Poison Ink: Robust and Invisible Backdoor Attack

Jie Zhang, Dongdong Chen*, Qidong Huang, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

86 Citations (Scopus)

Abstract

Recent research shows deep neural networks are vulnerable to different types of attacks, such as adversarial attacks, data poisoning attacks, and backdoor attacks. Among them, backdoor attacks are the most cunning and can occur in almost every stage of the deep learning pipeline. Backdoor attacks have attracted lots of interest from both academia and industry. However, most existing backdoor attack methods are visible or fragile to some effortless pre-processing such as common data transformations. To address these limitations, we propose a robust and invisible backdoor attack called "Poison Ink". Concretely, we first leverage the image structures as target poisoning areas and fill them with poison ink (information) to generate the trigger pattern. As the image structure can keep its semantic meaning during the data transformation, such a trigger pattern is inherently robust to data transformations. Then we leverage a deep injection network to embed such inputaware trigger pattern into the cover image to achieve stealthiness. Compared to existing popular backdoor attack methods, Poison Ink outperforms both in stealthiness and robustness. Through extensive experiments, we demonstrate that Poison Ink is not only general to different datasets and network architectures but also flexible for different attack scenarios. Besides, it also has very strong resistance against many state-of-the-art defense techniques.
Original languageEnglish
Pages (from-to)5691-5705
JournalIEEE Transactions on Image Processing
Volume31
Online published30 Aug 2022
DOIs
Publication statusPublished - 2022

Funding

This work was supported in part by NSFC under Grant U20B2047, Grant 62072421, Grant 62002334, Grant 62102386, and Grant 62121002; in part by the Exploration Fund Project of University of Science and Technology of China (USTC) under Grant YD3480002001; in part by the Fundamental Research Funds for the Central Universities under Grant WK2100000011 and Grant WK5290000001; and in part by ECS Grant from the Research Grants Council of the Hong Kong under Project CityU 21209119. The work of Gang Hua was supported in part by the National Key Research and Development Program of China under Grant 2018AAA0101400 and in part by NSFC under Grant 61629301. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Bart Goossens.

Research Keywords

  • Backdoor attack
  • flexibility
  • generality
  • robustness
  • stealthiness

RGC Funding Information

  • RGC-funded

Fingerprint

Dive into the research topics of 'Poison Ink: Robust and Invisible Backdoor Attack'. Together they form a unique fingerprint.

Cite this