Review of Recent Trends in Face Image Authentication (FIA) Techniques and Their Limitations
DOI:
https://doi.org/10.58564/IJSER.3.3.2024.236Keywords:
Face image authentication (FIA), Face image manipulation (FIM), Face image manipulation detection (FIMD), DeepFakesAbstract
The rapid advancement of face image manipulation (FIM) algorithms and the proliferation of their user-friendly applications underscore an urgent need for manipulation detection techniques. These methods should be capable of revealing modifications in face images and substantiating their authenticity. Recently, the term "DeepFakes" and their detection techniques have attracted the attention of the research community. In addition, pay attention to the most recent techniques for detecting facial image manipulation that utilize watermarks. It's crucial to note that each of these techniques comes with its own set of limitations. This research aims to critically evaluate recent developments in face image authentication (FIA) methods, considering the widespread and user-friendly applications of FIM algorithms and their rapid growth. This study focuses on the urgent necessity for effective manipulation detection methods that can reliably identify and verify modifications in facial images, particularly with the rise of sophisticated DeepFakes. It explores two primary detection approaches: deep learning (DL) techniques, which leverage large datasets to detect subtle manipulations, and watermarking-based methods, which embed verification data into images to safeguard authenticity. The findings showcase the positive aspects and the limitations of these methods. DL techniques are powerful in detecting complex alterations but require substantial computational resources and data for training.
Conversely, watermarking offers a proactive solution for verifying image integrity but may be vulnerable to advanced manipulation tactics and can impact image quality. The review emphasizes the importance of ongoing innovation, advocating for hybrid approaches that integrate the benefits of both DL and watermarking to overcome their shortcomings. This paper serves as a crucial reference for researchers, presenting a detailed overview of current trends, challenges, and future directions in face image manipulation detection (FIMD), underscoring the need for continuous development to keep pace with advancing manipulation technologies.
References
H. Al-Najjar, S. Alharthi, and P. K. Atrey, “Secure image sharing method over unsecured channels,” Multimed. Tools Appl., vol. 75, no. 4, pp. 2249–2274, Feb. 2016, doi: 10.1007/s11042-014-2404-5.
M. E. Hodeish, L. Bukauskas, and V. T. Humbe, “A new efficient TKHC-based image sharing scheme over unsecured channel,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 4, pp. 1246–1262, Apr. 2022, doi: 10.1016/j.jksuci.2019.08.004.
J. Faircloth, “Information Security,” in Enterprise Applications Administration, J. Faircloth, Ed., Boston: Elsevier, 2014, pp. 175–220. doi: 10.1016/B978-0-12-407773-7.00005-3.
M. Devipriya and M. Brindha, “Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC Based Cryptosystem,” Adv. Syst. Sci. Appl., vol. 22, no. 1, pp. 92–116, 2022.
V. L. Schultz, V. V Kulba, O. A. Zaikin, A. B. Shelkov, and I. V Chernov, “Regional Security: Analysis of the Emergency Management Effectiveness Based on the Scenario Approach,” Adv. Syst. Sci. Appl., vol. 17, no. 1, pp. 9–24, 2017.
H. Kaur and S. R, “VLSI Implementation of Lightweight Cryptography Algorithm,” Adv. Syst. Sci. Appl., vol. 16, no. 1, pp. 95–101, 2016.
R. Thabit and B. E. Khoo, “Robust Reversible Watermarking Application for Fingerprint Image Security,” Adv. Syst. Sci. Appl., vol. 22, no. 1, pp. 117–129, 2022.
R. Thabit, “Improved steganography techniques for different types of secret data,” Adv. Syst. Sci. Appl., vol. 19, no. 3, 2019.
S. Kloppenburg and I. van der Ploeg, “Securing Identities: Biometric Technologies and the Enactment of Human Bodily Differences,” Sci. Cult. (Lond)., vol. 29, no. 1, pp. 57–76, Jan. 2020, doi: 10.1080/09505431.2018.1519534.
J. Galbally, S. Marcel, and J. Fierrez, “Biometric Antispoofing Methods: A Survey in Face Recognition,” IEEE Access, vol. 2, pp. 1530–1552, 2014, doi: 10.1109/ACCESS.2014.2381273.
ISO/IEC JTC1 SC37 Biometrics, “Information Technology-Biometric Presentation Attack Detection-Part 3: Testing and Reporting.,” Int. Organ. Stand., 2017.
S. Marcel, J. Fierrez, and N. Evans, Handbook of Biometric Anti-Spoofing - Presentation Attack Detection and Vulnerability Assessment. Springer Nature Singapore, 2023.
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia, “Deepfakes and beyond: A Survey of face manipulation and fake detection,” Inf. Fusion, vol. 64, no. July, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.
L. Verdoliva, “Media Forensics and DeepFakes: An Overview,” IEEE J. Sel. Top. Signal Process., vol. 14, pp. 910–932, 2020.
A. Czajka, W. Kasprzak, and A. Wilkowski, “Verification of iris image authenticity using fragile watermarking,” Bull. Polish Acad. Sci. Tech. Sci., vol. 64, no. 4, pp. 807–819, Dec. 2016, doi: 10.1515/bpasts-2016-0090.
I. J. Goodfellow et al., “Generative adversarial nets,” in Proceedings of advances in neural information processing systems, 2014.
D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” in Proceedings of international conference on learning representations, 2013.
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia, “An introduction to digital face manipulation,” in Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Springer International Publishing Cham, 2022, pp. 3–26.
V. V. V. N. S. Vamsi et al., “Deepfake detection in digital media forensics,” Glob. Transitions Proc., vol. 3, no. 1, pp. 74–79, Jun. 2022, doi: 10.1016/j.gltp.2022.04.017.
R. Cellan-Jones, “Deepfake videos double in nine months,” BBC Tech News. 2019.
D. Citron, “How DeepFake undermine truth and threaten democracy,” in TEDSummit, TED official website, 2019. [Online]. Available: https://www.ted.com/talks/danielle_citron_how_deepfakes_undermine_truth_and_threaten_democracy
P. Korshunov and S. Marcel, “DeepFakes: a New Threat to Face Recognition? Assessment and Detection,” ArXiv, vol. abs/1812.0, 2018.
B. B. C. Bitesize, “Deepfakes: what are they and why would i make one,” BBC Bitesize Articles. 2019. [Online]. Available: https://www.bbc.co.uk/bitesize/articles/zfkwcqt
J. Kietzmann, L. W. Lee, I. P. McCarthy, and T. C. Kietzmann, “Deepfakes: Trick or treat?,” Bus. Horiz., vol. 63, no. 2, pp. 135–146, Mar. 2020, doi: 10.1016/j.bushor.2019.11.006.
S. Kolagati, T. Priyadharshini, and V. Mary Anita Rajam, “Exposing deepfakes using a deep multilayer perceptron – convolutional neural network model,” Int. J. Inf. Manag. Data Insights, vol. 2, no. 1, p. 100054, Apr. 2022, doi: 10.1016/j.jjimei.2021.100054.
G. Wang, Q. Jiang, X. Jin, and X. Cui, “FFR_FD: Effective and fast detection of DeepFakes via feature point defects,” Inf. Sci. (Ny)., vol. 596, pp. 472–488, Jun. 2022, doi: 10.1016/j.ins.2022.03.026.
P. Korus, “Digital image integrity – a survey of protection and verification techniques,” Digit. Signal Process., vol. 71, pp. 1–26, Dec. 2017, doi: 10.1016/j.dsp.2017.08.009.
A. Rocha, W. Scheirer, T. Boult, and S. Goldenstein, “Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics,” ACM Comput. Surv., vol. 43, no. 4, Oct. 2011, doi: 10.1145/1978802.1978805.
M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 3, pp. 492–506, 2010, doi: 10.1109/TIFS.2010.2053202.
A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inf. Forensics Secur., vol. 3, no. 1, pp. 101–117, Mar. 2008, doi: 10.1109/TIFS.2007.916010.
D. Cozzolino, A. Rossler, J. Thies, M. Niesner, and L. Verdoliva, “ID-Reveal: Identity-aware DeepFake Video Detection,” in 2021 IEEE/CVF International Conference on Computer Vision (ICCV), IEEE, Oct. 2021, pp. 15088–15097. doi: 10.1109/ICCV48922.2021.01483.
A. Rossler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Niessner, “FaceForensics++: Learning to Detect Manipulated Facial Images,” in 2019 IEEE/CVF International Conference on Computer Vision (ICCV), IEEE, Oct. 2019, pp. 1–11. doi: 10.1109/ICCV.2019.00009.
M. Dang and T. N. Nguyen, “Digital Face Manipulation Creation and Detection: A Systematic Review,” Electronics, vol. 12, no. 16, p. 3407, Aug. 2023, doi: 10.3390/electronics12163407.
M. H. Al-Hadaad, R. Thabit, K. A. Zidan, and B. E. Khoo, “Face Image Authentication Scheme Based on Cohen–Daubechies–Feauveau Wavelets,” in International Conference on Robotics, Vision, Signal Processing and Power Applications, Springer, 2024, pp. 553–564.
M. Kowalski, “FaceSwap,” GetHub official website. 2021. [Online]. Available: https://github.com/MarekKowalski/FaceSwap
A. Store, “ZAO,” Changsha Shenduronghe Network Technology Co., Ltd. 2019. [Online]. Available: https://apps.apple.com/cn/app/id1465199127
A. Verma, “9 Best Photo Morph Apps for Android & iOS in 2022,” The Unfolder, 2022.
G. Wolberg, “Image morphing: a survey,” Vis. Comput., vol. 14, no. 8, pp. 360–372, 1998, doi: 10.1007/s003710050148.
M. Gomez-Barrero, C. Rathgeb, U. Scherhag, and C. Busch, “Is your biometric system robust to morphing attacks?,” in 2017 5th International Workshop on Biometrics and Forensics (IWBF), IEEE, Apr. 2017, pp. 1–6. doi: 10.1109/IWBF.2017.7935079.
S. Venkatesh, R. Ramachandra, K. Raja, and C. Busch, “Face Morphing Attack Generation and Detection: A Comprehensive Survey,” IEEE Trans. Technol. Soc., vol. 2, no. 3, pp. 128–145, Sep. 2021, doi: 10.1109/TTS.2021.3066254.
Y. Weng, L. Wang, X. Li, M. Chai, and K. Zhou, “Hair Interpolation for Portrait Morphing,” Comput. Graph. Forum, vol. 32, pp. 79–84, 2013.
H. Zhang, S. K. Venkatesh, R. Ramachandra, K. B. Raja, N. Damer, and C. Busch, “MIPGAN—Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN,” IEEE Trans. Biometrics, Behav. Identity Sci., vol. 3, pp. 365–383, 2021.
E. Gonzalez-Sosa, J. Fierrez, R. Vera-Rodriguez, and F. Alonso-Fernandez, “Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 8, pp. 2001–2014, Aug. 2018, doi: 10.1109/TIFS.2018.2807791.
Y. Choi, M. Choi, M. Kim, J.-W. Ha, S. Kim, and J. Choo, “StarGAN: Unified Generative Adversarial Networks for Multi-domain Image-to-Image Translation,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, IEEE, Jun. 2018, pp. 8789–8797. doi: 10.1109/CVPR.2018.00916.
A. Agarwal, R. Singh, M. Vatsa, and A. Noore, “SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern,” in 2017 IEEE International Joint Conference on Biometrics (IJCB), IEEE, Oct. 2017, pp. 659–665. doi: 10.1109/BTAS.2017.8272754.
I. Snap, “Snapchat,” App Store Preview. 2022.
L. LOIC, “The 9 Best AI Video Generators (Text-to-Video),” Make Use of Website. 2021.
O. Fried et al., “Text-based editing of talking-head video,” ACM Trans. Graph., vol. 38, no. 4, pp. 1–14, Aug. 2019, doi: 10.1145/3306346.3323028.
F. T. Support, “Talking Avatar,” Talking avatar website. 2022.
P. Korshunov and S. Marcel, “Vulnerability of Face Recognition to Deep Morphing,” ArXiv, Oct. 2019, [Online]. Available: http://arxiv.org/abs/1910.01933
U. Anchalia, K. P. Reddy, A. Modi, K. Neelam, D. Prasad, and V. Nath, “Study and Design of Biometric Security Systems: Fingerprint and Speech Technology,” in Lecture Notes in Electrical Engineering, 2019, pp. 577–584. doi: 10.1007/978-981-13-7091-5_47.
A. Kamboj, R. Rani, and A. Nigam, “A comprehensive survey and deep learning-based approach for human recognition using ear biometric,” Vis. Comput., pp. 1–34, 2021.
U. Muhammad, T. Holmberg, W. C. de Melo, and A. Hadid, “Face Anti-Spoofing via Sample Learning Based Recurrent Neural Network (RNN),” in BMVC, 2019.
G. GencyV, M. K. Chaithanya, and A. F. Majeed, “Face Spoofing Detection: A Survey on Different Methodologies,” 2020.
Z. Boulkenafet, Z. Akhtar, X. Feng, and A. Hadid, “Face Anti-spoofing in Biometric Systems,” 2017.
E. Fourati, W. Elloumi, and A. Chetouani, “Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment,” Multimed. Tools Appl., vol. 79, pp. 865–889, 2019.
L. Li, P. L. Correia, and A. Hadid, “Face recognition under spoofing attacks: countermeasures and research directions,” IET Biom., vol. 7, pp. 3–14, 2018.
A. Snook, “What is Deepfake Identity Theft?,” i-Sight website. 2020. [Online]. Available: https://www.i-sight.com/resources/what-is-deepfake-identity-theft/
E. Haller, “The two faces of deepfakes: Cybersecurity & identity fraud,” Secur. Mag., 2022, [Online]. Available: https://www.securitymagazine.com/articles/97085-the-two-faces-of-deepfakes-cybersecurity-and-identity-fraud
R. Hendrikse, “How Deepfakes Could Become A Threat To Your Identity,” Forbes, 2019, [Online]. Available: https://www.forbes.com/sites/renehendrikse/2019/12/20/how-deepfakes-could-become-a-threat-to-your-identity/?sh=3ce7083e1063
L. Patel, “The Rise of Deepfakes and What That Means for Identity Fraud,” DarkReading Authentication, 2020, [Online]. Available: https://www.darkreading.com/authentication/the-rise-of-deepfakes-and-what-that-means-for-identity-fraud
R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and J. Ortega-Garcia, “Deepfakes and beyond: A Survey of face manipulation and fake detection,” Inf. Fusion, vol. 64, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.
H. Allcott and M. Gentzkow, “Social Media and Fake News in the 2016 Election,” J. Econ. Perspect., vol. 31, no. 2, pp. 211–236, May 2017, doi: 10.1257/jep.31.2.211.
J. Cote, “DEEPFAKES AND FAKE NEWS POSE A GROWING THREAT TO DEMOCRACY, EXPERTS WARN,” News Northeast., 2022, [Online]. Available: https://news.northeastern.edu/2022/04/01/deepfakes-fake-news-threat-democracy/
V. Vieira, “Deepfakes and the intensification of fake news,” Inst. Res. internet Soc., 2019, [Online]. Available: https://irisbh.com.br/en/deepfakes-and-the-intensification-of-fake-news/
C. Vaccari and A. Chadwick, “Deepfakes and Disinformation: Exploring the Impact of Synthetic Political Video on Deception, Uncertainty, and Trust in News,” Soc. Media + Soc., vol. 6, no. 1, p. 2056305120903408, Jan. 2020, doi: 10.1177/2056305120903408.
C. Rathgeb, A. Dantcheva, and C. Busch, “Impact and Detection of Facial Beautification in Face Recognition: An Overview,” IEEE Access, vol. 7, pp. 152667–152678, 2019, doi: 10.1109/ACCESS.2019.2948526.
Z. Akhtar, D. Dasgupta, and B. Banerjee, “Face Authenticity: An Overview of Face Manipulation Generation, Detection and Recognition,” SSRN Electron. J., 2019.
U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, and C. Busch, “Face Recognition Systems Under Morphing Attacks: A Survey,” IEEE Access, vol. 7, pp. 23012–23026, 2019, doi: 10.1109/ACCESS.2019.2899367.
J. Frank, T. Eisenhofer, L. Schönherr, A. Fischer, D. Kolossa, and T. Holz, “Leveraging frequency analysis for deep fake image recognition,” in 37th International Conference on Machine Learning, ICML 2020, in ICML’20, vol. PartF16814. JMLR.org, 2020, pp. 3205–3216.
A. Jain, R. Singh, and M. Vatsa, “On Detecting GANs and Retouching based Synthetic Alterations,” in 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), IEEE, Oct. 2018, pp. 1–7. doi: 10.1109/BTAS.2018.8698545.
R. Raghavendra, K. B. Raja, and C. Busch, “Detecting morphed face images,” in 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), IEEE, Sep. 2016, pp. 1–7. doi: 10.1109/BTAS.2016.7791169.
C. Rathgeb, C.-I. Satnoianu, N. E. Haryanto, K. Bernardo, and C. Busch, “Differential Detection of Facial Retouching: A Multi-Biometric Approach,” IEEE Access, vol. 8, pp. 106373–106385, 2020, doi: 10.1109/ACCESS.2020.3000254.
U. Scherhag, D. Budhrani, M. Gomez-Barrero, and C. Busch, Detecting morphed face images using facial landmarks, vol. 10884 LNCS. Springer International Publishing, 2018. doi: 10.1007/978-3-319-94211-7_48.
U. Scherhag, C. Rathgeb, J. Merkle, and C. Busch, “Deep Face Representations for Differential Morphing Attack Detection,” IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 3625–3639, 2020, doi: 10.1109/TIFS.2020.2994750.
S.-Y. Wang, O. Wang, R. Zhang, A. Owens, and A. Efros, “Detecting Photoshopped Faces by Scripting Photoshop,” in 2019 IEEE/CVF International Conference on Computer Vision (ICCV), IEEE, Oct. 2019, pp. 10071–10080. doi: 10.1109/ICCV.2019.01017.
U. Scherhag, J. Kunze, C. R athgeb, and C. Busch, “Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach,” IET Biometrics, vol. 9, no. 6, pp. 278--289(11), Nov. 2020, [Online]. Available: https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2019.0206
C. Rathgeb et al., “PRNU-based detection of facial retouching,” IET Biometrics, vol. 9, no. 4, pp. 154--164(10), Jul. 2020, [Online]. Available: https://digital-library.theiet.org/content/journals/10.1049/iet-bmt.2019.0196
F. Marra, D. Gragnaniello, D. Cozzolino, and L. Verdoliva, “Detection of GAN-Generated Fake Images over Social Networks,” in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 2018, pp. 384–389. doi: 10.1109/MIPR.2018.00084.
D. Gragnaniello, D. Cozzolino, F. Marra, G. Poggi, and L. Verdoliva, “Are GAN Generated Images Easy to Detect? A Critical Analysis of the State-Of-The-Art,” in 2021 IEEE International Conference on Multimedia and Expo (ICME), 2021, pp. 1–6. doi: 10.1109/ICME51207.2021.9428429.
Y. Mirsky and W. Lee, “The creation and detection of deepfakes: A survey,” ACM Comput. Surv., vol. 54, no. 1, pp. 1–41, 2021.
T. T. Nguyen, C. M. Nguyen, D. T. Nguyen, D. T. Nguyen, and S. Nahavandi, “Deep Learning for Deepfakes Creation and Detection,” CoRR, vol. abs/1909.1, 2019, [Online]. Available: http://arxiv.org/abs/1909.11573
F. Matern, C. Riess, and M. Stamminger, “Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations,” in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), IEEE, Jan. 2019, pp. 83–92. doi: 10.1109/WACVW.2019.00020.
S. Hu, Y. Li, and S. Lyu, “Exposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights,” in ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, Jun. 2021, pp. 2500–2504. doi: 10.1109/ICASSP39728.2021.9414582.
X. Han, Z. Ji, and W. Wang, “Low Resolution Facial Manipulation Detection,” in 2020 IEEE International Conference on Visual Communications and Image Processing (VCIP), 2020, pp. 431–434. doi: 10.1109/VCIP49819.2020.9301796.
X. Yang, Y. Li, H. Qi, and S. Lyu, “Exposing GAN-synthesized Faces Using Landmark Locations,” in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA: ACM, Jul. 2019, pp. 113–118. doi: 10.1145/3335203.3335724.
S. McCloskey and M. Albright, “Detecting GAN-Generated Imagery Using Saturation Cues,” in 2019 IEEE International Conference on Image Processing (ICIP), 2019, pp. 4584–4588. doi: 10.1109/ICIP.2019.8803661.
H. Li, B. Li, S. Tan, and J. Huang, “Detection of Deep Network Generated Images Using Disparities in Color Components,” ArXiv, vol. abs/1808.0, 2018.
L. Nataraj et al., “Detecting GAN generated Fake Images using Co-occurrence Matrices,” ArXiv, vol. abs/1903.0, 2019.
M. Barni, K. Kallas, E. Nowroozi, and B. Tondi, “CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis,” in 2020 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, Dec. 2020, pp. 1–6. doi: 10.1109/WIFS49906.2020.9360905.
H. Dang, F. Liu, J. Stehouwer, X. Liu, and A. K. Jain, “On the Detection of Digital Face Manipulation,” in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020, pp. 5780–5789. doi: 10.1109/CVPR42600.2020.00582.
R. Wang, L. Ma, F. Juefei-Xu, X. Xie, J. Wang, and Y. Liu, “FakeSpotter: {A} Simple Baseline for Spotting AI-Synthesized Fake Faces,” CoRR, vol. abs/1909.0, 2019, [Online]. Available: http://arxiv.org/abs/1909.06122
A. Jain, P. Majumdar, R. Singh, and M. Vatsa, “Detecting GANs and Retouching based Digital Alterations via DAD-HCNN,” in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2020, pp. 2870–2879. doi: 10.1109/CVPRW50498.2020.00344.
Z. Mi, X. Jiang, T. Sun, and K. Xu, “GAN-Generated Image Detection With Self-Attention Mechanism Against GAN Generator Defect,” IEEE J. Sel. Top. Signal Process., vol. 14, no. 5, pp. 969–981, 2020, doi: 10.1109/JSTSP.2020.2994523.
X. Zhang, S. Karaman, and S.-F. Chang, “Detecting and Simulating Artifacts in GAN Fake Images,” in 2019 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, Dec. 2019, pp. 1–6. doi: 10.1109/WIFS47025.2019.9035107.
T. Dzanic, K. Shah, and F. D. Witherden, “Fourier Spectrum Discrepancies in Deep Network Generated Images,” in Proceedings of the 34th International Conference on Neural Information Processing Systems, in NIPS’20. Red Hook, NY, USA: Curran Associates Inc., 2020.
R. Durall, M. Keuper, and J. Keuper, “Watch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2020, pp. 7887–7896. doi: 10.1109/CVPR42600.2020.00791.
N. Bonettini, P. Bestagini, S. Milani, and S. Tubaro, “On the use of Benford’s law to detect GAN-generated images,” in 2020 25th International Conference on Pattern Recognition (ICPR), IEEE, Jan. 2021, pp. 5495–5502. doi: 10.1109/ICPR48806.2021.9412944.
Z. A. Salih, R. Thabit, K. A. Zidan, and B. E. Khoo, “A new face image manipulation reveal scheme based on face detection and image watermarking,” in 2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), IEEE, 2022, pp. 1–6.
Z. A. Salih, R. Thabit, and K. A. Zidan, “A New Manipulation Detection and Localization Scheme,” J. Eng. Sci. Technol., vol. 18, no. 2, pp. 1164–1183, 2023.
M. H. Al-Hadaad, R. Thabit, and K. A. Zidan, “A New Face Image Authentication Scheme based on Bicubic Interpolation,” Al-Iraqia J. Sci. Eng. Res., vol. 2, no. 2, pp. 1000–1006, Jun. 2023, doi: 10.58564/IJSER.2.2.2023.68.
M. H. Al-Hadaad, R. Thabit, and K. A. Zidan, “A New Face Region Recovery Algorithm based on Bicubic Interpolation,” JOIV Int. J. Informatics Vis., vol. 7, no. 3, pp. 1000–1006, Sep. 2023, doi: 10.30630/joiv.7.3.1671.
M. H. Al-Hadaad, R. Thabit, and K. A. Zidan, “Tamper detection , localization , and recovery for digital face images,” 2023.
S. Hu, Y. Li, and S. Lyu, “Exposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights,” in ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021, pp. 2500–2504. doi: 10.1109/ICASSP39728.2021.9414582.
F. Marra, C. Saltori, G. Boato, and L. Verdoliva, “Incremental learning for the detection and classification of gan-generated images,” in 2019 IEEE international workshop on information forensics and security (WIFS), 2019, pp. 1–6.
A. Bharati, R. Singh, M. Vatsa, and K. W. Bowyer, “Detecting Facial Retouching Using Supervised Deep Learning,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 9, pp. 1903–1913, 2016, doi: 10.1109/TIFS.2016.2561898.
C. Kong, B. Chen, H. Li, S. Wang, A. Rocha, and S. T. W. Kwong, “Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision,” ArXiv, vol. abs/2107.0, 2021.
L. Cao, W. Sheng, F. Zhang, K. Du, C. Fu, and P. Song, “Face Manipulation Detection Based on Supervised Multi-Feature Fusion Attention Network.,” Sensors (Basel)., vol. 21, no. 24, Dec. 2021, doi: 10.3390/s21248181.
I. Amerini, L. Galteri, R. Caldelli, and A. Del Bimbo, “Deepfake video detection through optical flow based cnn,” in Proceedings of the IEEE/CVF international conference on computer vision workshops, 2019, p. 0.
T. Jung, S. Kim, and K. Kim, “Deepvision: Deepfakes detection using human eye blinking pattern,” IEEE Access, vol. 8, pp. 83144–83154, 2020.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Asmaa Hatem Jawad, Rasha Thabit, Khamis A. Zidan
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.