Computer Science & Technology

AdfNet: An Adaptive Deep Forgery Detection Network Based on Diverse Features

Expand
  • School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,Guangdong,China
李家春(1968-),女,博士,副教授,主要从事计算机网络与信息安全、隐私保护、人工智能安全、智慧教学等研究。

Received date: 2022-12-24

  Online published: 2023-04-20

Supported by

Guangdong Provincial Key R&D Program(2021B0101420002);the Ministry of Education’s Cooperative Education Project(201902186007)

Abstract

The harm caused by video tampering has been endangering people’s lives, which makes deep forgery detection technology gradually obtain widespread attention and development. However, current detection methods could not effectively capture noisy residuals due to the use of inflexible constraints. In addition, they ignore the correlation between texture and semantic features and the impact of temporal features on detection performance improvement. To solve these problems, this paper proposed an adaptive network (AdfNet) with diverse features for deep forgery detection. It helps the classifier to judge authenticity by extracting semantic features, texture features and temporal features. The paper explored the adaptive texture noise extraction (ATNEM) mechanism, and flexibly captured the noise residuals in non-fixed frequency bands through unpooled feature mapping and frequency-based channel attention mechanism. The deep semantic analysis guidance strategy (DSAGS) was designed to highlight the tampering traces through spatial attention mechanism, and guide the feature extractor to focus on the deep features of the focus region. The paper studied multi-scale temporal feature processing (MTFPM), and used temporal attention mechanism to assign weights to different video frames and capture the difference of time series in tampered videos. The experimental results show that the ACC score of the proposed network in the HQ mode of FaceForensics++(FF++) dataset is 97.41%, which is significantly better than that of the existing mainstream algorithms. Moreover, while maintaining the AUC value of 99.80% on the FF++ dataset, the AUC value can reach 76.41% on Celeb-DF, reflecting strong generalization.

Cite this article

LI Jiachun, LI Bowen, LIN Weiwei . AdfNet: An Adaptive Deep Forgery Detection Network Based on Diverse Features[J]. Journal of South China University of Technology(Natural Science), 2023 , 51(9) : 82 -89 . DOI: 10.12141/j.issn.1000-565X.220825

References

1 KORSHUNOV P, MARCEL S .Deepfakes:a new threat to face recognition?assessment and detection[EB/OL].(2018-12-20)[2022-09-01]..
2 胡永健, SALMAN Alhamidi,王宇飞,等 .视频篡改检测数据库的构建及测试[J].华南理工大学学报(自然科学版)201745(12):57-64.
  HU Yong-jian, SALMAN Alhamidi, WANG Yu-fei,et al .Construction and evaluation of video forgery detection database[J].Journal of South China University of Technology (Natural Science Edition)201745(12):57-64.
3 WANG J, SUN Y, TANG J .LISIAM:Localization invariance Siamese network for deepfake detection[J].IEEE Transactions on Information Forensics and Security202217:2425-2436.
4 陆璐,钟文煜,吴小坤 .基于多尺度视觉Transformer的图像篡改定位[J].华南理工大学学报(自然科学版)202250(6):10-18.
  LU Lu, ZHONG Wenyu, WU Xiaokun .Image tampering localization based on mutil-scale transformer[J].Journal of South China University of Technology(Natural Science Edition)202250(6):10-18.
5 YANG J, XIAO S, LI A,et al .Detecting fake images by identifying potential texture difference[J].Future Generation Computer Systems2021125:127-135.
6 COZZOLINO D, POGGI G, VERDOLIVA L .Recasting residual-based local descriptors as convolutional neural networks:An application to image forgery detection[C]∥Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security.Philadelphia:ACM,2017:159-164.
7 BAYAR B, STAMM M C .A deep learning approach to universal image manipulation detection using a new convolutional layer[C]∥Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security.Vigo:ACM,2016:5-10.
8 AFCHAR D, NOZICK V, YAMAGISHI J,et al .Mesonet:A compact facial video forgery detection network[C]∥Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS).Hong Kong:IEEE,2018:1-7.
9 CHOLLET F .Xception:Deep learning with depthwise separable convolutions[C]∥Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Honolulu:IEEE,2017:1251-1258.
10 MASI I, KILLEKAR A, MASCARENHAS R M,et al .Two-branch recurrent network for isolating deepfakes in videos[C]∥Proceedings of the European Conference on Computer Vision.Glasgow:Springer,2020:667-684.
11 ZHAO H, ZHOU W, CHEN D,et al .Multi-attentional deepfake detection[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Kuala Lumpur:IEEE,2021:2185-2194.
12 WU X, XIE Z, GAO Y T,et al .Sstnet:Detecting manipulated faces through spatial,steganalysis and temporal features[C]∥Proceedings of the 2020 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP).Barcelona:IEEE,2020:2952-2956.
13 GüERA D, DELP E J .Deepfake video detection using recurrent neural networks[C]∥Proceedings of the 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).Auckland:IEEE,2018:1-6.
14 SABIR E, CHENG J, JAISWAL A,et al .Recurrent convolutional strategies for face manipulation detection in videos[J].Interfaces (GUI)20193(1):80-87.
15 ROSSLER A, COZZOLINO D, VERDOLIVA L,et al .FaceForensics++:Learning to detect manipulated facial images[C]∥Proceedings of the IEEE/CVF International Conference on Computer Vision.Calif:IEEE,2019:1-11.
16 LI Y, YANG X, SUN P,et al .Celeb-DF:A large-scale challenging dataset for deepfake forensics[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Seattle:IEEE,2020:3207-3216.
17 DENG J, DONG W, SOCHER R,et al .ImageNet:A large-scale hierarchical image database[C]∥Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition.Miami:IEEE,2009:248-255.
18 BOROUMAND M, CHEN M, FRIDRICH J .Deep residual network for steganalysis of digital images[J].IEEE Transactions on Information Forensics and Security201814(5):1181-1193.
19 QIN Z, ZHANG P, WU F,et al .Fcanet:Frequency channel attention networks[C]∥Proceedings of the IEEE/CVF International Conference on Computer Vision.Montreal:IEEE,2021:783-792.
20 LIU H, LI X, ZHOU W,et al .Spatial-phase shallow learning:Rethinking face forgery detection in frequency domain[C]∥Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Kuala Lumpur:IEEE,2021:772-781.
21 QIAN Y, YIN G, SHENG L,et al .Thinking in frequency:Face forgery detection by mining frequency-aware clues[C]∥Proceedings of the European Conference on Computer Vision.Glasgow:Springer,2020:86-103.
22 TAN M, LE Q .Efficientnet:Rethinking model scaling for convolutional neural networks[C]∥Proceedings of the International Conference on Machine Learning. New York:PMLR,2019:6105-6114.
23 TRINH L, TSANG M, RAMBHATLA S,et al .Interpretable and trustworthy deepfake detection via dynamic prototypes[C]∥Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.Montreal:IEEE,2021:1973-1983.
24 NGUYEN H H, FANG F, YAMAGISHI J,et al .Multi-task learning for detecting and segmenting manipulated facial images and videos[C]∥Proceedings of the 2019 IEEE 10th International Conference on Biometrics Theory,Applications and Systems (BTAS).Tampa:IEEE,2019:1-8.
25 CHO K, VAN M B, GULCEHRE C,et al .Learning phrase representations using RNN encoder-decoder for statistical machine translation[EB/OL].(2014-09-03)[2022-09-01]..
26 LIN T Y, ROYCHOWDHURY A, MAJI S .Bilinear CNN models for fine-grained visual recognition[C]∥Proceedings of the IEEE International Conference on Computer Vision.Santiago:IEEE,2015:1449-1457.
27 DAI Y, GIESEKE F, OEHMCKE S,et al .Attentional feature fusion[C]∥Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.Montreal:IEEE,2021:3560-3569.
Outlines

/