2021
DOI: 10.1609/aaai.v35i2.16254
|View full text |Cite
|
Sign up to set email alerts
|

Initiative Defense against Facial Manipulation

Abstract: Benefiting from the development of generative adversarial networks (GAN), facial manipulation has achieved significant progress in both academia and industry recently. It inspires an increasing number of entertainment applications but also incurs severe threats to individual privacy and even political security meanwhile. To mitigate such risks, many countermeasures have been proposed. However, the great majority methods are designed in a passive manner, which is to detect whether the facial images or videos ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
31
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(31 citation statements)
references
References 24 publications
(35 reference statements)
0
31
0
Order By: Relevance
“…The proposed attack is described and benchmarked in Section 4. Notice that the existence of this attack does not imply that code-equivalence is not secure; indeed, as we show in Section 4, the reduction considered in [15] is not meaningful for an average code-equivalence instance. Finally, in Section 5, we draw some concluding remarks.…”
Section: Introductionmentioning
confidence: 92%
See 4 more Smart Citations
“…The proposed attack is described and benchmarked in Section 4. Notice that the existence of this attack does not imply that code-equivalence is not secure; indeed, as we show in Section 4, the reduction considered in [15] is not meaningful for an average code-equivalence instance. Finally, in Section 5, we draw some concluding remarks.…”
Section: Introductionmentioning
confidence: 92%
“…In [15], the authors claim that, by using an alternative version of the code equivalence problem, it is possible to develop a non-interactive key-based protocol, à-la Diffie-Hellman. Their method, in a nutshell, proposes to split the action of the permutation defining the equivalence into two, disjoint sets, so that composing permutations from the two sets is commutative.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations