DeFakePro: Decentralized DeepFake Attacks Detection using ENF
Authentication
- URL: http://arxiv.org/abs/2207.13070v1
- Date: Fri, 22 Jul 2022 01:22:11 GMT
- Title: DeFakePro: Decentralized DeepFake Attacks Detection using ENF
Authentication
- Authors: Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved
- Abstract summary: DeFakePro is a consensus mechanism-based Deepfake detection technique in online video conferencing tools.
The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools.
- Score: 66.2466055910145
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Advancements in generative models, like Deepfake allows users to imitate a
targeted person and manipulate online interactions. It has been recognized that
disinformation may cause disturbance in society and ruin the foundation of
trust. This article presents DeFakePro, a decentralized consensus
mechanism-based Deepfake detection technique in online video conferencing
tools. Leveraging Electrical Network Frequency (ENF), an environmental
fingerprint embedded in digital media recording, affords a consensus mechanism
design called Proof-of-ENF (PoENF) algorithm. The similarity in ENF signal
fluctuations is utilized in the PoENF algorithm to authenticate the media
broadcasted in conferencing tools. By utilizing the video conferencing setup
with malicious participants to broadcast deep fake video recordings to other
participants, the DeFakePro system verifies the authenticity of the incoming
media in both audio and video channels.
Related papers
- Deepfake detection in videos with multiple faces using geometric-fakeness features [79.16635054977068]
Deepfakes of victims or public figures can be used by fraudsters for blackmailing, extorsion and financial fraud.
In our research we propose to use geometric-fakeness features (GFF) that characterize a dynamic degree of a face presence in a video.
We employ our approach to analyze videos with multiple faces that are simultaneously present in a video.
arXiv Detail & Related papers (2024-10-10T13:10:34Z) - PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices [9.608432807038083]
This work proposes a full noise-tolerant authentication protocol based on the PUF Phenotype concept.
It demonstrates mutual authentication and forward secrecy in a setting suitable for device-to-device communication.
arXiv Detail & Related papers (2024-03-06T06:04:32Z) - DF-TransFusion: Multimodal Deepfake Detection via Lip-Audio
Cross-Attention and Facial Self-Attention [13.671150394943684]
We present a novel multi-modal audio-video framework designed to concurrently process audio and video inputs for deepfake detection tasks.
Our model capitalizes on lip synchronization with input audio through a cross-attention mechanism while extracting visual cues via a fine-tuned VGG-16 network.
arXiv Detail & Related papers (2023-09-12T18:37:05Z) - NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake
Detection [50.33525966541906]
Existing multimodal detection methods capture audio-visual inconsistencies to expose Deepfake videos.
We propose a novel Deepfake detection method to mine the correlation between Non-critical Phonemes and Visemes, termed NPVForensics.
Our model can be easily adapted to the downstream Deepfake datasets with fine-tuning.
arXiv Detail & Related papers (2023-06-12T06:06:05Z) - Audio-Visual Person-of-Interest DeepFake Detection [77.04789677645682]
The aim of this work is to propose a deepfake detector that can cope with the wide variety of manipulation methods and scenarios encountered in the real world.
We leverage a contrastive learning paradigm to learn the moving-face and audio segment embeddings that are most discriminative for each identity.
Our method can detect both single-modality (audio-only, video-only) and multi-modality (audio-video) attacks, and is robust to low-quality or corrupted videos.
arXiv Detail & Related papers (2022-04-06T20:51:40Z) - Adversarially robust deepfake media detection using fused convolutional
neural network predictions [79.00202519223662]
Current deepfake detection systems struggle against unseen data.
We employ three different deep Convolutional Neural Network (CNN) models to classify fake and real images extracted from videos.
The proposed technique outperforms state-of-the-art models with 96.5% accuracy.
arXiv Detail & Related papers (2021-02-11T11:28:00Z) - FakeBuster: A DeepFakes Detection Tool for Video Conferencing Scenarios [9.10316289334594]
This paper proposes a new DeepFake detector FakeBuster for detecting impostors during video conferencing and manipulated faces on social media.
FakeBuster is a standalone deep learning based solution, which enables a user to detect if another person's video is manipulated or spoofed during a video conferencing based meeting.
arXiv Detail & Related papers (2021-01-09T09:06:08Z) - Sharp Multiple Instance Learning for DeepFake Video Detection [54.12548421282696]
We introduce a new problem of partial face attack in DeepFake video, where only video-level labels are provided but not all the faces in the fake videos are manipulated.
A sharp MIL (S-MIL) is proposed which builds direct mapping from instance embeddings to bag prediction.
Experiments on FFPMS and widely used DFDC dataset verify that S-MIL is superior to other counterparts for partially attacked DeepFake video detection.
arXiv Detail & Related papers (2020-08-11T08:52:17Z) - Physical-Layer Authentication Using Channel State Information and
Machine Learning [0.0]
Strong authentication in an interconnected wireless environment continues to be an important, but sometimes elusive goal.
Research in physical-layer authentication using channel features holds promise as a technique to improve network security for a variety of devices.
We propose the use of machine learning and measured multiple-input multiple-output communications channel information to make a decision on whether or not to authenticate a particular device.
arXiv Detail & Related papers (2020-06-05T21:26:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.