Affiliation:
1. College of Computer Science and Technology, Jilin University, Changchun, China
Abstract
With the continuous development of deep counterfeiting technology, the information security in our daily life is under serious threat. While existing face forgery detection methods exhibit impressive accuracy when applied to datasets such as FaceForensics++ and Celeb- DF, they falter significantly when confronted with out-of-domain scenarios. This causes specialization of learned representations to known forgery patterns presented in the training set, rendering it difficult to detect forgeries with unknown patterns. To address this challenge, we propose a novel end-to-end
F
ace
R
econstruction-based
G
eneralized
D
eepfake
D
etection model with Residual Outlook Attention, named
FRG2D
, which emphasizes the robust visual representations of genuine faces and discerns the subtle differences between authentic and manipulated facial images. Our methodology entails reconstructing authentic face images using an encoder-decoder architecture based on U-net, facilitating a deeper understanding of disparities between genuine and manipulated facial images. Furthermore, we integrate the convolutional block attention module (CBAM) and channel attention block (CAB) to selectively focus the network’s attention on salient features within real face images. Furthermore, we employ Residual Outlook Attention (ROA) to guide the network’s focus towards precise features within manipulated facial images. Simultaneously, the computed reconstruction differences obtained through Residual Outlook Attention serves as the ultimate representation fed into the classifier for face forgery detection. Both the reconstruction and classification learning processes are optimized end-to-end. Through extensive experimentation, our model demonstrated a substantial improvement in deepfake detection across unknown domains, while maintaining a high accuracy within the known domain.
Publisher
Association for Computing Machinery (ACM)
Reference79 articles.
1. Generative adversarial nets[J];Goodfellow I;Advances in Neural Information Processing Systems,2014
2. Cozzolino D Poggi G Verdoliva L. Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection[C]//Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. 2017: 159-164.
3. Zhang X, Zou Y, Wang W. LD-CNN: A lightweight dilated convolutional neural network for environmental sound classification[C]//Proceedings of the 2018 24th International Conference on Pattern Recognition. IEEE, 2018: 373-378.
4. Dang H Liu F Stehouwer J et al. On the detection of digital face manipulation[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020: 5781-5790.
5. Tariq S, Lee S, Woo S S. A convolutional LSTM based residual network for deepfake video detection[J]. arXiv preprint arXiv:2009.07480, 2020.