{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:27:35Z","timestamp":1760059655403,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T00:00:00Z","timestamp":1750982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hainan Province Science and Technology Special Fund","award":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"],"award-info":[{"award-number":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"]}]},{"name":"Hainan Engineering Research Center for Virtual Reality Technology and Systems","award":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"],"award-info":[{"award-number":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"]}]},{"name":"Innovation Platform for Academicians of Hainan Province","award":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"],"award-info":[{"award-number":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"]}]},{"DOI":"10.13039\/501100010834","name":"Education Department of Hainan Province","doi-asserted-by":"publisher","award":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"],"award-info":[{"award-number":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"]}],"id":[{"id":"10.13039\/501100010834","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sanya Science and Technology Special Fund","award":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"],"award-info":[{"award-number":["ZDYF2024GXJS034","Qiong fa Gai gao ji [2023] 818","YSPTZX202036","Hnky2024ZD-24","2022KJCX30"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>With the widespread adoption of deep learning in critical domains, such as computer vision, model security has become a growing concern. Backdoor attacks, as a highly stealthy threat, have emerged as a significant research topic in AI security. Existing backdoor attack methods primarily introduce perturbations in the spatial domain of images, which suffer from limitations, such as visual detectability and signal fragility. Although subsequent approaches, such as those based on steganography, have proposed more covert backdoor attack schemes, they still exhibit various shortcomings. To address these challenges, this paper presents HCBA (high-frequency chroma backdoor attack), a novel backdoor attack method based on high-frequency injection in the UV chroma channels. By leveraging discrete wavelet transform (DWT), HCBA embeds a polarity-triggered perturbation in the high-frequency sub-bands of the UV channels in the YUV color space. This approach capitalizes on the human visual system\u2019s insensitivity to high-frequency signals, thereby enhancing stealthiness. Moreover, high-frequency components exhibit strong stability during data transformations, improving robustness. The frequency-domain operation also simplifies the trigger embedding process, enabling high attack success rates with low poisoning rates. Extensive experimental results demonstrate that HCBA achieves outstanding performance in terms of both stealthiness and evasion of existing defense mechanisms while maintaining a high attack success rate (ASR &gt; 98.5%). Specifically, it improves the PSNR by 25% compared to baseline methods, with corresponding enhancements in SSIM as well.<\/jats:p>","DOI":"10.3390\/sym17071014","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T03:54:28Z","timestamp":1751255668000},"page":"1014","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Chroma Backdoor: A Stealthy Backdoor Attack Based on High-Frequency Wavelet Injection in the UV Channels"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6460-5454","authenticated-orcid":false,"given":"Yukang","family":"Fan","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Hainan Normal University, Haikou 570100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9195-8000","authenticated-orcid":false,"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan Normal University, Haikou 570100, China"}]},{"given":"Bing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Hainan Engineering Research Center for Virtual Reality Technology and Systems, Hainan Vocational University of Science and Technology, Haikou 570100, China"}]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan Normal University, Haikou 570100, China"}]},{"given":"Jinyang","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan Normal University, Haikou 570100, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4933-4691","authenticated-orcid":false,"given":"Wenting","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Hainan Normal University, Haikou 570100, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, K., Bilal, A., Zhou, Y., Fan, Y., Pan, W., Xie, X., and Peng, Q. (2025). An Integrated CSPPC and BiLSTM Framework for Malicious URL Detection. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-91148-z"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"110177","DOI":"10.1016\/j.engappai.2025.110177","article-title":"A novel semi-local centrality to identify influential nodes in complex networks by integrating multidimensional factors","volume":"145","author":"Zhang","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"100918","DOI":"10.1016\/j.iot.2023.100918","article-title":"Towards an Automatic Deployment Model of IoT Services in Fog Computing Using an Adaptive Differential Evolution Algorithm","volume":"24","author":"Zhang","year":"2023","journal-title":"Internet Things"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"101798","DOI":"10.1016\/j.jksuci.2023.101798","article-title":"Towards identifying influential nodes in complex networks using semi-local centrality metrics","volume":"35","author":"Zhang","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Asry, C.E.L., Benchaji, I., Douzi, S., Ouahidi, B.E.L., and Ukwandu, E. (2025). Enhancing cybersecurity: A high-performance intrusion detection approach through boosting minority class recognition. PLoS ONE, 20.","DOI":"10.1371\/journal.pone.0317346"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhao, G., Liu, P., Sun, K., Yang, Y., Lan, T., Yang, H., and Rustam, F. (2023). Research on data imbalance in intrusion detection using CGAN. PLoS ONE, 18.","DOI":"10.1371\/journal.pone.0291750"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Barni, M., Kallas, K., and Tondi, B. (2019, January 22\u201325). A new backdoor attack in cnns by training set corruption without label poisoning. Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP), Taipei, Taiwan.","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1093\/comjnl\/bxad100","article-title":"Sparse Backdoor Attack Against Neural Networks","volume":"67","author":"Zhong","year":"2024","journal-title":"Comput. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","article-title":"Badnets: Evaluating backdooring attacks on deep neural networks","volume":"7","author":"Gu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., and Song, D. (2017). Targeted backdoor attacks on deep learning systems using data poisoning. arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4769","DOI":"10.1109\/TCSVT.2019.2959815","article-title":"Feature consistency training with jpeg compressed images","volume":"30","author":"Wan","year":"2019","journal-title":"IEEE Trans. Oncircuits Syst. Video Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/9.855552","article-title":"Gaussian filters for nonlinear filtering problems","volume":"45","author":"Ito","year":"2000","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Saravanan, G., Yamuna, G., and Nandhini, S. (2016, January 6\u20138). Real time implementation of RGB to HSV\/HSI\/HSL and its reverse color space models. Proceedings of the 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India.","DOI":"10.1109\/ICCSP.2016.7754179"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., Just, H.A., Lyu, L., Qiu, M., and Jia, R. (2023, January 26\u201330). Narcissus: A practical clean-label backdoor attack with limited information. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark.","DOI":"10.1145\/3576915.3616617"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104208","DOI":"10.1016\/j.cviu.2024.104208","article-title":"Invisible backdoor attack with attention and steganography","volume":"249","author":"Chen","year":"2024","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., and Lyu, S. (2021, January 11\u201317). Invisible backdoor attack with sample-specific triggers. Proceedings of the IEEE\/CVF International Conference On Computer Vision, Montreal, BC, Canada.","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Jiang, W., Li, H., Xu, G., and Zhang, T. (2023, January 17\u201324). Color backdoor: A robust poisoning attack in color space. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.00786"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5691","DOI":"10.1109\/TIP.2022.3201472","article-title":"Poison ink: Robust and invisible backdoor attack","volume":"31","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s11063-024-11469-4","article-title":"Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient","volume":"56","author":"Yin","year":"2024","journal-title":"Neural Process. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"128902","DOI":"10.1016\/j.neucom.2024.128902","article-title":"Spatialspectral-Backdoor: Realizing backdoor attack for deep neural networks in brain\u2013computer interface via EEG characteristics","volume":"616","author":"Li","year":"2025","journal-title":"Neurocomputing"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zhai, Y., Yang, L., Yang, J., He, L., and Li, Z. (2023). BadDGA: Backdoor attack on LSTM-based domain generation algorithm detector. Electronics, 12.","DOI":"10.3390\/electronics12030736"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"111262","DOI":"10.1016\/j.patcog.2024.111262","article-title":"A trigger-perceivable backdoor attack framework driven by image steganography","volume":"161","author":"Tang","year":"2025","journal-title":"Pattern Recognit."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Liu, J., Peng, C., Tan, W., and Shi, C. (2024). Federated Learning Backdoor Attack Based on Frequency Domain Injection. Entropy, 26.","DOI":"10.3390\/e26020164"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1109\/LSP.2023.3330126","article-title":"Stealthy frequency-domain backdoor attacks: Fourier decomposition and fundamental frequency injection","volume":"30","author":"Ma","year":"2023","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"129424","DOI":"10.1016\/j.neucom.2025.129424","article-title":"Dual-domain based backdoor attack against federated learning","volume":"623","author":"Li","year":"2025","journal-title":"Neurocomputing"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Feng, Y., Ma, B., Zhang, J., Zhao, S., Xia, Y., and Tao, D. (2022, January 18\u201324). Fiba: Frequency-injection based backdoor attack in medical image analysis. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, LA, USA.","DOI":"10.1109\/CVPR52688.2022.02021"},{"key":"ref_27","unstructured":"Huang, K., Li, Y., Wu, B., Qin, Z., and Ren, K. (2022). Backdoor defense via decoupling the training process. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wang, B., Yao, Y., Shan, S., Li, H., Viswanath, B., Zheng, H., and Zhao, B.Y. (2019, January 19\u201323). Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. Proceedings of the 2019 IEEE symposium on security and privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00031"},{"key":"ref_29","first-page":"9727","article-title":"Effective backdoor defense by exploiting sensitivity of poisoned samples","volume":"35","author":"Chen","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_30","unstructured":"Li, Y., Lyu, X., Ma, X., Koren, N., Lyu, L., Li, B., and Jiang, Y.G. (2023, January 23\u201329). Reconstructive neuron pruning for backdoor defense. Proceedings of the 40th International Conference on Machine Learning, Honolulu, HI, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2024.3361661","article-title":"Stealthy backdoor attack for code models","volume":"50","author":"Yang","year":"2024","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_32","unstructured":"Yin, J.L., Wang, W., Lin, W., and Liu, X. (March, January 25). Adversarial-Inspired Backdoor Defense via Bridging Backdoor and Adversarial Attacks. Proceedings of the AAAI Conference on Artificial Intelligence, Philadelphia, PA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sharma, Y., Ding, G.W., and Brubaker, M. (2019). On the effectiveness of low frequency perturbations. arXiv.","DOI":"10.24963\/ijcai.2019\/470"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TIP.2025.3539466","article-title":"Contrastive Neuron Pruning for Backdoor Defense","volume":"34","author":"Feng","year":"2025","journal-title":"IEEE Trans. Image Process."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1137\/1031129","article-title":"Continuous and discrete wavelet transforms","volume":"31","author":"Heil","year":"1989","journal-title":"SIAM Rev."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1109\/TSP.2003.810293","article-title":"Short-time Fourier transform: Two fundamental properties and an optimal implementation","volume":"51","author":"Durak","year":"2003","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_37","unstructured":"Krizhevsky, A., and Hinton, G. (2009). Learning Multiple Layers of Features from Tiny Images, Toronto University. Technical report."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., and Igel, C. (August, January 31). The German traffic sign recognition benchmark: A multi-class classification competition. Proceedings of the 2011 International Joint Conference on Neural Networks, San Jose, CA, USA.","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., and Batra, D. (2017, January 22\u201329). Grad-cam: Visual explanations from deep networks via gradient-based localization. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1014\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:00:10Z","timestamp":1760032810000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,27]]},"references-count":39,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["sym17071014"],"URL":"https:\/\/doi.org\/10.3390\/sym17071014","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2025,6,27]]}}}