Gait Recognition. Int J Comput Vis 133, 1549–1563 (2025). https://doi.org/10.1007/s11263-024-02225-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11263-024-02225-1

Keywords