Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks

Author:

Hussain Shehzeen,Neekhara Paarth1,Dolhansky Brian2,Bitton Joanna2,Ferrer Cristian Canton2,McAuley Julian1,Koushanfar Farinaz1

Affiliation:

1. University of California, San Diego, USA

2. Facebook AI, USA

Abstract

Recent advances in video manipulation techniques have made the generation of fake videos more accessible than ever before. Manipulated videos can fuel disinformation and reduce trust in media. Therefore detection of fake videos has garnered immense interest in academia and industry. Recently developed Deepfake detection methods rely on Deep Neural Networks (DNNs) to distinguish AI-generated fake videos from real videos. In this work, we demonstrate that it is possible to bypass such detectors by adversarially modifying fake videos synthesized using existing Deepfake generation methods. We further demonstrate that our adversarial perturbations are robust to image and video compression codecs, making them a real-world threat. We present pipelines in both white-box and black-box attack scenarios that can fool DNN-based Deepfake detectors into classifying fake videos as real. Finally, we study the extent to which adversarial perturbations transfer across different Deepfake detectors and create more accessible attacks using universal adversarial perturbations that pose a very feasible attack scenario since they can be easily shared amongst attackers.

Publisher

Association for Computing Machinery (ACM)

Subject

General Medicine

Reference80 articles.

1. Darius Afchar , Vincent Nozick , Junichi Yamagishi , and Isao Echizen . 2018 . Mesonet: a compact facial video forgery detection network . In 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE. Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: a compact facial video forgery detection network. In 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE.

2. Irene Amerini , Leonardo Galteri , Roberto Caldelli , and Alberto Del Bimbo . 2019 . Deepfake Video Detection through Optical Flow Based CNN . In The IEEE International Conference on Computer Vision (ICCV) Workshops. Irene Amerini, Leonardo Galteri, Roberto Caldelli, and Alberto Del Bimbo. 2019. Deepfake Video Detection through Optical Flow Based CNN. In The IEEE International Conference on Computer Vision (ICCV) Workshops.

3. Anish Athalye Nicholas Carlini and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420(2018). Anish Athalye Nicholas Carlini and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420(2018).

4. Anish Athalye , Logan Engstrom , Andrew Ilyas , and Kevin Kwok . 2018 . Synthesizing Robust Adversarial Examples . In Proceedings of the 35th International Conference on Machine Learning. Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning.

5. Exploiting Spatial Structure for Localizing Manipulated Image Regions

Cited by 12 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. FaceSigns: Semi-fragile Watermarks for Media Authentication;ACM Transactions on Multimedia Computing, Communications, and Applications;2024-09-12

2. Metaverse in advanced manufacturing: Background, applications, limitations, open issues & future directions;ICT Express;2024-04

3. D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles;2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV);2024-01-03

4. AE-LSTM: A Hybrid Approach for Detecting Deepfake Videos in Digital Forensics;Lecture Notes in Networks and Systems;2024

5. A New Security Mechanism for IoT Devices: Electroencephalogram (EEG) Signals;Lecture Notes in Networks and Systems;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3