2021
DOI: 10.1007/978-3-030-67835-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Deep Face Swapping via Cross-Identity Adversarial Training

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Face swapping In face swapping, the face region in an image is completely replaced with a different face while the other components of the image remain untouched [121]. Face swapping is a well-known form of creating deepfake videos, and various models have been proposed for this task (See [92,116,126,190] for some examples). Since face swapping modifies the whole face not some attributes, it is not considered as a face editing task in this survey.…”
Section: Latent Space Interpolationmentioning
confidence: 99%
“…Face swapping In face swapping, the face region in an image is completely replaced with a different face while the other components of the image remain untouched [121]. Face swapping is a well-known form of creating deepfake videos, and various models have been proposed for this task (See [92,116,126,190] for some examples). Since face swapping modifies the whole face not some attributes, it is not considered as a face editing task in this survey.…”
Section: Latent Space Interpolationmentioning
confidence: 99%
“…In general, deepfakes created using autoencoder make the swapped face look like the target face and the source face without paying much attention to the difference between the identity of both the source and the target faces. To produce more deep swapped faces, Yang et al [21] combined Cross-identity adversarial in training.…”
Section: Face Swapmentioning
confidence: 99%
“…Anonymizing facial images is a challenging task, which requires a robust model to modify the original face without destroying the existing data distribution. Existing methods [2][3][4][5][6][7][8] aim to remove all the identification information, and then generate a highly realistic face. These techniques reduce the privacy risks of unnecessary identification, but also destroy the convenience and safety for face recognition.…”
Section: Introductionmentioning
confidence: 99%