skip to main content
10.1145/3421515.3421532acmotherconferencesArticle/Chapter ViewAbstractPublication PagessspsConference Proceedingsconference-collections
research-article

DeepFake Detection Algorithms: A Meta-Analysis

Published:17 December 2020Publication History

ABSTRACT

We analyzed the developed methods of computer vision in areas associated with recognition and detection of DeepFakes using various models and architectures of neural networks: mainly GAN and CNN. We also discussed the main types and models of these networks that are most effective in detecting and recognizing objects from different data sets, which were provided in the studied articles.

References

  1. Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. Mesonet: a compact facial video forgery detection network. In IEEE International Workshop on Information Forensics and Security (WIFS), 2018.Google ScholarGoogle ScholarCross RefCross Ref
  2. Xin Yang, Yuezun Li, and Siwei Lyu. Exposing deep fakes using inconsistent head poses. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019.Google ScholarGoogle ScholarCross RefCross Ref
  3. Jun-Yan Zhu, Philipp Krähenbühl, Eli Shechtman, and Alexei A Efros. Generative visual manipulation on the natural image manifold. In European Conference on Computer Vision, pages 597–613. Springer, 2016.Google ScholarGoogle Scholar
  4. Raymond A Yeh, Chen Chen, Teck Yian Lim, Alexander G Schwing, Mark Hasegawa-Johnson, and Minh N Do. Semantic image inpainting with deep generative models. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5485–5493, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014.Google ScholarGoogle Scholar
  6. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2012, pp. 1097–1105/Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A Efros. Image-to-image translation with conditional adversarial networks. In CVPR, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  8. K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In ICLR, 2015.Google ScholarGoogle Scholar
  9. Pavel Korshunov and Sébastien Marcel. Deepfakes: a new threat to face recognition? assessment and detection. arXiv preprint arXiv:1812.08685, 2018.Google ScholarGoogle Scholar
  10. Y. Li and S.Li. Exposing DeepFake videos by detecting face warping artifacts. arXiv preprint arXiv: 1811.00656, 2019Google ScholarGoogle Scholar
  11. Martin Arjovsky, Soumith Chintala, and Léon Bottou. Wasserstein gan. arXiv preprint arXiv:1701.07875, 2017.Google ScholarGoogle Scholar
  12. Aayush Bansal, Shugao Ma, Deva Ramanan, and Yaser Sheikh. Recycle-gan: Unsupervised video retargeting. In ECCV, 2018.Google ScholarGoogle Scholar
  13. Yunjey Choi, Minje Choi, Munyoung Kim, Jung-Woo Ha, Sunghun Kim, and Jaegul Choo. Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In CVPR, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ming-Yu Liu, Thomas Breuel, and Jan Kautz. Unsupervised image-to-image translation networks. In NIPS, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A.Karnewar, O.Wang, R.S. Iyengar. MSG-GAN: Multi-scale gradient GAN for stable image synthesis. arXiv preprint arXiv: 1903.06048, 2019Google ScholarGoogle Scholar
  16. D. O'Sullivan. When seeing is no longer believing. CNN Business, 2017.Google ScholarGoogle Scholar
  17. DeepTrace. The state of DeepFakes: Landscape, Threats and Impact. September 2019Google ScholarGoogle Scholar
  18. G. Saon, H.-K. J. Kuo, S. Rennie, and M. Picheny. The ibm 2015 english conversational telephone speech recognition system. arXiv preprint arXiv:1505.05899, 2015Google ScholarGoogle Scholar
  19. M. Alzantot, B. Balaji, and M. Srivastava. Did you hear that? adversarial examples against automatic speech recognition. arXiv preprint arXiv:1801.00554, 2018Google ScholarGoogle Scholar
  20. A. Hannun, C. Case, J. Casper, B. Catanzaro, G. Diamos, E. Elsen, R. Prenger, S. Satheesh, S. Sengupta, A. Coates, and A. Y. Ng. Deepspeech: Scaling up end-to-end speech recognition. arXiv:1412.5567,2014.Google ScholarGoogle Scholar
  21. D. Wang and J. Chen. Supervised speech separation based on deeplearning: An overview. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 26(10):1702–1726, 2018.Google ScholarGoogle Scholar
  22. Thanh Thi Nguyen, Cuong M. Nguyen, Dung Tien Nguyen, Duc Thanh Nguyen, Saeid Nahavandi, Deep learning for Deepfakes creation and Detection. Preprint. September 2019. URL: https://arxiv.org/abs/1909.11573Google ScholarGoogle Scholar
  23. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  24. Andrew Brock, Jeff Donahue, and Karen Simonyan. Large scale gan training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096, 2018.Google ScholarGoogle Scholar
  25. M. Pividori, G.L. Grinblat, L.C. Uzal. Exploiting GAN Internal capacity for high-quality reconstruction of natural images. arXiv preprint arXiv: 1911.05630, 2019Google ScholarGoogle Scholar
  26. Y. LeCun and C. Cortes, “MNIST handwritten digit database,” http://yann.lecun.com/exdb/mnist/, 2010.Google ScholarGoogle Scholar
  27. A. Krizhevsky, V. Nair, and G. Hinton, “Cifar-10 (canadian institute for advanced research),” http://www.cs.toronto.edu/ kriz/cifar.html, 2010.Google ScholarGoogle Scholar
  28. K. He, X. Zhang, S. Ren, and J. Sun, “Delving deep into rectifiers: Surpassing human-level performance on imagenet classification,” CoRR, vol. abs/1502.01852, 2015.Google ScholarGoogle Scholar
  29. J. Redmon and A. Farhadi, “Yolov3: An incremental improvement,” arXiv preprint arXiv:1804.02767, 2018.Google ScholarGoogle Scholar
  30. S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks,” in Advances in neural information processing systems, 2015, pp. 91–99.Google ScholarGoogle Scholar
  31. G. Tzelepis, A.Azif, S. Baci, S. Cavdar, E.E. Aksoy. Deep neural network compression for image classification and object detection. . arXiv preprint arXiv: 1910.02747, 2019Google ScholarGoogle Scholar
  32. Y.Li, X. Yang, P.Sun, H. Qi, S. Lyu. Celeb-DF(v2): a new dataset for DeepFake Forensics. arXiv preprint arXiv: 1909.12962, 2019.Google ScholarGoogle Scholar
  33. F. Marra, D. Gragnaniello, D. Cozzolino, , “Detection of gan generated fake images over social networks,” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 384–389, IEEE (2018).Google ScholarGoogle ScholarCross RefCross Ref
  34. Xin Yang, Yuezun Li, and Siwei Lyu. Exposing deep fakes using inconsistent head poses. In ICASSP, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  35. Peng Zhou, Xintong Han, Vlad I Morariu, and Larry S Davis. Two-stream neural networks for tampered face detection. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, pages 1831–1839, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  36. R. Valle, U. CNMAT, W. Cai, , “Tequilagan: How to easily identify gan samples,” arXiv preprint arXiv:1807.04919Google ScholarGoogle Scholar
  37. S. McCloskey and M. Albright, “Detecting gan-generated imagery using color cues,” arXiv preprint arXiv:1812.08247Google ScholarGoogle Scholar
  38. A.E. Dirik, S.Bayram, H.T.Sencar, , “New features to identify computer generated images,” in Image Processing, 2007.ICIP2007. IEEE International Conference on, 4, IV–433, IEEEGoogle ScholarGoogle Scholar
  39. B. Mader, M. S. Banks, and H. Farid, “Identifying computer generated portraits: The importance of training and incentives,” Perception 46(9), 1062–1076(2017)Google ScholarGoogle ScholarCross RefCross Ref
  40. J.-Y. Zhu, T. Park, P. Isola, , “Unpaired image-to-image translation using cycle-consistent adversarial networks,” in IEEE International Conference on Computer Vision, (2017).Google ScholarGoogle ScholarCross RefCross Ref
  41. L. Nataraj, T.M. Mohammed, S. Chandrasekaran, A. Flenner, J.H. Bappy, A.K. Roy-Chowdhury, B.S. Manjunath. Detecting gan generated fake images using co-occurrence matrices. arXiv preprint arXiv: 1903.06836, 2019Google ScholarGoogle Scholar
  42. Z. Liu, P. Luo, X. Wang, , “Deep learning face attributes in the wild,” in Proceedings of the IEEE International Conference on Computer Vision, 3730–3738 (2015).Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Y. Choi, M. Choi, M. Kim, , “Stargan: Unified generative adversarial networks for multi-domain image-to-image translation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8789–8797 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  44. X. Zhang, S. Karaman, S.F Chang. Detecting and simulating artifacts in GAN Fake images (Extended version). arXiv preprint arXiv: 1907.06515,2019.Google ScholarGoogle Scholar
  45. Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014.Google ScholarGoogle Scholar
  46. S. Klus, P. Gelb. Tensor-based algorithms for image classification. arXiv preprint arXiv: 1910.02150, 2019Google ScholarGoogle Scholar
  47. S. McCloskey, M. Albright. Detecting GAN-generated Imagery using color cues. arXiv preprint arXiv: 1812.08247, 2018Google ScholarGoogle Scholar
  48. T. Murakami, R. Fujita, T. Ohki, Y. Kaga, M. Fujio, and K. Takahashi ‘‘Cancelable permutation-based indexing for secure and efficient biometric identification,’’ in IEEE Access, vol. 7, pp. 45563-45582, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  49. T. Yanagawa, S. Aoki, and T. Oyama, ‘‘Diversity of human finger vein patterns and its application to personal identification,’’ Bull. Inform. Cybern.,vol. 41, no. 1, pp. 1–9, 2007.Google ScholarGoogle Scholar
  50. T. Piplani, N. Merill and J. Chuang, "Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks," 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2018, pp. 1-7.Google ScholarGoogle Scholar
  51. T.Adviser [Электронный ресурс] URL: http://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:DeepFakeGoogle ScholarGoogle Scholar
  52. H. Hukkelas, R.Mestar and F. Lindseth. DeepPrivacy: A generative adversarial network for face anonymization. arXiv preprint arXiv: 1909.04538, 2019Google ScholarGoogle Scholar
  53. Roman, D., Natalia, P. Artificial intelligence legal policy: Limits of use of some kinds of AI // ACM International Conference Proceeding Series, Part F147956, 2019. P. 343-346.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SSPS '20: Proceedings of the 2020 2nd Symposium on Signal Processing Systems
    July 2020
    125 pages
    ISBN:9781450388627
    DOI:10.1145/3421515

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 December 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format