Privacy-preserving DeepFake face image detection

被引:9
作者
Chen, Beijing [1 ,2 ]
Liu, Xin [1 ]
Xia, Zhihua [3 ]
Zhao, Guoying [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Minist Educ, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
[4] Univ Oulu, Ctr Machine Vis & Signal Anal, FI-90014 Oulu, Finland
基金
中国国家自然科学基金;
关键词
DeepFake; DeepFake detection; Privacy protection; Additive secret sharing; Secure interaction protocol; SYSTEM;
D O I
10.1016/j.dsp.2023.104233
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
All the existing models for DeepFake detection focus on plaintext faces. However, outsourced computing is usually considered in practical applications for DeepFake detection and the input data may contain private and sensitive information. Thus, a privacy-preserving model named Secure DeepFake Detection Network (SecDFD-Net) is proposed for the first time in this paper. The SecDFDNet uses the additive secret sharing method for secure DeepFake face detection. Specifically, firstly, some multi-party secure interaction protocols are designed for non -linear activation functions, i.e., SecReLU for ReLU function, SecSigm for sigmoid function, SecSpatial for spatial attention, and SecChannel for channel attention. Their security is proved in theory. Our protocols have low communication and space complexity. Then, the SecDFDNet model is proposed by using the designed secure protocols and trained plaintext DeepFake detection network (DFDNet). The experimental results show that the proposed SecDFDNet can detect DeepFake faces without revealing anything of private input, achieve the same accuracies as the plaintext DFDNet and outperform some existing models. The source code is available at https:// github.com/imagecbj/Privacy-Preserving-DeepFake-Face-Image-Detection.
引用
收藏
页数:10
相关论文
共 43 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[3]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]   Function Secret Sharing [J].
Boyle, Elette ;
Gilboa, Niv ;
Ishai, Yuval .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :337-367
[5]   Convolutional neural network initialization approaches for image manipulation detection [J].
Camacho, Ivan Castillo ;
Wang, Kai .
DIGITAL SIGNAL PROCESSING, 2022, 122
[6]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[7]   A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception [J].
Chen, Beijing ;
Liu, Xin ;
Zheng, Yuhui ;
Zhao, Guoying ;
Shi, Yun-Qing .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (06) :3527-3538
[8]   Locally GAN-generated face detection based on an improved Xception [J].
Chen, Beijing ;
Ju, Xingwang ;
Xiao, Bin ;
Ding, Weiping ;
Zheng, Yuhui ;
de Albuquerque, Victor Hugo C. .
INFORMATION SCIENCES, 2021, 572 :16-28
[9]   Xception: Deep Learning with Depthwise Separable Convolutions [J].
Chollet, Francois .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :1800-1807
[10]   Where Do Deep Fakes Look? Synthetic Face Detection via Gaze Tracking [J].
Demir, Ilke ;
Ciftci, Umur Aybars .
PROCEEDINGS ETRA 2021: ACM SYMPOSIUM ON EYE TRACKING RESEARCH AND APPLICATIONS, 2021,