Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction

Scale-space image feature extraction (SSIFE) has been widely adopted in broad areas due to its powerful resilience to attacks. However, the security threat to SSIFE-based applications, which will be addressed in this paper, is relatively unexplored. The security threat to SSIFT (called ST-SSIFE), composed of a constrained-optimization keypoint inhibition attack (KIHA) and a keypoint insertion attack (KISA), is specifically designed in this paper for scale-space feature extraction methods, such as SIFT and SURF. In ST-SSIFE, KIHA aims at making a fool of feature extraction protocols in that the detection rules are purposely violated so as to suppress the existence of a local maximum around a local region. We show that KIHA can be accomplished quickly via Lagrange multiplier but the resultant new keypoint generation (NKG) problem can be solved via Karush Kuhn Tucker (KKT) conditions. In order to leverage among keypoint removal with minimum distortion, suppression of NKG, and complexity, we further present a hybrid scheme of integrating Lagrange multiplier and KKT conditions. On the other hand, KISA is designed via an efficient coarse-to-fine descriptor matching strategy to yield fake feature points so as to create false positives. Experiments, conducted on keypoint removal rate evaluation and an image copy detection method operating on a web-scale image database as a case study, demonstrate the feasibility of our method.

[1]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[2]  Dimitri P. Bertsekas,et al.  Nonlinear Programming , 1997 .

[3]  Jun Jie Foo,et al.  Pruning SIFT for Scalable Near-duplicate Image Matching , 2007, ADC.

[4]  K. Schittkowski,et al.  NONLINEAR PROGRAMMING , 2022 .

[5]  Soo-Chang Pei,et al.  Secure and robust SIFT , 2009, ACM Multimedia.

[6]  Laurent Amsaleg,et al.  Understanding the security and robustness of SIFT , 2010, ACM Multimedia.

[7]  Chun-Shien Lu Wireless multimedia error resilience via a data hiding technique , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[8]  W. Karush Minima of Functions of Several Variables with Inequalities as Side Conditions , 2014 .

[9]  Shuicheng Yan,et al.  Near-duplicate keyframe retrieval by nonrigid image matching , 2008, ACM Multimedia.

[10]  Trevor Darrell,et al.  Efficient image matching with distributions of local invariant features , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[11]  Chun-Shien Lu,et al.  Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication , 2005, Multimedia Systems.

[12]  Xuelong Li,et al.  Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[13]  Chun-Shien Lu,et al.  Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection , 2006, IEEE Transactions on Multimedia.

[14]  Yan Ke,et al.  Efficient Near-duplicate Detection and Sub-image Retrieval , 2004 .

[15]  Laurent Amsaleg,et al.  Deluding image recognition in sift-based cbir systems , 2010, MiFor '10.

[16]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[17]  Laurent Amsaleg,et al.  Challenging the Security of CBIR Systems , 2009 .

[18]  Soo-Chang Pei,et al.  Feature-Based Sparse Representation for Image Similarity Assessment , 2011, IEEE Transactions on Multimedia.

[19]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[20]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[21]  Hefei Ling,et al.  Efficient Image Copy Detection Using Multiscale Fingerprints , 2012, IEEE MultiMedia.

[22]  Justin Zobel,et al.  Detection of near-duplicate images for web search , 2007, CIVR '07.

[23]  Yan Ke,et al.  An efficient parts-based near-duplicate and sub-image retrieval system , 2004, MULTIMEDIA '04.

[24]  Zhu Li,et al.  Video based mobile location search with large set of SIFT points in cloud , 2010, MCMC '10.

[25]  Laurent Amsaleg,et al.  Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[26]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.

[27]  Vitomir Struc,et al.  Adaptation of SIFT Features for Robust Face Recognition , 2010, ICIAR.

[28]  Sharath Pankanti,et al.  Fingerprint verification using SIFT features , 2008, SPIE Defense + Commercial Sensing.