FaceForensics plus plus : Learning to Detect Manipulated Facial Images

被引:1182
作者
Roessler, Andreas [1 ]
Cozzolino, Davide [2 ]
Verdoliva, Luisa [2 ]
Riess, Christian [3 ]
Thies, Justus [1 ]
Niessner, Matthias [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Univ Federico II Naples, Naples, Italy
[3] Univ Erlangen Nurnberg, Erlangen, Germany
来源
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) | 2019年
关键词
FORGERIES;
D O I
10.1109/ICCV.2019.00009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid progress in synthetic image generation and manipulation has now come to a point where it raises significant concerns for the implications towards society. At best, this leads to a loss of trust in digital content, but could potentially cause further harm by spreading false information or fake news. This paper examines the realism of state-of-the-art image manipulations, and how difficult it is to detect them, either automatically or by humans. To standardize the evaluation of detection methods, we propose an automated benchmark for facial manipulation detection(1). In particular, the benchmark is based on Deep-Fakes [1], Face2Face [56], FaceSwap [2] and NeuralTextures [54] as prominent representatives for facial manipulations at random compression level and size. The benchmark is publicly available(2) and contains a hidden test set as well as a database of over 1:8 million manipulated images. This dataset is over an order of magnitude larger than comparable, publicly available, forgery datasets. Based on this data, we performed a thorough analysis of data-driven forgery detectors. We show that the use of additional domain-specific knowledge improves forgery detection to unprecedented accuracy, even in the presence of strong compression, and clearly outperforms human observers.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 61 条
[1]  
Afchar Darius, 2018, ARXIV180900888
[2]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[3]  
[Anonymous], 2016, P IEEE C COMPUTER VI, DOI DOI 10.1109/CVPR.2016.262
[4]  
[Anonymous], IEEE COMP VIS PATT R
[5]  
[Anonymous], 2017, ABS170600409 CORR
[6]  
Antipov G, 2017, IEEE IMAGE PROC, P2089, DOI 10.1109/ICIP.2017.8296650
[7]   Bringing Portraits to Life [J].
Averbuch-Elor, Hadar ;
Cohen-Or, Daniel ;
Kopf, Johannes ;
Cohen, Michael F. .
ACM TRANSACTIONS ON GRAPHICS, 2017, 36 (06)
[8]   Exploiting Spatial Structure for Localizing Manipulated Image Regions [J].
Bappy, Jawadul H. ;
Roy-Chowdhury, Amit K. ;
Bunk, Jason ;
Nataraj, Lakshmanan ;
Manjunath, B. S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :4980-4989
[9]  
Bayar Y, 2016, TRANSYLV REV ADM SCI, P5
[10]  
Bestagini P, 2013, IEEE INT WORKSH MULT, P488, DOI 10.1109/MMSP.2013.6659337