Corpus ID: 210921129

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles

@article{Huang2020FakeLocatorRL,
  title={FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles},
  author={Yihao Huang and Felix Juefei-Xu and Run Wang and Xiaofei Xie and L. Ma and Jianwen Li and Weikai Miao and Yang Liu and G. Pu},
  journal={ArXiv},
  year={2020},
  volume={abs/2001.09598}
}
Nowadays, full face synthesis and partial face manipulation by virtue of the generative adversarial networks (GANs) have raised wide public concern. In the digital media forensics area, detecting and ultimately locating the image forgery have become imperative. Although many methods focus on fake detection, only a few put emphasis on the localization of the fake regions. Through analyzing the imperfection in the upsampling procedures of the GAN-based methods and recasting the fake localization… Expand
Amora: Black-box Adversarial Morphing Attack
TLDR
This work investigates and introduces a new type of adversarial attack to evade FR systems by manipulating facial content, called adversarial morphing attack (a.k.a. Amora), and indicates that a novel black-box adversarial attacked based on local deformation is possible, and is vastly different from additive noise attacks. Expand
DeepTag: Robust Image Tagging for DeepFake Provenance.
TLDR
A deep learning-based approach with a simple yet effective encoder and decoder design to embed message to the facial image, which is to recover the embedded message after various drastic GAN-based DeepFake transformation with high confidence. Expand
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
TLDR
This paper proposes the adversarial denoise attack aiming to simultaneously denoise input images while fooling DNNs and identifies a totally new task that stealthily embeds attacks inside image denoising module widely deployed in multimedia devices as an image post-processing operation. Expand
Adversarial Exposure Attack on Diabetic Retinopathy Imagery
TLDR
The method reveals the potential threats to the DNN-based DR automated diagnosis and can definitely benefit the development of exposure-robust automated DR diagnosis method in the future. Expand
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices
TLDR
This work proposes a novel approach, named DeepSonar, based on monitoring neuron behaviors of speaker recognition system, i.e., a deep neural network (DNN), to discern AI-synthesized fake voices, and poses a new insight into adopting neuron behaviors for effective and robust AI aided multimedia fakes forensics as an inside-out approach. Expand
DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms
TLDR
This work proposes DeepRhythm, a DeepFake detection technique that exposes DeepFakes by monitoring the heartbeat rhythms, and utilizes dual-spatial-temporal attention to adapt to dynamically changing face and fake types. Expand
Representative Forgery Mining for Fake Face Detection
TLDR
This work proposes an attention-based data augmentation framework to guide detector refine and enlarge its attention, and tracks and occludes the Top-N sensitive facial regions, encouraging the detector to mine deeper into the regions ignored before for more representative forgery. Expand
Countering Malicious DeepFakes: Survey, Battleground, and Horizon
TLDR
A comprehensive overview and detailed analysis of the research work on the topic of DeepFake generation, DeepFake detection as well as evasion of Deepfake detection, with more than 191 research papers carefully surveyed is provided. Expand
Detection of Fake and Fraudulent Faces via Neural Memory Networks
TLDR
A Hierarchical Attention Memory Network (HAMN), motivated by the social cognition processes of the human brain, for the detection of fake faces is proposed, which renders a generalisable face tampering detection framework. Expand
...
1
2
...

References

SHOWING 1-10 OF 54 REFERENCES
Complement Face Forensic Detection and Localization with FacialLandmarks
TLDR
The proposed dataset is the first rigorous face forensic localization dataset and can coherently predict face forensic detection and localization to outperform the previous state-of-the-art techniques on the newly proposed dataset as well as the faceforecsic++ dataset especially on low-quality videos. Expand
Fake Faces Identification via Convolutional Neural Network
TLDR
This paper proposes a Convolutional Neural Network (CNN) based method to identify fake face images generated by the current best method, and provides experimental evidences to show that the proposed method can achieve satisfactory results with an average accuracy over 99.4%. Expand
FaceForensics++: Learning to Detect Manipulated Facial Images
TLDR
This paper proposes an automated benchmark for facial manipulation detection, and shows that the use of additional domain-specific knowledge improves forgery detection to unprecedented accuracy, even in the presence of strong compression, and clearly outperforms human observers. Expand
Deep Learning Based Computer Generated Face Identification Using Convolutional Neural Network
Generative adversarial networks (GANs) describe an emerging generative model which has made impressive progress in the last few years in generating photorealistic facial images. As the result, it hasExpand
Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints
TLDR
The first study of learning GAN fingerprints towards image attribution and using them to classify an image as real or GAN-generated is presented, showing that GANs carry distinct model fingerprints and leave stable fingerprints in their generated images, which support image attribution. Expand
Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos
TLDR
A convolutional neural network is designed that uses the multi-task learning approach to simultaneously detect manipulated images and videos and locate the manipulated regions for each query and fine-tuning using just a small amount of data enables the network to deal with unseen attacks. Expand
AttGAN: Facial Attribute Editing by Only Changing What You Want
TLDR
The proposed method is extended for attribute style manipulation in an unsupervised manner and outperforms the state-of-the-art on realistic attribute editing with other facial details well preserved. Expand
Analyzing and Improving the Image Quality of StyleGAN
TLDR
This work redesigns the generator normalization, revisit progressive growing, and regularize the generator to encourage good conditioning in the mapping from latent codes to images, and thereby redefines the state of the art in unconditional image modeling. Expand
Detecting and Simulating Artifacts in GAN Fake Images
TLDR
A GAN simulator, AutoGAN, is proposed, which can simulate the artifacts produced by the common pipeline shared by several popular GAN models, and identifies a unique artifact caused by the up-sampling component included in the common GAN pipelines. Expand
STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing
Arbitrary attribute editing generally can be tackled by incorporating encoder-decoder and generative adversarial networks. However, the bottleneck layer in encoder-decoder usually gives rise toExpand
...
1
2
3
4
5
...