MSFRNet: Two-stream deep forgery detector via multi-scale feature extraction

被引:1
作者
Yu, Miaomiao [1 ]
Zhang, Jun [1 ]
Li, Shuohao [1 ]
Lei, Jun [1 ]
机构
[1] Natl Univ Def Technol, Lab Big Data & Decis, Changsha, Peoples R China
基金
中国国家自然科学基金;
关键词
counterfactual causal reasoning; DeepFake detection; manipulation traces; multi-scale features; IMAGE;
D O I
10.1049/ipr2.12657
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Face forgery represented by DeepFake technique has raised severe societal concerns. Due to the different scales of tampering traces and the different resolutions of face images, adopting common processing pipelines and standard form of convolutional neural networks (CNNs) will lead to problems such as omission, redundancy, and bias when extracting key discriminative features. To solve the above issues, unlike most existing methods that treat face forensics as a vanilla binary classification task, the authors instead reformulate it as a multi-scale object detection problem and propose a novel framework called MSFRNet based on multi-scale feature extraction. Concretely, to alleviate the issues of features omission and redundancy, the authors construct a two-stream prediction network, where the shallow branch discovers small-scale objects such as tiny noise by capturing low-level features with higher resolution and more details, while the deep stream exploits larger receptive fields to detect large-scale blocky artefacts. Moreover, a multi-scale feature extraction module is designed to enrich feature representations in each stream. To solve the problem of features bias and ensure that unbiased feature representations are learned, more appropriate data augmentation approaches are proposed by introducing counterfactual causal reasoning. Extensive experiments demonstrate that our framework outperforms most ordinary binary classifiers and achieves positive performance.
引用
收藏
页码:581 / 596
页数:16
相关论文
共 54 条
  • [1] Afchar D, 2018, IEEE INT WORKS INFOR
  • [2] Amerini Irene, 2020, IH&MMSec '20: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, P97, DOI 10.1145/3369412.3395070
  • [3] Bayar B., 2016, P 4 ACM WORKSHOP INF, P5, DOI DOI 10.1145/2909827.2930786
  • [4] Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection
    Bayar, Belhassen
    Stamm, Matthew C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2691 - 2706
  • [5] Facial Expression Recognition in Video with Multiple Feature Fusion
    Chen, Junkai
    Chen, Zenghai
    Chi, Zheru
    Fu, Hong
    [J]. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 2018, 9 (01) : 38 - 50
  • [6] Chen P., 2020, 2020 IEEE ICME
  • [7] CHOLLET F, 2017, PROC CVPR IEEE, P1800, DOI DOI 10.1109/CVPR.2017.195
  • [8] Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection
    Cozzolino, Davide
    Poggi, Giovanni
    Verdoliva, Luisa
    [J]. IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 159 - 164
  • [9] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882
  • [10] Inconsistency-Aware Wavelet Dual-Branch Network for Face Forgery Detection
    Jia G.
    Zheng M.
    Hu C.
    Ma X.
    Xu Y.
    Liu L.
    Deng Y.
    He R.
    [J]. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3 (03): : 308 - 319