Fooling the Image Dehazing Models by First Order Gradient

The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on circuits and systems for video technology 2024-07, Vol.34 (7), p.6265-6278
Hauptverfasser: Gui, Jie, Cong, Xiaofeng, Peng, Chengwei, Tang, Yuan Yan, Kwok, James Tin-Yau
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6278
container_issue 7
container_start_page 6265
container_title IEEE transactions on circuits and systems for video technology
container_volume 34
creator Gui, Jie
Cong, Xiaofeng
Peng, Chengwei
Tang, Yuan Yan
Kwok, James Tin-Yau
description The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .
doi_str_mv 10.1109/TCSVT.2024.3357987
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10414993</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10414993</ieee_id><sourcerecordid>3075426585</sourcerecordid><originalsourceid>FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</originalsourceid><addsrcrecordid>eNpNkMFOAjEQhhujiYi-gPHQxPPitNtu26NBF0kwHESvTelOYQmw2C4HfHoX4eBpJpP_mz_5CLlnMGAMzNNs-PE1G3DgYpDnUhmtLkiPSakzzkFedjtIlmnO5DW5SWkFwIQWqkdM2TTrerug7RLpeOMWSF9w6X6Op_emwnWi8wMt65haOo0VRjqKrqpx296Sq-DWCe_Os08-y9fZ8C2bTEfj4fMk81yoNlNCFFoEA5LzKgjgoIUE5gV33syV5-BVAQY0Cy5o6SpfGROU8uALiSbP--Tx9HcXm-89ptaumn3cdpU2ByUFL6SWXYqfUj42KUUMdhfrjYsHy8AeFdk_RfaoyJ4VddDDCaoR8R8gmDBd8y8wx2Bb</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3075426585</pqid></control><display><type>article</type><title>Fooling the Image Dehazing Models by First Order Gradient</title><source>IEEE Electronic Library (IEL)</source><creator>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</creator><creatorcontrib>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</creatorcontrib><description>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</description><identifier>ISSN: 1051-8215</identifier><identifier>EISSN: 1558-2205</identifier><identifier>DOI: 10.1109/TCSVT.2024.3357987</identifier><identifier>CODEN: ITCTEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>adversarial attack and defense ; Algorithms ; Effectiveness ; first order gradient ; Glass box ; Haze ; Image dehazing ; Image restoration ; Perturbation methods ; Robustness ; security ; Superresolution ; Task analysis ; Training</subject><ispartof>IEEE transactions on circuits and systems for video technology, 2024-07, Vol.34 (7), p.6265-6278</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</cites><orcidid>0000-0001-8850-3507 ; 0000-0002-9450-1759 ; 0000-0002-4828-8248 ; 0000-0002-8270-6132 ; 0000-0002-6887-130X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10414993$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10414993$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gui, Jie</creatorcontrib><creatorcontrib>Cong, Xiaofeng</creatorcontrib><creatorcontrib>Peng, Chengwei</creatorcontrib><creatorcontrib>Tang, Yuan Yan</creatorcontrib><creatorcontrib>Kwok, James Tin-Yau</creatorcontrib><title>Fooling the Image Dehazing Models by First Order Gradient</title><title>IEEE transactions on circuits and systems for video technology</title><addtitle>TCSVT</addtitle><description>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</description><subject>adversarial attack and defense</subject><subject>Algorithms</subject><subject>Effectiveness</subject><subject>first order gradient</subject><subject>Glass box</subject><subject>Haze</subject><subject>Image dehazing</subject><subject>Image restoration</subject><subject>Perturbation methods</subject><subject>Robustness</subject><subject>security</subject><subject>Superresolution</subject><subject>Task analysis</subject><subject>Training</subject><issn>1051-8215</issn><issn>1558-2205</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMFOAjEQhhujiYi-gPHQxPPitNtu26NBF0kwHESvTelOYQmw2C4HfHoX4eBpJpP_mz_5CLlnMGAMzNNs-PE1G3DgYpDnUhmtLkiPSakzzkFedjtIlmnO5DW5SWkFwIQWqkdM2TTrerug7RLpeOMWSF9w6X6Op_emwnWi8wMt65haOo0VRjqKrqpx296Sq-DWCe_Os08-y9fZ8C2bTEfj4fMk81yoNlNCFFoEA5LzKgjgoIUE5gV33syV5-BVAQY0Cy5o6SpfGROU8uALiSbP--Tx9HcXm-89ptaumn3cdpU2ByUFL6SWXYqfUj42KUUMdhfrjYsHy8AeFdk_RfaoyJ4VddDDCaoR8R8gmDBd8y8wx2Bb</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Gui, Jie</creator><creator>Cong, Xiaofeng</creator><creator>Peng, Chengwei</creator><creator>Tang, Yuan Yan</creator><creator>Kwok, James Tin-Yau</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8850-3507</orcidid><orcidid>https://orcid.org/0000-0002-9450-1759</orcidid><orcidid>https://orcid.org/0000-0002-4828-8248</orcidid><orcidid>https://orcid.org/0000-0002-8270-6132</orcidid><orcidid>https://orcid.org/0000-0002-6887-130X</orcidid></search><sort><creationdate>20240701</creationdate><title>Fooling the Image Dehazing Models by First Order Gradient</title><author>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>adversarial attack and defense</topic><topic>Algorithms</topic><topic>Effectiveness</topic><topic>first order gradient</topic><topic>Glass box</topic><topic>Haze</topic><topic>Image dehazing</topic><topic>Image restoration</topic><topic>Perturbation methods</topic><topic>Robustness</topic><topic>security</topic><topic>Superresolution</topic><topic>Task analysis</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gui, Jie</creatorcontrib><creatorcontrib>Cong, Xiaofeng</creatorcontrib><creatorcontrib>Peng, Chengwei</creatorcontrib><creatorcontrib>Tang, Yuan Yan</creatorcontrib><creatorcontrib>Kwok, James Tin-Yau</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on circuits and systems for video technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gui, Jie</au><au>Cong, Xiaofeng</au><au>Peng, Chengwei</au><au>Tang, Yuan Yan</au><au>Kwok, James Tin-Yau</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fooling the Image Dehazing Models by First Order Gradient</atitle><jtitle>IEEE transactions on circuits and systems for video technology</jtitle><stitle>TCSVT</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>34</volume><issue>7</issue><spage>6265</spage><epage>6278</epage><pages>6265-6278</pages><issn>1051-8215</issn><eissn>1558-2205</eissn><coden>ITCTEM</coden><abstract>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCSVT.2024.3357987</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-8850-3507</orcidid><orcidid>https://orcid.org/0000-0002-9450-1759</orcidid><orcidid>https://orcid.org/0000-0002-4828-8248</orcidid><orcidid>https://orcid.org/0000-0002-8270-6132</orcidid><orcidid>https://orcid.org/0000-0002-6887-130X</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1051-8215
ispartof IEEE transactions on circuits and systems for video technology, 2024-07, Vol.34 (7), p.6265-6278
issn 1051-8215
1558-2205
language eng
recordid cdi_ieee_primary_10414993
source IEEE Electronic Library (IEL)
subjects adversarial attack and defense
Algorithms
Effectiveness
first order gradient
Glass box
Haze
Image dehazing
Image restoration
Perturbation methods
Robustness
security
Superresolution
Task analysis
Training
title Fooling the Image Dehazing Models by First Order Gradient
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T04%3A24%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fooling%20the%20Image%20Dehazing%20Models%20by%20First%20Order%20Gradient&rft.jtitle=IEEE%20transactions%20on%20circuits%20and%20systems%20for%20video%20technology&rft.au=Gui,%20Jie&rft.date=2024-07-01&rft.volume=34&rft.issue=7&rft.spage=6265&rft.epage=6278&rft.pages=6265-6278&rft.issn=1051-8215&rft.eissn=1558-2205&rft.coden=ITCTEM&rft_id=info:doi/10.1109/TCSVT.2024.3357987&rft_dat=%3Cproquest_RIE%3E3075426585%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3075426585&rft_id=info:pmid/&rft_ieee_id=10414993&rfr_iscdi=true