4.6 Article

Exposing AI-generated videos with motion magnification

期刊

MULTIMEDIA TOOLS AND APPLICATIONS
卷 80, 期 20, 页码 30789-30802

出版社

SPRINGER
DOI: 10.1007/s11042-020-09147-3

关键词

Deep learning; Fake videos; DeepFakes detection; Motion magnification

资金

  1. Jiangsu Basic Research Programs-Natural Science Foundation [BK20181407, BK20150925, BK20151530]
  2. National Natural Science Foundation of China [61672294, U1836208, 61502242, 61702276, U1536206, 61772283, 61602253, 61601236, 61572258]
  3. Six peak talent project of Jiangsu Province [R2016L13]
  4. Qing Lan Project of Jiangsu Province
  5. 333 project of Jiangsu Province
  6. National Key R&D Program of China [2018YFB1003205]
  7. Humanity and Social Science Youth foundation of Ministry of Education of China [15YJC870021]
  8. Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund
  9. Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China
  10. BK21+ program from the Ministry of Education of Kore
  11. [NRF-2016R1D1A1B03933294]

向作者/读者索取更多资源

This paper presents a motion discrepancy based method that effectively distinguishes AI-generated fake videos from real ones. By amplifying the amplitude of face motions in videos, fake videos show more serious distortion or flicker which helps differentiate them from real ones. The approach is evaluated on a large fake video dataset and demonstrates superior performance compared to existing pixel-based fake video forensics methods.
Recent progress of artificial intelligence makes it easier to edit facial movements in videos or create face substitutions, bringing new challenges to anti-fake-faces techniques. Although multimedia forensics provides many detection algorithms from a traditional point of view, it is increasingly hard to discriminate the fake videos from real ones while they become more sophisticated and plausible with updated forgery technologies. In this paper, we introduce a motion discrepancy based method that can effectively differentiate AI-generated fake videos from real ones. The amplitude of face motions in videos is first magnified, and fake videos will show more serious distortion or flicker than the pristine videos. We pre-trained a deep CNN on frames extracted from the training videos and the output vectors of the frame sequences are used as input of an LSTM at secondary training stage. Our approach is evaluated over a large fake video dataset Faceforensics++ produced by various advanced generation technologies, it shows superior performance contrasted to existing pixel-based fake video forensics approaches.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection

Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection

Chengsheng Yuan, Zhihua Xia, Xingming Sun, Q. M. Jonathan Wu

IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS (2020)

Article Engineering, Electrical & Electronic

Reversible data hiding with automatic contrast enhancement for medical images

Guangyong Gao, Shikun Tong, Zhihua Xia, Bin Wu, Liya Xu, Zhiqiang Zhao

Summary: Recent advancements in data hiding technology have led to the popularity of reversible data hiding (RDH) as a research topic, with a focus on medical images. This paper proposes an automatic contrast enhancement algorithm, RDHACEM, which separates images into regions of interest and non-interest and shows improved visual quality and embedding capacity in the regions of interest.

SIGNAL PROCESSING (2021)

Article Computer Science, Information Systems

PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation

Zixuan Shen, Zhihua Xia, Peipeng Yu

Summary: This paper introduces the concept of Personalized Local Differential Privacy (PLDP) and its algorithm design, with experimental results showing that the proposed scheme can protect the privacy of crowdsourced data while maintaining high utility.

SECURITY AND COMMUNICATION NETWORKS (2021)

Review Computer Science, Artificial Intelligence

A Survey on Deepfake Video Detection

Peipeng Yu, Zhihua Xia, Jianwei Fei, Yujiang Lu

Summary: Deepfake videos generated by deep learning algorithms have raised widespread concerns due to their potential threats to social stability. Current detection methods are not yet sufficient for real-world applications, and future research should focus more on generalization and robustness.

IET BIOMETRICS (2021)

Article Computer Science, Information Systems

Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics

Yujiang Lu, Yaju Liu, Jianwei Fei, Zhihua Xia

Summary: The research focuses on developing techniques for detecting forged faces in videos and introduces a novel spatiotemporal feature fusion strategy, which has been proven to be effective.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Theory & Methods

Improving Generalization by Commonality Learning in Face Forgery Detection

Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, Jian Weng

Summary: This paper proposes a commonality learning strategy for face video forgery detection, which improves the generalization ability by learning the common forgery features from different forgery databases. Experimental results demonstrate the effectiveness of this strategy in face forgery detection.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Information Systems

BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing

Zhihua Xia, Leqi Jiang, Dandan Liu, Lihua Lu, Byeungwoo Jeon

Summary: In this paper, an outsourced CBIR scheme based on a novel bag-of-encrypted-words (BOEW) model is proposed. Image encryption is performed using color value substitution, block permutation, and intra-block pixel permutation. The cloud server calculates local histograms from the encrypted image blocks, clusters them together, and uses the cluster centers as encrypted visual words. The bag-of-encrypted-words (BOEW) model is then built to represent each image, and the similarity between images is measured using the Manhattan distance between feature vectors.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Engineering, Multidisciplinary

Novel Coverless Steganography Method Based on Image Selection and StarGAN

Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia, Neal N. Xiong

Summary: This study proposes a new method of Cover Less Image Steganography (CIS) based on image selection and Star Generative Adversarial Network (StarGAN). The method aims to increase the hidden capacity, maintain better image quality, and enhance robustness and security performance.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words

Zhihua Xia, Qiuju Ji, Qi Gu, Chengsheng Yuan, Fengjun Xiao

Summary: This article proposes a secure scheme for outsourced CBIR which encrypts JPEG images and extracts secure features from the encrypted images, protecting the image data and achieving improved accuracy according to experimental results.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2022)

Article Computer Science, Theory & Methods

MSPPIR: Multi-Source Privacy-Preserving Image Retrieval in cloud computing

Qi Gu, Zhihua Xia, Xingming Sun

Summary: This paper discusses the challenges in Multi-Source Privacy-Preserving Image Retrieval (MSPPIR) and proposes a novel JPEG image Encryption Scheme called JES-MSIR for multi-source content-based image retrieval. The proposed scheme supports secure and efficient retrieval from multiple sources, providing better retrieval services.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Review Computer Science, Artificial Intelligence

A screen-shooting resilient document image watermarking scheme using deep neural network

Sulong Ge, Jianwei Fei, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu

Summary: This paper proposes a screen-shooting resilient watermarking scheme using deep neural network, which can extract watermark from captured photographs and maintain high visual quality of the watermarked images.

IET IMAGE PROCESSING (2023)

Article Computer Science, Information Systems

A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding

Guangyong Gao, Shikun Tong, Zhihua Xia, Yun-Qing Shi

Summary: This paper proposes a reversible data hiding algorithm based on most significant bit (MSB) prediction and error embedding, which can achieve large embedding capacity and good reconstructed image quality simultaneously.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Engineering, Multidisciplinary

A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing

Zhihua Xia, Lan Wang, Jian Tang, Neal N. Xiong, Jian Weng

Summary: The paper proposes a privacy-preserving image retrieval scheme that efficiently encrypts image content to protect privacy and enhance security. Experimental results demonstrate that the proposed scheme outperforms existing schemes in terms of security and retrieval accuracy.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

暂无数据