Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An
Extensive Review
- URL: http://arxiv.org/abs/2401.06999v1
- Date: Sat, 13 Jan 2024 07:03:58 GMT
- Title: Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An
Extensive Review
- Authors: Ankit Yadav, Dinesh Kumar Vishwakarma
- Abstract summary: This survey focusses on approaches for tampering detection in multimedia data using deep learning models.
It presents a detailed analysis of benchmark datasets for malicious manipulation detection that are publicly available.
It also offers a comprehensive list of tampering clues and commonly used deep learning architectures.
- Score: 19.30075248247771
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: With the large chunks of social media data being created daily and the
parallel rise of realistic multimedia tampering methods, detecting and
localising tampering in images and videos has become essential. This survey
focusses on approaches for tampering detection in multimedia data using deep
learning models. Specifically, it presents a detailed analysis of benchmark
datasets for malicious manipulation detection that are publicly available. It
also offers a comprehensive list of tampering clues and commonly used deep
learning architectures. Next, it discusses the current state-of-the-art
tampering detection methods, categorizing them into meaningful types such as
deepfake detection methods, splice tampering detection methods, copy-move
tampering detection methods, etc. and discussing their strengths and
weaknesses. Top results achieved on benchmark datasets, comparison of deep
learning approaches against traditional methods and critical insights from the
recent tampering detection methods are also discussed. Lastly, the research
gaps, future direction and conclusion are discussed to provide an in-depth
understanding of the tampering detection research arena.
Related papers
- The Impact of Semi-Supervised Learning on Line Segment Detection [11.636855122196323]
We present a method for line segment detection in images, based on a semi-supervised framework.
We show comparable results to fully supervised methods.
Our method is to our knowledge the first to target line detection using modern state-of-the-art methodologies for semi-supervised learning.
arXiv Detail & Related papers (2024-11-07T10:28:11Z) - CrossDF: Improving Cross-Domain Deepfake Detection with Deep Information Decomposition [53.860796916196634]
We propose a Deep Information Decomposition (DID) framework to enhance the performance of Cross-dataset Deepfake Detection (CrossDF)
Unlike most existing deepfake detection methods, our framework prioritizes high-level semantic features over specific visual artifacts.
It adaptively decomposes facial features into deepfake-related and irrelevant information, only using the intrinsic deepfake-related information for real/fake discrimination.
arXiv Detail & Related papers (2023-09-30T12:30:25Z) - A Continual Deepfake Detection Benchmark: Dataset, Methods, and
Essentials [97.69553832500547]
This paper suggests a continual deepfake detection benchmark (CDDB) over a new collection of deepfakes from both known and unknown generative models.
We exploit multiple approaches to adapt multiclass incremental learning methods, commonly used in the continual visual recognition, to the continual deepfake detection problem.
arXiv Detail & Related papers (2022-05-11T13:07:19Z) - Deep Learning for Hate Speech Detection: A Comparative Study [54.42226495344908]
We present here a large-scale empirical comparison of deep and shallow hate-speech detection methods.
Our goal is to illuminate progress in the area, and identify strengths and weaknesses in the current state-of-the-art.
In doing so we aim to provide guidance as to the use of hate-speech detection in practice, quantify the state-of-the-art, and identify future research directions.
arXiv Detail & Related papers (2022-02-19T03:48:20Z) - A Comparative Review of Recent Few-Shot Object Detection Algorithms [0.0]
Few-shot object detection, learning to adapt to the novel classes with a few labeled data, is an imperative and long-lasting problem.
Recent studies have explored how to use implicit cues in extra datasets without target-domain supervision to help few-shot detectors refine robust task notions.
arXiv Detail & Related papers (2021-10-30T07:57:11Z) - A Unifying Review of Deep and Shallow Anomaly Detection [38.202998314502786]
We aim to identify the common underlying principles as well as the assumptions that are often made implicitly by various methods.
We provide an empirical assessment of major existing methods that is enriched by the use of recent explainability techniques.
We outline critical open challenges and identify specific paths for future research in anomaly detection.
arXiv Detail & Related papers (2020-09-24T14:47:54Z) - VideoForensicsHQ: Detecting High-quality Manipulated Face Videos [77.60295082172098]
We show how the performance of forgery detectors depends on the presence of artefacts that the human eye can see.
We introduce a new benchmark dataset for face video forgery detection, of unprecedented quality.
arXiv Detail & Related papers (2020-05-20T21:17:43Z) - Anomalous Example Detection in Deep Learning: A Survey [98.2295889723002]
This survey tries to provide a structured and comprehensive overview of the research on anomaly detection for Deep Learning applications.
We provide a taxonomy for existing techniques based on their underlying assumptions and adopted approaches.
We highlight the unsolved research challenges while applying anomaly detection techniques in DL systems and present some high-impact future research directions.
arXiv Detail & Related papers (2020-03-16T02:47:23Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.