Abstract
In today’s era of advanced technologies, the concerns related to global security have led to video surveillance gadgets. Human gait recognition as a biometric is considered an evolving technology for intelligent surveillance monitoring. This research study exploits vulnerabilities associated with a convolutional neural network (CNN)-based gait recognition system under various walking conditions involving clothing, carrying items, and speed. In the first stage, we design a CNN model capable of identifying individuals based on their gait characteristics. Subsequently, in the next stage, we design a five-pixel adversarial attack in which we perturb the gait features of individuals computed using the fast gradient sign method. The resulting perturbation is added to only five random pixels to create naturalistic adversarial samples similar to the original samples. Further, the main aim of this study is to determine and analyze the performance of the CNN-based gait recognition system under an adversarial attack. The research concludes that gait recognition systems based on CNN models are highly susceptible to adversarial attacks, motivating researchers to design defense mechanisms to mitigate the effect of these attacks.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
The datasets used in this research are publicly available, and datasets can be made available by contacting the corresponding author.
References
Galvez RL, Bandala AA, Dadios EP, Vicerra RRP, Maningo JMZ (2018) Object detection using convolutional neural networks. In: TENCON 2018–2018 IEEE Region 10 Conference, IEEE, pp 2023–2027
Sun W, Wang R (2018) Fully convolutional networks for semantic segmentation of very high resolution remotely sensed images combined with DSM. IEEE Geosci Remote Sens Lett 15(3):474–478
Tian Y, Cheng G, Gelernter J, Yu S, Song C, Yang B (2020) Joint temporal context exploitation and active learning for video segmentation. Pattern Recogn 100:107158
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097–1105
Liu F, Shen C, Lin G (2015) Deep convolutional neural fields for depth estimation from a single image. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 5162–5170
Maqsood M, Yasmin S, Mehmood I, Bukhari M, Kim M (2021) An Efficient DA-net architecture for lung nodule segmentation. Mathematics 9(13):1457
Maqsood M, Bukhari M, Ali Z, Gillani S, Mehmood I, Rho S, Jung Y (2021) A residual-learning-based multi-scale parallel-convolutions-assisted efficient CAD system for liver tumor detection. Mathematics 9(10):1133
Ali Z, Irtaza A, Maqsood M (2021) An IOMT assisted lung nodule segmentation using enhanced receptive field-based modified UNet. Pers Ubiquitous Comput:1–15
Nawaz H, Maqsood M, Afzal S, Aadil F, Mehmood I, Rho S (2020) A deep feature-based real-time system for Alzheimer disease stage detection. Multimed Tools Appl:1–19
Ramadhani AM, Goo HS (2017) Twitter sentiment analysis using deep learning methods. In: 2017 7th International Annual Engineering Seminar (InAES), IEEE, pp 1–4
Zhang Z, He Q, Gao J, Ni M (2018) A deep learning approach for detecting traffic accidents from social media data. Transp Res Part C Emerging Technol 86:580–596
Yasir M, Durrani MY, Afzal S, Maqsood M, Aadil F, Mehmood I, Rho S (2019) An intelligent event-sentiment-based daily foreign exchange rate forecasting system. Appl Sci 9(15):2980
Yuan L, Qu Z, Zhao Y, Zhang H, Nian Q (2017) A convolutional neural network based on TensorFlow for face recognition. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), IEEE, pp 525–529
Al-Waisy AS, Qahwaji R, Ipson S, Al-Fahdawi S, Nagem TA (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Appl 21(3):783–802
Wani MA, Bhat FA, Afzal S, Khan AI (2020) Supervised deep learning in fingerprint recognition. In: Advances in Deep Learning. Springer, pp 111–132
Lee TK, Belkhatir M, Sanei S (2014) A comprehensive review of past and present vision-based techniques for gait recognition. Multimed Tools Appl 72(3):2833–2869
Yang SX, Larsen PK, Alkjær T, Simonsen EB, Lynnerup N (2014) Variability and similarity of gait as evaluated by joint angles: implications for forensic gait analysis. J For Sci 59(2):494–504
BenAbdelkader C, Cutler R, Davis L (2002) Stride and cadence as a biometric in automatic person identification and verification. In: Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, IEEE, pp 372–377
Alotaibi M, Mahmood A (2017) Improved gait recognition based on specialized deep convolutional neural network. Comput Vis Image Underst 164:103–110
Hawas AR, El-Khobby HA, Abd-Elnaby M, Abd El-Samie FE (2019) Gait identification by convolutional neural networks and optical flow. Multimed Tools Appl 78(18):25873–25888
Linda GM, Themozhi G, Bandi SR (2020) Color-mapped contour gait image for cross-view gait recognition using deep convolutional neural network. Int J Wavelets Multiresolut Inf Process 18(01):1941012
Arshad H, Khan MA, Sharif MI, Yasmin M, Tavares JMR, Zhang YD, Satapathy SC (2020) A multilevel paradigm for deep convolutional neural network features selection with an application to human gait recognition. Expert Systems:e12541
Wu X, Yang T, Xia Z (2020) Gait recognition based on densenet transfer learning. Int J Sci Environ 9(1):1–14
Zhu Z-A, Lu Y-Z, Chiang C-K (2019) Generating adversarial examples by makeup attacks on face recognition. In: 2019 IEEE International Conference on Image Processing (ICIP), IEEE, pp 2516–2520
Dong Y, Su H, Wu B, Li Z, Liu W, Zhang T, Zhu J (2019) Efficient decision-based black-box adversarial attacks on face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 7714–7722
Abiew NAK, Jnr MD, Banning SO (2020) Design and implementation of cost effective multi-factor authentication framework for ATM systems. Asian J Res Comput Sci:7–20
Kotia J, Kotwal A, Bharti R (2019) Risk susceptibility of brain tumor classification to adversarial attacks. In: International Conference on Man–Machine Interactions, Springer, pp 181–187
Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn 110:107332
Fawaz HI, Forestier G, Weber J, Idoumghar L, Muller P-A (2019) Adversarial attacks on deep neural networks for time series classification. In: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1–8
Zhou Z, Guan H, Bhat MM, Hsu J (2019) Fake news detection via NLP is vulnerable to adversarial attacks. Preprint https://arxiv.org/abs/190109657
Xu J (2021) A deep learning approach to building an intelligent video surveillance system. Multimed Tools Appl 80(4):5495–5515
Jung S, Lee H, Hwang S, Shim DH (2018) Real time embedded system framework for autonomous drone racing using deep learning techniques. In: 2018 AIAA Information Systems-AIAA Infotech@ Aerospace, p 2138
Boles A, Rad P (2017) Voice biometrics: deep learning-based voiceprint authentication system. In: 2017 12th System of Systems Engineering Conference (SoSE), IEEE, pp 1–6
Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. Preprint https://arxiv.org/abs/14126572
Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828–841
Chen P-Y, Zhang H, Sharma Y, Yi J, Hsieh C-J (2017) Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 15–26
Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. Preprint https://arxiv.org/abs/13126199
Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world
Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, pp 372–387
Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp), IEEE, pp 39–57
Liu Y, Chen X, Liu C, Song D (2016) Delving into transferable adversarial examples and black-box attacks. Preprint https://arxiv.org/abs/161102770
Li Y, Zhang H, Bermudez C, Chen Y, Landman BA, Vorobeychik Y (2020) Anatomical context protects deep learning from adversarial perturbations in medical imaging. Neurocomputing 379:370–378
Cheng G, Ji H (2020) Adversarial perturbation on MRI modalities in brain tumor segmentation. IEEE Access 8:206009–206015
Roth T, Gao Y, Abuadbba A, Nepal S, Liu W (2021) Token-modification adversarial attacks for natural language processing: a survey. Preprint https://arxiv.org/abs/210300676
Neekhara P, Hussain S, Pandey P, Dubnov S, McAuley J, Koushanfar F (2019) Universal adversarial perturbations for speech recognition systems. Preprint https://arxiv.org/abs/190503828
Xie S, Wang H, Kong Y, Hong Y (2021) Universal 3-Dimensional perturbations for black-box attacks on video recognition systems. Preprint https://arxiv.org/abs/210704284
Kuppa A, Grzonkowski S, Asghar MR, Le-Khac N-A (2019) Black box attacks on deep anomaly detectors. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp 1–10
Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805–2824
Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, pp 582–597
Huang R, Xu B, Schuurmans D, Szepesvári C (2015) Learning with a strong adversary. Preprint https://arxiv.org/abs/151103034
Liang B, Li H, Su M, Li X, Shi W, Wang X (2018) Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Transactions on Dependable and Secure Computing
Carlini N, Wagner D (2017) Adversarial examples are not easily detected: Bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp 3–14
Carlini N, Wagner D (2016) Defensive distillation is not robust to adversarial examples. Preprint https://arxiv.org/abs/160704311
Bukhari M, Bajwa KB, Gillani S, Maqsood M, Durrani MY, Mehmood I, Ugail H, Rho S (2020) An efficient gait recognition method for known and unknown covariate conditions. IEEE Access
Yu S, Tan D, Tan TA (2006) framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: 18th International Conference on Pattern Recognition (ICPR'06), IEEE, pp 441–444
Acknowledgements
This work was supported in part by the Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE), The Competency Development Program for Industry Specialist, under Grant P0008703, and also supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2019R1F1A1060668).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bukhari, M., Durrani, M.Y., Gillani, S. et al. Exploiting vulnerability of convolutional neural network-based gait recognition system. J Supercomput 78, 18578–18597 (2022). https://doi.org/10.1007/s11227-022-04611-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04611-3