Finding Facial Forgery Artifacts with Parts-Based Detectors
- URL: http://arxiv.org/abs/2109.10688v1
- Date: Tue, 21 Sep 2021 16:18:45 GMT
- Title: Finding Facial Forgery Artifacts with Parts-Based Detectors
- Authors: Steven Schwarcz, Rama Chellappa
- Abstract summary: We design a series of forgery detection systems that each focus on one individual part of the face.
We use these detectors to perform detailed empirical analysis on the FaceForensics++, Celeb-DF, and Facebook Deepfake Detection Challenge datasets.
- Score: 73.08584805913813
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Manipulated videos, especially those where the identity of an individual has
been modified using deep neural networks, are becoming an increasingly relevant
threat in the modern day. In this paper, we seek to develop a generalizable,
explainable solution to detecting these manipulated videos. To achieve this, we
design a series of forgery detection systems that each focus on one individual
part of the face. These parts-based detection systems, which can be combined
and used together in a single architecture, meet all of our desired criteria -
they generalize effectively between datasets and give us valuable insights into
what the network is looking at when making its decision. We thus use these
detectors to perform detailed empirical analysis on the FaceForensics++,
Celeb-DF, and Facebook Deepfake Detection Challenge datasets, examining not
just what the detectors find but also collecting and analyzing useful related
statistics on the datasets themselves.
Related papers
- "Show Me What's Wrong!": Combining Charts and Text to Guide Data Analysis [4.016592757754338]
In the context of financial fraud detection, analysts must quickly identify suspicious activity among transactional data.
This is an iterative process made of complex exploratory tasks such as recognizing patterns, grouping, and comparing.
To mitigate the information overload inherent to these steps, we present a tool combining automated information highlights, Large Language Model generated textual insights, and visual analytics.
arXiv Detail & Related papers (2024-10-01T14:16:10Z) - Leveraging Mixture of Experts for Improved Speech Deepfake Detection [53.69740463004446]
Speech deepfakes pose a significant threat to personal security and content authenticity.
We introduce a novel approach for enhancing speech deepfake detection performance using a Mixture of Experts architecture.
arXiv Detail & Related papers (2024-09-24T13:24:03Z) - FSD: Fully-Specialized Detector via Neural Architecture Search [2.149718433100702]
We first propose and examine a fully-automatic pipeline to design a fully-specialized detector (FSD)
On the DeepLesion dataset, extensive results show that FSD can achieve 3.1 mAP gain while using approximately 40% fewer parameters on binary lesion detection task.
arXiv Detail & Related papers (2023-05-26T05:41:20Z) - Egocentric Human-Object Interaction Detection Exploiting Synthetic Data [19.220651860718892]
We consider the problem of detecting Egocentric HumanObject Interactions (EHOIs) in industrial contexts.
We propose a pipeline and a tool to generate photo-realistic synthetic First Person Vision (FPV) images automatically labeled for EHOI detection.
arXiv Detail & Related papers (2022-04-14T15:59:15Z) - Human-in-the-Loop Disinformation Detection: Stance, Sentiment, or
Something Else? [93.91375268580806]
Both politics and pandemics have recently provided ample motivation for the development of machine learning-enabled disinformation (a.k.a. fake news) detection algorithms.
Existing literature has focused primarily on the fully-automated case, but the resulting techniques cannot reliably detect disinformation on the varied topics, sources, and time scales required for military applications.
By leveraging an already-available analyst as a human-in-the-loop, canonical machine learning techniques of sentiment analysis, aspect-based sentiment analysis, and stance detection become plausible methods to use for a partially-automated disinformation detection system.
arXiv Detail & Related papers (2021-11-09T13:30:34Z) - Unsupervised Domain Adaption of Object Detectors: A Survey [87.08473838767235]
Recent advances in deep learning have led to the development of accurate and efficient models for various computer vision applications.
Learning highly accurate models relies on the availability of datasets with a large number of annotated images.
Due to this, model performance drops drastically when evaluated on label-scarce datasets having visually distinct images.
arXiv Detail & Related papers (2021-05-27T23:34:06Z) - Anomaly Detection on Attributed Networks via Contrastive Self-Supervised
Learning [50.24174211654775]
We present a novel contrastive self-supervised learning framework for anomaly detection on attributed networks.
Our framework fully exploits the local information from network data by sampling a novel type of contrastive instance pair.
A graph neural network-based contrastive learning model is proposed to learn informative embedding from high-dimensional attributes and local structure.
arXiv Detail & Related papers (2021-02-27T03:17:20Z) - An Analysis of Deep Object Detectors For Diver Detection [19.14344722263869]
We produce a dataset of approximately 105,000 annotated images of divers sourced from videos.
We train a variety of state-of-the-art deep neural networks for object detection, including SSD with Mobilenet, Faster R-CNN, and YOLO.
Based on our results, we recommend Tiny-YOLOv4 for real-time applications on robots.
arXiv Detail & Related papers (2020-11-25T01:50:32Z) - Characterization and Identification of Cloudified Mobile Network
Performance Bottlenecks [0.0]
This study is a first attempt to experimentally explore the range of performance bottlenecks that 5G mobile networks can experience.
In particular, we find that distributed analytics performs reasonably well both in terms of bottleneck identification accuracy and incurred computational and communication overhead.
arXiv Detail & Related papers (2020-07-22T14:46:51Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.