2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2017
DOI: 10.1109/cvprw.2017.229
|View full text |Cite
|
Sign up to set email alerts
|

Two-Stream Neural Networks for Tampered Face Detection

Abstract: We propose a two-stream network for face tampering detection. We train GoogLeNet to detect tampering artifacts in a face classification stream, and train a patch based triplet network to leverage features capturing local noise residuals and camera characteristics as a second stream. In addition, we use two different online face swapping applications to create a new dataset that consists of 2010 tampered images, each of which contains a tampered face. We evaluate the proposed two-stream network on our newly col… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
269
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 504 publications
(272 citation statements)
references
References 21 publications
0
269
0
3
Order By: Relevance
“…Recent work on image forensics utilizes clues such as local noise features [35,26] and Camera Filter Array (CFA) patterns [19] to classify a specific patch or pixel [11] in an image as tampered or not, and localize the tampered regions [19,9,6]. Most of these methods focus on a single tampering technique.…”
Section: Introductionmentioning
confidence: 99%
“…Recent work on image forensics utilizes clues such as local noise features [35,26] and Camera Filter Array (CFA) patterns [19] to classify a specific patch or pixel [11] in an image as tampered or not, and localize the tampered regions [19,9,6]. Most of these methods focus on a single tampering technique.…”
Section: Introductionmentioning
confidence: 99%
“…While recent state-of-the-art visual forensics techniques demonstrate impressive results for detecting fake visual media [16,53,27,13,22,11,35,67,68,26], they have only focused on semantic, physical, or statistical inconsistency of specific forgery scenarios, e.g., copy-move manipulations [16,26] or face swapping [67]. Forensics on GAN-generated images [44,47,59] shows good accuracy, but each method operates on only one GAN architecture by identifying its unique artifacts and results deteriorate when the GAN architecture is changed.…”
Section: Introductionmentioning
confidence: 99%
“…Xin et al [13] proposed a new method to detect and identify video forgery based on the inconsistency of the head positions. Peng et al [14] proposed a two-stream network for face tamper detection. GoogleNet is trained to detect tampering artifacts in the face classification stream, and a patch on the basis of the triplet network is trained to leverage features capturing partial noise residuals and camera characteristics as the second stream.…”
Section: Introductionmentioning
confidence: 99%