ABSTRACT
Due to the significant advancements in image processing and machine learning algorithms, it is much easier to create, edit, and produce high quality images. However, attackers can maliciously use these tools to create legitimate looking but fake images to harm others, bypass image detection algorithms, or fool image recognition classifiers. In this work, we propose neural network based classifiers to detect fake human faces created by both 1) machines and 2) humans. We use ensemble methods to detect GANs-created fake images and employ pre-processing techniques to improve fake face image detection created by humans. Our approaches focus on image contents for classification and do not use meta-data of images. Our preliminary results show that we can effectively detect both GANs-created images, and human-created fake images with 94% and 74.9% AUROC score.
- Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, 785--794. Google ScholarDigital Library
- Fran¸cois Chollet. 2017. Xception: Deep learning with depthwise separable convolutions. arXiv preprint arXiv:1610.02357 (2017).Google Scholar
- Fran¸cois Chollet et al. 2015. Keras. https://keras.io.Google Scholar
- Jon Christian. 2018. Experts fear face swapping tech could start an international showdown. Retrieved July 5, 2018 from https://theoutline.com/post/3179/ deepfake-videos-are-freaking-experts-outGoogle Scholar
- Hyoungseok Chu. 2017. AUROC. Retrieved Jun 25, 2018 from https://github.com/hyoungseokchu/AUROCGoogle Scholar
- Samantha Cole. 2018. We Are Truly Fucked: Everyone Is Making AI-Generated Fake Porn Now. Vice (25 Jan 2018). https://motherboard.vice.com/en us/article/bjye8a/ reddit-fake-porn-app-daisy-ridleyGoogle Scholar
- Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2017. Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, 159--164. Google ScholarDigital Library
- Iv´an de Paz Centeno. 2018. MTCNN. Retrieved Jun 25, 2018 from https://github.com/ipazc/mtcnnGoogle Scholar
- Hany Farid. 2009. Exposing digital forgeries from JPEG ghosts. IEEE Trans. Information Forensics and Security 4, 1 (2009), 154--160. Google ScholarDigital Library
- Mohammad Farukh Hashmi, Aaditya R Hambarde, and Avinash G Keskar. 2013. Copy move forgery detection using DWT and SIFT features. In Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on. IEEE, 188--193.Google ScholarCross Ref
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.Google ScholarCross Ref
- Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q Weinberger. 2017. Densely Connected Convolutional Networks. In CVPR '17, Vol. 1. 3.Google Scholar
- Multimedia Computing Lab in Kaist. 2015. MMC Image Forensic Tool. Retrieved July 22, 2018 from http://forensic.kaist.ac.kr/Google Scholar
- Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2017. Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017).Google Scholar
- A. Kashyap, B. Suresh, M. Agrawal, H. Gupta, and S. D. Joshi. 2015. Detection of splicing forgery using wavelet decomposition. In International Conference on Computing, Communication Automation. 843--848.Google Scholar
- Davis E King. 2009. Dlib-ml: A machine learning toolkit. Journal of Machine Learning Research 10 (July 2009), 1755--1758. Google ScholarDigital Library
- Neal Krawetz. 2007. A Picture's Worth: Digital Image Analysis and Forensics. Hacker Factor Solutions (2007), 16--20.Google Scholar
- Neal Krawetz. 2012. FotoForensics. Retrieved July 5, 2018 from http://fotoforensics.com/Google Scholar
- Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. 2009. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42, 11 (2009), 2492--2501. Google ScholarDigital Library
- S. Murali, Govindraj B. Chittapur, H. S. Prabhakara, and Basavaraj S. Anami. 2013. Comparision and analysis of photo image forgery detection techniques. arXiv preprint arXiv:1302.3119 (2013).Google Scholar
- Joseph Redmon and Ali Farhadi. 2018. YOLOv3: An Incremental Improvement. arXiv preprint arXiv:1804.02767 (2018).Google Scholar
- Aja Romano. 2018. Jordan Peele's simulated Obama PSA is a double-edged warning against fake news. Retrieved August 15, 2018 from https://www.vox.com/2018/4/18/17252410/ jordan-peele-obama-deepfake-buzzfeedGoogle Scholar
- Kevin Roose. 2018. Here Come the Fake Videos, Too. Retrieved July 5, 2018 from https://www.nytimes.com/2018/03/04/ technology/fake-videos-deepfakes.htmlGoogle Scholar
- Andreas R¨ossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nießner. 2018. FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces. arXiv preprint arXiv:1803.09179 (2018).Google Scholar
- seetaface. 2016. SeetaFaceEngine. Retrieved Jun 25, 2018 from https://github.com/seetaface/SeetaFaceEngineGoogle Scholar
- Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv preprint arXiv:1409.1556 (2014), 1--14.Google Scholar
- Justus Thies, Michael Zollhofer, Marc Stamminger, Christian Theobalt, and Matthias Nießner. 2016. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2387--2395.Google ScholarDigital Library
- Wikipedia. 2018. Deepfake. Retrieved July 5, 2018 from https: //en.wikipedia.org/wiki/DeepfakeGoogle Scholar
- Jianquan Yang, Guopu Zhu, Jiwu Huang, and Xi Zhao. 2015. Estimating JPEG compression history of bitmaps based on factor histogram. Digital Signal Processing 41 (2015), 90--97. Google ScholarDigital Library
- Saber Zerdoumi, Aznul Qalid Md Sabri, Amirrudin Kamsin, Ibrahim Abaker Targio Hashem, Abdullah Gani, Saqib Hakak, Mohammed Ali Al-Garadi, and Victor Chang. 2017. Image pattern recognition in big data: taxonomy and open challenges: survey. Multimedia Tools and Applications (2017), 1--31. Google ScholarDigital Library
- Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint Face Detection and Alignment using Multi-task Cascaded Convolutional Networks. arXiv prerpint arXiv:1604.02878 (2016).Google Scholar
- Peng Zhou, Xintong Han, Vlad I. Morariu, and Larry S. Davis. 2018. Learning Rich Features for Image Manipulation Detection. arXiv preprint arXiv:1805.04953 (2018).Google Scholar
- Xiaogang Wang Ziwei Liu, Ping Luo and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In Proceedings of International Conference on Computer Vision (ICCV '15). Google ScholarDigital Library
- Barret Zoph, Vijay Vasudevan, Jonathon Shlens, and Quoc V. Le. 2017. Learning Transferable Architectures for Scalable Image Recognition. arXiv preprint arXiv:1707.07012 (2017).Google Scholar
Index Terms
- Detecting Both Machine and Human Created Fake Face Images In the Wild
Recommendations
Detecting fake images using watermarks and support vector machines
With the great convenience of computer graphics and digital imaging, it becomes much easier to alter the content of images than before without any visually traces to catch these manipulations, i.e., many fake images are produced whose content is ...
Detection of Fake Remote-Sensing Data
AbstractThe paper deals with the detection of counterfeit remote-sensing data. A remote sensing data detector is considered that uses the neural-net identification of spectral artifacts typical of adversarial generators. The detector is employed to spot ...
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityText-to-image generation models that generate images based on prompt descriptions have attracted an increasing amount of attention during the past few months. Despite their encouraging performance, these models raise concerns about the misuse of their ...
Comments