2020
DOI: 10.1186/s13635-020-00109-8
|View full text |Cite
|
Sign up to set email alerts
|

Swapped face detection using deep learning and subjective assessment

Abstract: The tremendous success of deep learning for imaging applications has resulted in numerous beneficial advances. Unfortunately, this success has also been a catalyst for malicious uses such as photo-realistic face swapping of parties without consent. In this study, we use deep transfer learning for face swapping detection, showing true positive rates greater than 96% with very few false alarms. Distinguished from existing methods that only provide detection accuracy, we also provide uncertainty for each predicti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…• The information is stored in a permission-based Blockchain, which gives the owner control over its contents. Based on the studies, taking together all these methods, Table 3 [11], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [86],…”
Section: • Integrates the Critical Features Of Ipfs [114]-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…• The information is stored in a permission-based Blockchain, which gives the owner control over its contents. Based on the studies, taking together all these methods, Table 3 [11], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [86],…”
Section: • Integrates the Critical Features Of Ipfs [114]-basedmentioning
confidence: 99%
“…Recent research applied deep learning-based approaches, especially the CNN models, to learn how to mechanically or directly learn perceptible and selective features to identify such Deepfake. For example, Ding et al [82] introduced a two-phase CNN method for Deepfake detection. The first stage extracts particular features among counterfeit and actual images by incorporating various dense units, where each of them includes a list of dense blocks that are forged images.…”
Section: Observationsmentioning
confidence: 99%
“…Dang et al [ 161 ] investigated the use of attention mechanism for the detection and segmentation of tampered-with faces. In [ 162 ], authors used deep transfer learning for face swapping detection. Hsu et al [ 163 ] made use of a so-called Common Fake Feature Network (CFFN) consisting of several dense units and a Siamese network for Deepfake detection.…”
Section: Other Specific Forensic Problemsmentioning
confidence: 99%
“…Ding et al [45] proposed deep learning based face detection and assessment with swapped nature. The pairwise comparison of the human subjects are collected in a website.…”
Section: Review About the Face Detection Approaches Using Ml/ Deep Learning Algorithmsmentioning
confidence: 99%