Thinking in Frequency: Face Forgery Detection by Mining Frequency-Aware Clues

被引:507
作者
Qian, Yuyang [1 ,2 ]
Yin, Guojun [1 ]
Sheng, Lu [3 ]
Chen, Zixuan [1 ,4 ]
Shao, Jing [1 ]
机构
[1] SenseTime Res, Hong Kong, Peoples R China
[2] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[3] Beihang Univ, Coll Software, Beijing, Peoples R China
[4] Northwestern Polytech Univ, Xian, Peoples R China
来源
COMPUTER VISION - ECCV 2020, PT XII | 2020年 / 12357卷
关键词
Face forgery detection; Frequency; Collaborative learning;
D O I
10.1007/978-3-030-58610-2_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As realistic facial manipulation technologies have achieved remarkable progress, social concerns about potential malicious abuse of these technologies bring out an emerging research topic of face forgery detection. However, it is extremely challenging since recent advances are able to forge faces beyond the perception ability of human eyes, especially in compressed images and videos. We find that mining forgery patterns with the awareness of frequency could be a cure, as frequency provides a complementary viewpoint where either subtle forgery artifacts or compression errors could be well described. To introduce frequency into the face forgery detection, we propose a novel Frequency in Face Forgery Network (F-3-Net), taking advantages of two different but complementary frequency-aware clues, 1) frequency-aware decomposed image components, and 2) local frequency statistics, to deeply mine the forgery patterns via our two-stream collaborative learning framework. We apply DCT as the applied frequency-domain transformation. Through comprehensive studies, we show that the proposed F-3 -Net significantly outperforms competing state-of-the-art methods on all compression qualities in the challenging FaceForensics++ dataset, especially wins a big lead upon low-quality media.
引用
收藏
页码:86 / 103
页数:18
相关论文
共 60 条
[1]  
Afchar D, 2018, IEEE INT WORKS INFOR
[2]   DISCRETE COSINE TRANSFORM [J].
AHMED, N ;
NATARAJAN, T ;
RAO, KR .
IEEE TRANSACTIONS ON COMPUTERS, 1974, C 23 (01) :90-93
[3]   Deepfake Video Detection through Optical Flow based CNN [J].
Amerini, Irene ;
Galteri, Leonardo ;
Caldelli, Roberto ;
Del Bimbo, Alberto .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW), 2019, :1205-1207
[4]  
[Anonymous], About us
[5]  
Bayar B., 2016, P 4 ACM WORKSH INF H, P5, DOI 10.1145/2909827.2930786
[6]   WAVELET TRANSFORMS - AN INTRODUCTION [J].
BENTLEY, PM ;
MCDONNELL, JTE .
ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 1994, 6 (04) :175-186
[7]  
Brock A, 2019, Arxiv, DOI arXiv:1809.11096
[8]   Illuminant-Based Transformed Spaces for Image Forensics [J].
Carvalho, Tiago ;
Faria, Fabio A. ;
Pedrini, Helio ;
Torres, Ricardo da S. ;
Rocha, Anderson .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :720-733
[9]   JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images [J].
Chen, Mo ;
Sedighi, Vahid ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, :75-84
[10]   StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation [J].
Choi, Yunjey ;
Choi, Minje ;
Kim, Munyoung ;
Ha, Jung-Woo ;
Kim, Sunghun ;
Choo, Jaegul .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :8789-8797