2019 IEEE/CVF International Conference on Computer Vision (ICCV) 2019
DOI: 10.1109/iccv.2019.00009
|View full text |Cite
|
Sign up to set email alerts
|

FaceForensics++: Learning to Detect Manipulated Facial Images

Abstract: Figure 1: FaceForensics++ is a dataset of facial forgeries that enables researchers to train deep-learning-based approaches in a supervised fashion. The dataset contains manipulations created with four state-of-the-art methods, namely, Face2Face, FaceSwap, DeepFakes, and NeuralTextures. AbstractThe rapid progress in synthetic image generation and manipulation has now come to a point where it raises significant concerns for the implications towards society. At best, this leads to a loss of trust in digital cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

17
1,811
2
9

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 1,812 publications
(1,839 citation statements)
references
References 62 publications
17
1,811
2
9
Order By: Relevance
“…In our evaluation of the proposed method, we first tested the improvements made to the Capsule-Forensics network: (1) using a larger input size (300 × 300), (2) using dropout on training, and (3) using a larger number of primary capsules (ten). To make the results more convincing, we tested these settings on a large and challenging database -the FaceForensics++ database [27], which focuses on computermanipulated images and videos. After figuring out the best settings, we evaluated its ability to detect fully computergenerated images and presentation attacks.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our evaluation of the proposed method, we first tested the improvements made to the Capsule-Forensics network: (1) using a larger input size (300 × 300), (2) using dropout on training, and (3) using a larger number of primary capsules (ten). To make the results more convincing, we tested these settings on a large and challenging database -the FaceForensics++ database [27], which focuses on computermanipulated images and videos. After figuring out the best settings, we evaluated its ability to detect fully computergenerated images and presentation attacks.…”
Section: Discussionmentioning
confidence: 99%
“…To illustrate how Capsule-Forensics works, we used a Capsule-Forensics network with three primary capsules trained on the FaceForensics++ database [27]. We applied both regularizations (using random noise and dropout during training) and used images cropped to 300×300.…”
Section: How Capsule-forensics Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning provides a good tool kit for feature discovery from data; however, it is necessarily data hungry. In fields such as video tampering, a large, labelled and sufficiently varied dataset which encompasses multiple examples from many recent techniques does not yet exist, although [4] and its recent successor [5] show great promise. In fast moving fields, a complete dataset may never exist as, in the time taken to gather and label the data, many more new and improved techniques will be discovered.…”
Section: Introductionmentioning
confidence: 99%
“…The program has aided the development of technologies ranging from low-level detectors of image manipulation to high-level analysis programs that can establish the provenance of media content. With respect to the former, software now exists to detect photoshopped (or altered) images (Farid 2016), deepfake videos (Rössler et al 2019), and voice-swapped audio (Agarwal et al 2019). With respect to the latter, novel algorithms can perform sophisticated data mining operations to identify related content and trace the order of its creation.…”
mentioning
confidence: 99%