Generalizing Face Forgery Detection by Suppressed Texture Network With Two-Branch Convolution

被引:1
|
作者
Zhang, Dengyong [1 ,2 ]
Li, Daijie [1 ,2 ]
Sangaiah, Arun Kumar [3 ,4 ,5 ]
Li, Feng [1 ,2 ]
Deng, Zelin [1 ,2 ]
Wu, Chengcheng [1 ,2 ]
机构
[1] Changsha Univ Sci & Technol, Hunan Prov Key Lab Intelligent Proc Big Data Trans, Changsha 410114, Peoples R China
[2] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
[3] Natl Yunlin Univ Sci & Technol, Int Grad Sch Artificial Intelligence, Touliu 64002, Taiwan
[4] Sunway Univ, Sch Engn & Technol, Petaling Jaya 47500, Selangor, Malaysia
[5] Chandigarh Univ, Chandigarh 140413, Punjab, India
基金
中国国家自然科学基金;
关键词
Forgery; Faces; Kernel; Convolution; Image texture; Feature extraction; Streaming media; Cyber-bullying detection; deep learning; deepfake (DF) detection; face manipulation; generalization ability;
D O I
10.1109/TCSS.2024.3441251
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Internet technology, deepfake (DF) videos can spread rapidly through online platforms, providing a new way of cyberbullying by generating nude pictures of female victims and using their faces to generate pornographic movies, which bring potential harm to individuals, society, and the country. Recently, there have been some really impressive results with DF detection models. These models have shown excellent outstanding performance when they are trained and tested using data from the same dataset. However, detecting DF remains difficult when the data comes from challenging datasets. To address this issue, this article aims to enhance the model's generalization by taking full advantage of the learning and representation capabilities of convolutional neural networks (CNNs) to adaptively suppress image texture information and catch deeper and more universal forgery features. Specifically, we introduce the texture suppression module (TSM) as a first step to suppress image content while simultaneously revealing the differences between authentic and tampered regions. Then, we carefully designed the cross stream interaction module (CSIM) and the cross stream mix block (CSMB) module to fully exploit the extracted forgery traces. Our proposed model has demonstrated superior generalization performance in extensive experiments.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Robust face forgery detection integrating local texture and global texture information
    Gong, Rongrong
    He, Ruiyi
    Zhang, Dengyong
    Sangaiah, Arun Kumar
    Alenazi, Mohammed J. F.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2025, 2025 (01):
  • [22] FACE FORGERY DETECTION BASED ON SEGMENTATION NETWORK
    Zhou, Yingbin
    Luo, Anwei
    Kang, Xiangui
    Lyu, Siwei
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 3597 - 3601
  • [23] IR-Capsule: Two-Stream Network for Face Forgery Detection
    Kaihan Lin
    Weihong Han
    Shudong Li
    Zhaoquan Gu
    Huimin Zhao
    Jinchang Ren
    Li Zhu
    Jujian Lv
    Cognitive Computation, 2023, 15 : 13 - 22
  • [24] IR-Capsule: Two-Stream Network for Face Forgery Detection
    Lin, Kaihan
    Han, Weihong
    Li, Shudong
    Gu, Zhaoquan
    Zhao, Huimin
    Ren, Jinchang
    Zhu, Li
    Lv, Jujian
    COGNITIVE COMPUTATION, 2023, 15 (01) : 13 - 22
  • [25] Cross-Attention Based Two-Branch Networks for Document Image Forgery Localization in the Metaverse
    Song, Yalin
    Jiang, Wenbin
    Chai, Xiuli
    Gan, Zhihua
    Zhou, Mengyuan
    Chen, Lei
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2025, 21 (02)
  • [26] Microexpression Recognition Algorithm Based on a Two-Branch Lightweight Network
    Zhang Bo
    Wu Yufan
    LASER & OPTOELECTRONICS PROGRESS, 2024, 61 (14)
  • [27] A Two-Branch Fusion Network for Infrared and Visible Image Fusion
    Zhang, Weihao
    Li, Zhilin
    Li, Bin
    Zhang, Mingliang
    PATTERN RECOGNITION AND COMPUTER VISION, PT IX, PRCV 2024, 2025, 15039 : 42 - 55
  • [28] Steganalysis Network With Two-Branch Preprocessing for Spatial and JPEG Domains
    He, Jian
    Weng, Shaowei
    Yu, Lifang
    Chen, Dewang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2025, 35 (02) : 1451 - 1463
  • [29] A two-branch hand gesture recognition approach combining atrous convolution and attention mechanism
    Wang, Shi
    Zhang, Shihui
    Zhang, Xiaowei
    Geng, Qingjia
    VISUAL COMPUTER, 2023, 39 (10): : 4487 - 4500
  • [30] Two-branch fusion network with attention map for crowd counting
    Wang, Yongjie
    Zhang, Wei
    Liu, Yanyan
    Zhu, Jianghua
    NEUROCOMPUTING, 2020, 411 : 1 - 8