2020
DOI: 10.1109/jstsp.2020.2999185
|View full text |Cite
|
Sign up to set email alerts
|

Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(48 citation statements)
references
References 36 publications
0
36
0
Order By: Relevance
“…We see that many approaches were proposed to apply frame-by-frame analysis in videos or images to manipulate face and track facial movement to obtain better performance. For example, in [66]- [71], RNN based networks are proposed to extract the features at various micro and macroscopic levels for detecting Deepfake. Regardless of these exciting results in detection, it is seen that most of the methods lean towards overfitting.…”
Section: ) Deep Learning Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We see that many approaches were proposed to apply frame-by-frame analysis in videos or images to manipulate face and track facial movement to obtain better performance. For example, in [66]- [71], RNN based networks are proposed to extract the features at various micro and macroscopic levels for detecting Deepfake. Regardless of these exciting results in detection, it is seen that most of the methods lean towards overfitting.…”
Section: ) Deep Learning Based Methodsmentioning
confidence: 99%
“…• The information is stored in a permission-based Blockchain, which gives the owner control over its contents. Based on the studies, taking together all these methods, Table 3 [11], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [86],…”
Section: • Integrates the Critical Features Of Ipfs [114]-basedmentioning
confidence: 99%
“…In order to make full use of the structure information of the forged image, the local structure map is constructed and used as a weighting factor to highlight the structural loss in the forged image when counting the normalized histogram of LBP features, as shown in formula (7). The construction method of the local structure map MP is used to extract the phase congruency (PC) [44] features from the facial grey-scale image, and then select the larger one of the PC and the MSCN coefficient at each pixel point, as shown in formula (8).…”
Section: Texture Features Extraction Based On Structural Weightingmentioning
confidence: 99%
“…According to our findings, most of the existing detection methods [5–8] are mainly targeted at masking forgery, and a small part of researches is adapted to unmasking DeepFake [9–11], while few methods are suitable for both types at the same time. Thus, the application range of these single‐type forgery detection models is greatly restricted.…”
Section: Introductionmentioning
confidence: 99%
“…Dinkel et al proposed an end-to-end model with raw waveform input [9]. Chintha et al devised recurrent convolutional structures for audio spoofing detection [10]. In [11], a light convolutional neural network (LCNN) with angular margin based softmax loss was used for anti-spoofing attacks.…”
Section: Introductionmentioning
confidence: 99%