Abstract
Maliciously-manipulated images or videos - so-called deep fakes - especially face-swap images and videos have attracted more and more malicious attackers to discredit some key figures. Previous pixel-level artifacts based detection techniques always focus on some unclear patterns but ignore some available semantic clues. Therefore, these approaches show weak interpretability and robustness. In this paper, we propose a biometric information based method to fully exploit the appearance and shape feature for face-swap detection of key figures. The key aspect of our method is obtaining the inconsistency of 3D facial shape and facial appearance, and the inconsistency based clue offers natural interpretability for the proposed face-swap detection method. Experimental results show the superiority of our method in robustness on various laundering and cross-domain data, which validates the effectiveness of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
References
Deepfakes. https://github.com/deepfakes/faceswap. Accessed 07 Nov 2020
Faceswap. https://github.com/MarekKowalski/FaceSwap/. Accessed 07 Nov 2020
Agarwal, S., El-Gaaly, T., Farid, H., Lim, S.N.: Detecting deep-fake videos from appearance and behavior (2020)
Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops (2019)
Blanz, V., Vetter, T.: A morphable model for the synthesis of 3D faces. In: Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques (1999)
Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1800ā1807 (2017)
Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Ferrer, C.C.: The deepfake detection challenge (DFDC) preview dataset (2019)
Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems 27, pp. 2672ā2680 (2014). http://papers.nips.cc/paper/5423-generative-adversarial-nets.pdf
GĆ¼era, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (2018)
Li, L., et al.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (2020)
Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) (2019)
McCloskey, S., Albright, M.: Detecting GaN-generated imagery using color cues (2018)
Mirsky, Y., Lee, W.: The creation and detection of deepfakes: a survey. arXiv: 2004.11138 (2020)
Nirkin, Y., Keller, Y., Hassner, T.: FSGAN: subject agnostic face swapping and reenactment. In: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV) (2019)
Peng, B., Wang, W., Dong, J., Tan, T.: Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 3932ā3936 (2016)
PĆ©rez, P., Gangnet, M., Blake, A.: Poisson image editing. In: ACM SIGGRAPH 2003 Papers (2003)
Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: FaceForensics++: learning to detect manipulated facial images. In: The IEEE International Conference on Computer Vision (ICCV) (2019)
Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., Natarajan, P.: Recurrent convolutional strategies for face manipulation detection in videos. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops (2019)
Tan, M., Le, Q.V.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning(ICML), pp. 6105ā6114 (2019)
Tolosana, R., Vera-RodrĆguez, R., FiĆ©rrez, J., Morales, A., Ortega-Garcia, J.: DeepFakes and beyond: a survey of face manipulation and fake detection. arXiv: 2001.00179 (2020)
Yadav, D., Salmani, S.: DeepFake: a survey on facial forgery technique using generative adversarial network. In: 2019 International Conference on Intelligent Computing and Control Systems (ICCS), pp. 852ā857 (2019)
Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019ā2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8261ā8265 (2019)
Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1831ā1839 (2017)
Zhu, X., Lei, Z., Yan, J., Yi, D., Li, S.Z.: High-fidelity pose and expression normalization for face recognition in the wild. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 787ā796 (2015)
Acknowledgement
This work is supported by the National Key Research and Development Program of China under Grant No. 2020AAA0140003 and the National Natural Science Foundation of China (NSFC) under Grants 61972395, U19B2038.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guan, W., Wang, W., Dong, J., Peng, B., Tan, T. (2022). Robust Face-Swap Detection Based on 3D Facial Shape Information. In: Fang, L., Povey, D., Zhai, G., Mei, T., Wang, R. (eds) Artificial Intelligence. CICAI 2022. Lecture Notes in Computer Science(), vol 13604. Springer, Cham. https://doi.org/10.1007/978-3-031-20497-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-20497-5_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20496-8
Online ISBN: 978-3-031-20497-5
eBook Packages: Computer ScienceComputer Science (R0)