skip to main content
10.1145/3206004.3206009acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Fake Faces Identification via Convolutional Neural Network

Published:14 June 2018Publication History

ABSTRACT

Generative Adversarial Network (GAN) is a prominent generative model that are widely used in various applications. Recent studies have indicated that it is possible to obtain fake face images with a high visual quality based on this novel model. If those fake faces are abused in image tampering, it would cause some potential moral, ethical and legal problems. In this paper, therefore, we first propose a Convolutional Neural Network (CNN) based method to identify fake face images generated by the current best method [20], and provide experimental evidences to show that the proposed method can achieve satisfactory results with an average accuracy over 99.4%. In addition, we provide comparative results evaluated on some variants of the proposed CNN architecture, including the high pass filter, the number of the layer groups and the activation function, to further verify the rationality of our method.

References

  1. Mart'ın Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et almbox. . 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 (2016).Google ScholarGoogle Scholar
  2. Belhassen Bayar and Matthew C Stamm . 2016. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. 5--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David Berthelot, Tom Schumm, and Luke Metz . 2017. Began: Boundary equilibrium generative adversarial networks. arXiv preprint arXiv:1703.10717 (2017).Google ScholarGoogle Scholar
  4. Gang Cao, Yao Zhao, Rongrong Ni, and Xuelong Li . 2014. Contrast enhancement-based forensics in digital images. IEEE transactions on information forensics and security Vol. 9, 3 (2014), 515--525. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jiansheng Chen, Xiangui Kang, Ye Liu, and Z Jane Wang . 2015. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters Vol. 22, 11 (2015), 1849--1853.Google ScholarGoogle ScholarCross RefCross Ref
  6. Mo Chen, Vahid Sedighi, Mehdi Boroumand, and Jessica Fridrich . 2017. JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images ACM Workshop on Information Hiding and Multimedia Security. 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hak-Yeol Choi, Han-Ul Jang, Dongkyu Kim, Jeongho Son, Seung-Min Mun, Sunghee Choi, and Heung-Kyu Lee . {n. d.}. Detecting composite image manipulation based on deep neural networks IEEE International Conference on Systems, Signals and Image Processing. 1--5.Google ScholarGoogle Scholar
  8. Vincent Dumoulin, Jonathon Shlens, and Manjunath Kudlur . 2017. A learned representation for artistic style. In Proceedings of International Conference on Learning Representations.Google ScholarGoogle Scholar
  9. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio . 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672--2680. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Satoshi Iizuka, Edgar Simo-Serra, and Hiroshi Ishikawa . 2017. Globally and locally consistent image completion. ACM Transactions on Graphics Vol. 36, 4 (2017), 107:1--107:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Justin Johnson, Alexandre Alahi, and Li Fei-Fei . 2016. Perceptual losses for real-time style transfer and super-resolution European Conference on Computer Vision. Springer, 694--711.Google ScholarGoogle Scholar
  12. Diederik P. Kingma and Jimmy Ba . 2014. Adam: A Method for Stochastic Optimization. CoRR Vol. abs/1412.6980 (2014). showeprint{arxiv}1412.6980deftempurl%http://arxiv.org/abs/1412.6980 tempurlGoogle ScholarGoogle Scholar
  13. Christian Ledig, Lucas Theis, Ferenc Huszar, Jose Caballero, Andrew Cunningham, Alejandro Acosta, Andrew Aitken, Alykhan Tejani, Johannes Totz, Zehan Wang, et almbox. . 2017. Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4681--4690.Google ScholarGoogle Scholar
  14. Haodong Li, Weiqi Luo, Xiaoqing Qiu, and Jiwu Huang . 2018. Identification of various image operations using residual-based features. IEEE Transactions on Circuits and Systems for Video Technology Vol. 28, 1 (2018), 31--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lu Li, Jianru Xue, Zhiqiang Tian, and Nanning Zheng . 2013. Moment feature based forensic detection of resampled digital images Proceedings of the 21st ACM international conference on Multimedia. ACM, 569--572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Xiaoqing Qiu, Haodong Li, Weiqi Luo, and Jiwu Huang . 2014. A universal image forensic strategy based on steganalytic model Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, 165--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yuan Rao and Jiangqun Ni . 2016. A deep learning approach to detection of splicing and copy-move forgeries in images IEEE International Workshop on Information Forensics and Security. 1--6.Google ScholarGoogle Scholar
  18. Casper Kaae Sønderby, Jose Caballero, Lucas Theis, Wenzhe Shi, and Ferenc Huszár . 2017. Amortised map inference for image super-resolution Proceedings of International Conference on Learning Representations.Google ScholarGoogle Scholar
  19. Matthew Stamm and KJ Ray Liu . 2008. Blind forensics of contrast enhancement in digital images IEEE International Conference on Image Processing. IEEE, 3112--3115.Google ScholarGoogle Scholar
  20. Samuli Laine Jaakko Lehtinen Tero Karras, Timo Aila . 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. International Conference on Learning Representations (2018). deftempurl%https://openreview.net/forum?id=Hk99zCeAb tempurl accepted as oral presentation.Google ScholarGoogle Scholar
  21. Guanshuo Xu, Han Zhou Wu, and Yun Qing Shi . 2016. Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Processing Letters Vol. 23, 5 (2016), 708--712.Google ScholarGoogle ScholarCross RefCross Ref
  22. Chao Yang, Xin Lu, Zhe Lin, Eli Shechtman, Oliver Wang, and Hao Li . 2017. High-resolution image inpainting using multi-scale neural patch synthesis The IEEE Conference on Computer Vision and Pattern Recognition, Vol. Vol. 1. 3.Google ScholarGoogle Scholar

Index Terms

  1. Fake Faces Identification via Convolutional Neural Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
      June 2018
      152 pages
      ISBN:9781450356251
      DOI:10.1145/3206004

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      IH&MMSec '18 Paper Acceptance Rate18of40submissions,45%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader