While deep learning based image retrieval is reported to be vulnerable to adversarial attacks, existing works are mainly on image-to-image retrieval with their attacks performed at the front end via query modification. By contrast, we present in this paper the first study about a threat that occurs at the back end of a text-to-image retrieval (T2IR) system. Our study is motivated by the fact that the image collection indexed by the system will be regularly updated due to the arrival of new images from various sources such as web crawlers and advertisers. With malicious images indexed, it is possible for an attacker to indirectly interfere with the retrieval process, letting users see certain images that are completely irrelevant w.r.t. their queries. We put this thought into practice by proposing a novel Trojan-horse attack (THA). In particular, we construct a set of Trojan-horse images by first embedding word-specific adversarial information into a QR code and then putting the code on benign advertising images. A proof-of-concept evaluation, conducted on two popular T2IR datasets (Flickr30k and MS-COCO), shows the effectiveness of the proposed THA in a white-box mode.
翻译:虽然根据深层次学习的图像检索据报容易受到对抗性攻击,但现有的作品主要是通过查询修改在前端进行攻击的图像到图像检索,与此相反,我们在本文件中提出了关于文本到图像检索系统(T2IR)后端发生的威胁的第一份研究报告。我们的研究的动机是,由于网络爬行者和广告商等各种来源的新图像的到来,系统索引化的图像收集将定期更新。在对恶意图像进行索引化后,攻击者有可能间接干扰检索过程,让用户看到某些完全无关的图像。我们通过提出一部新的Trojan-homa攻击(THA)系统(THA),将这一想法付诸实践。特别是,我们首先将特定字词的对抗信息嵌入QR代码,然后将代码放入良性广告图像。在两个广受欢迎的 T2IR数据集(Flikr30k和MS-CO)上进行了概念验证评估,对两个广受欢迎的 THA(Frik30k)和M-CO-BAR 模式中的拟议THA-BAR-FA的效能展示。</s>