2022
DOI: 10.1109/tifs.2022.3169921
|View full text |Cite
|
Sign up to set email alerts
|

Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(12 citation statements)
references
References 51 publications
0
12
0
Order By: Relevance
“…To tackle the malicious use of face swapping, numerous detection methods have been proposed. Most existing works model face swapping detection as a binary classification problem and focus on designing better the features classified on [8], [10], [11], [13], [16], [36], the classifier network [7], [9], [12], [15], [37], [38] or the training policies [14], [39], [40] to improve the accuracy and generalization. For example, low-level artifacts are used in early detection methods, such as face warping artifacts [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To tackle the malicious use of face swapping, numerous detection methods have been proposed. Most existing works model face swapping detection as a binary classification problem and focus on designing better the features classified on [8], [10], [11], [13], [16], [36], the classifier network [7], [9], [12], [15], [37], [38] or the training policies [14], [39], [40] to improve the accuracy and generalization. For example, low-level artifacts are used in early detection methods, such as face warping artifacts [8].…”
Section: Related Workmentioning
confidence: 99%
“…To tackle the malicious application of face swapping, various detection methods have been proposed. A common way is to model face swapping detection as a binary classification task and collect existing face forgery images to train the classifier [7], [8], [9], [10], [11], [12], [13], [14], [15], [16]. Although these approaches achieve high detection accuracy on benchmark datasets, they still struggle to meet some real-world demands.…”
Section: Introductionmentioning
confidence: 99%
“…Early forged face videos tend to exhibit specific artifacts [37] in both spatial and temporal domains, which inspires some works to exploit hand-crafted features for forgery detection, such as lack of eye blinking [8], inconsistency of head pose [9], and heart rate artifacts [38]. Powerful as deep models are, recent works take the Xception [39] and EfficientNet [31] as backbone and incorporate various types of prior knowledge to boost the detection performance [17], [22], [26], [40]- [43]. For instance, Face X-ray [23] learns to identify the boundary inconsistency left by the blending operation in forged images, while SBI [24] enhances the blending artifact by synthesizing more challenging fake samples in a self-blending manner.…”
Section: A Prior Knowledge-based Face Forgery Detectionmentioning
confidence: 99%
“…In [16]- [19], various subtle and finegrained clues have been identified as significant evidence for face forgery detection. The experts' prior forgery knowledge, including noise patterns [20]- [22], boundary artifacts [23], [24], and frequency information [25], [26], have been widely studied to improve the generalization capability. However, these specific clues can be easily targeted by an expert attacker and are not robust to various image distortions.…”
Section: Introductionmentioning
confidence: 99%
“…However, these methods suffer from limited accuracy and low generalization capability. Thanks to the advent of artificial intelligence and deep learning, many learning-based detection methods [34,32,10,26,18,30] have been proposed and achieved outstanding detection performance under intra-domain settings. Nonetheless, learning-based methods are prone to overfitting to the training data, resulting in dramatic performance drops when deployed to unforeseen domains.…”
Section: Introductionmentioning
confidence: 99%