2020
DOI: 10.2352/issn.2470-1173.2020.4.mwsf-116
|View full text |Cite
|
Sign up to set email alerts
|

Detecting “DeepFakes” in H.264 Video Data Using Compression Ghost Artifacts

Abstract: Fast track article for IS&T International Symposium on Electronic Imaging 2020: Media Watermarking, Security, and Forensics proceedings.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…However, the classifier improves upon our previous approach [28] based on ghost artefacts by great extent.…”
Section: Evaluation Resultsmentioning
confidence: 77%
See 1 more Smart Citation
“…However, the classifier improves upon our previous approach [28] based on ghost artefacts by great extent.…”
Section: Evaluation Resultsmentioning
confidence: 77%
“…The performance of our proposed approach and several existing methods, which where evaluated on the FaceForensics++ dataset, are displayed in Table 1. We also compare the proposed method of this paper with our previous approach based on compression ghost artefacts, see [28].…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…The accuracy of this method reaches about 99.68% in detecting GAN images. A new approach to detect deepfake is proposed by [59] based on the "JPEG ghost" algorithm. This algorithm recognizes tampered faces from real ones by analyzing incompatible compression errors.…”
Section: Multimedia Forensics Based Methodsmentioning
confidence: 99%
“…For instance, Koopman et al [ 62 ] analyzed photo response non-uniformity (PRNU) for detection. Also, warping artifacts [ 63 ], eye blinking [ 64 ], optical flow with CNNs [ 65 ], heart rate [ 66 ], image quality [ 28 ], local image textures [ 37 ], long short-term memory (LSTM) and recurrent neural network (RNN) [ 67 ], multi-LSTM and blockchain [ 68 ], clustering [ 69 ], context [ 70 ], compression artifacts [ 71 ], metric learning [ 72 ], CNN ensemble [ 73 ], Identity-aware [ 74 ], transformers [ 75 ], audio-visual dissonance [ 76 ], and multi-attentional [ 77 ] features were used. Very few works have been focused on deepfake detection method’s explainability (e.g., [ 78 ]) and generalization capability (e.g., work of Bekci et al in [ 38 ] and Aneja et al [ 79 ] work using zero-shot learning).…”
Section: Deepfake Generation and Detectionmentioning
confidence: 99%