2020 IEEE International Joint Conference on Biometrics (IJCB) 2020
DOI: 10.1109/ijcb48548.2020.9304936
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging edges and optical flow on faces for deepfake detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Their network, XceptionNet, performs very well (99% authenticity verification correctness on raw images, 81% on compressed) [29]. This has inspired numerous other high-performing models [30], where some introduce multi-stream fusion [31], multi-task learning [32] and optical flow [33].…”
Section: Deep-learning Tampering Detectionmentioning
confidence: 98%
“…Their network, XceptionNet, performs very well (99% authenticity verification correctness on raw images, 81% on compressed) [29]. This has inspired numerous other high-performing models [30], where some introduce multi-stream fusion [31], multi-task learning [32] and optical flow [33].…”
Section: Deep-learning Tampering Detectionmentioning
confidence: 98%
“…Images compression algorithms and compression rates are not the same. Thus, Chintha et al [40] fed images frames and dense optical flow maps into the network together, which was very effective against adversarial attacks. In a similar way, Cheng et al [41] input the RGB image and the spectral map transformed by DCT into two branch networks, and then fuse RGB feature maps and frequency feature maps.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, Chintha et al. [40] fed images frames and dense optical flow maps into the network together, which was very effective against adversarial attacks. In a similar way, Cheng et al.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to the technological aspects associated with the production and detection of deep fakes, the ethical, social, and legal implications have also been meticulously explored. There have already been some reviews written in particular sectors, such as the creation and detection of deepfakes [21], law [22], forensics [23], and social impact [24], to name just a few of these areas. Nevertheless, none of them considers the entire breadth of research fields in deepfakes, which we believe might be highly valuable for academics who intend to work on this research issue [25].…”
Section: Review Articlementioning
confidence: 99%