FakeTracer: Catching Face-Swap DeepFakes via Implanting Traces in Training

被引:0
作者
Sun, Pu [1 ]
Qi, Honggang [1 ]
Li, Yuezun [2 ]
Lyu, Siwei [3 ]
机构
[1] Univ Chinese Acad Sci, Beijing 101408, Peoples R China
[2] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266005, Shandong, Peoples R China
[3] SUNY Buffalo, Amherst, NY 14068 USA
基金
中国博士后科学基金;
关键词
DeepFake; multimedia forensics; proactive defence;
D O I
10.1109/TETC.2024.3386960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face-swap DeepFake is an emerging AI-based face forgery technique that can replace the original face in a video with a generated face of the target identity while retaining consistent facial attributes such as expression and orientation. Due to the high privacy of faces, the misuse of this technique can raise severe social concerns, drawing tremendous attention to defend against DeepFakes recently. In this article, we describe a new proactive defense method called FakeTracer to expose face-swap DeepFakes via implanting traces in training. Compared to general face-synthesis DeepFake, the face-swap DeepFake is more complex as it involves identity change, is subjected to the encoding-decoding process, and is trained unsupervised, increasing the difficulty of implanting traces into the training phase. To effectively defend against face-swap DeepFake, we design two types of traces, sustainable trace (STrace) and erasable trace (ETrace), to be added to training faces. During the training, these manipulated faces affect the learning of the face-swap DeepFake model, enabling it to generate faces that only contain sustainable traces. In light of these two traces, our method can effectively expose DeepFakes by identifying them. Extensive experiments corroborate the efficacy of our method on defending against face-swap DeepFake.
引用
收藏
页码:134 / 146
页数:13
相关论文
共 43 条
[1]  
Afchar D, 2018, IEEE INT WORKS INFOR
[2]  
Agarwal S., 2019, P IEEE C COMP VIS PA, P38, DOI DOI 10.4108/EAI.18-7-2019
[3]   Deepfakes Generation and Detection: A Short Survey [J].
Akhtar, Zahid .
JOURNAL OF IMAGING, 2023, 9 (01)
[4]  
Asnani V., 2022, P IEEE C COMP VIS PA, p15 386
[5]  
Asnani V, 2023, Arxiv, DOI arXiv:2106.07873
[6]   A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment [J].
Chen, Beijing ;
Tan, Weijin ;
Coatrieux, Gouenou ;
Zheng, Yuhui ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 23 :3506-3517
[7]  
Ciftci Umur Aybars, 2020, IEEE Trans Pattern Anal Mach Intell, VPP, DOI 10.1109/TPAMI.2020.3009287
[8]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[9]  
Gu QQ, 2022, AAAI CONF ARTIF INTE, P735
[10]   Rethinking gradient operator for exposing AI-enabled face forgeries [J].
Guo, Zhiqing ;
Yang, Gaobo ;
Zhang, Dengyong ;
Xia, Ming .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 215