Face X-ray for More General Face Forgery Detection

被引:534
作者
Li, Lingzhi [1 ,2 ]
Bao, Jianmin [2 ]
Zhang, Ting [2 ]
Yang, Hao [2 ]
Chen, Dong [2 ]
Wen, Fang [2 ]
Guo, Baining [2 ]
机构
[1] Peking Univ, Beijing, Peoples R China
[2] Microsoft Res Asia, Beijing, Peoples R China
来源
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) | 2020年
关键词
IMAGE; LOCALIZATION;
D O I
10.1109/CVPR42600.2020.00505
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we propose a novel image representation called face X-ray for detecting forgery in face images. The face X-ray of an input face image is a greyscale image that reveals whether the input image can be decomposed into the blending of two images from different sources. It does so by showing the blending boundary for a forged image and the absence of blending for a real image. We observe that most existing face manipulation methods share a common step: blending the altered face into an existing background image. For this reason, face X-ray provides an effective way for detecting forgery generated by most existing face manipulation algorithms. Face X-ray is general in the sense that it only assumes the existence of a blending step and does not rely on any knowledge of the artifacts associated with a specific face manipulation technique. Indeed, the algorithm for computing face X-ray can be trained without fake images generated by any of the state-of-the-art face manipulation methods. Extensive experiments show that face X-ray remains effective when applied to forgery generated by unseen face manipulation techniques, while most existing face forgery detection or deepfake detection algorithms experience a significant performance drop.
引用
收藏
页码:5000 / 5009
页数:10
相关论文
共 48 条
[1]  
Afchar D, 2018, IEEE INT WORKS INFOR
[2]  
Agarwal S., 2019, P IEEE C COMP VIS PA, P38
[3]  
[Anonymous], 2018, ARXIV180807276
[4]  
[Anonymous], 2016, ARXIV160103239
[5]  
[Anonymous], 2018, CVPR WORKSHOPS
[6]  
[Anonymous], 2018, ARXIV180309179
[7]  
[Anonymous], 2007, HACKER FACTOR SOLUTI
[8]   Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries [J].
Bappy, Jawadul H. ;
Simons, Cody ;
Nataraj, Lakshmanan ;
Manjunath, B. S. ;
Roy-Chowdhury, Amit K. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (07) :3286-3300
[9]   Exploiting Spatial Structure for Localizing Manipulated Image Regions [J].
Bappy, Jawadul H. ;
Roy-Chowdhury, Amit K. ;
Bunk, Jason ;
Nataraj, Lakshmanan ;
Manjunath, B. S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :4980-4989
[10]  
Bayar Y, 2016, TRANSYLV REV ADM SCI, P5