期刊文献+

面向深度伪造的溯源取证方法 被引量:4

Analyzing deepfake provenance and forensics
原文传递
导出
摘要 近年来,生成对抗网络(GAN)的迅速发展使得合成图像越来越逼真,对个人和社会造成了极大的威胁。现有的研究致力于被动地鉴别伪造产品,但在真实应用场景下通常面临通用性不足和鲁棒性差等两大难题。因此,该文提出了一种面向深度伪造的溯源取证方法,将秘密信息隐藏到图像中以追踪伪造图像的源头。设计了一个端到端的深度神经网络,该网络由嵌入网络、 GAN模拟器和恢复网络等3部分组成。其中,嵌入网络和恢复网络分别用于实现秘密信息的嵌入和提取,GAN模拟器用于模拟各种GAN的图像变换。实验中在已知GAN的篡改下恢复图像的平均归一化互相关(NCC)系数高于0.9,在未知GAN的篡改下平均NCC也能达到0.8左右,具有很好的鲁棒性和通用性。此外,该方法中嵌入的秘密信息具有较好的隐蔽性,平均峰值信噪比(PSNR)在30 dB左右。 In recent years, the rapid development of generative adversarial networks(GAN) has made synthesized images more and more realistic, which poses great threats to individuals and society. Existing research has focused on passively identifying deepfakes, but real-world applications are usually insufficiently general and robust. This paper presents a method for deepfake provenance and forensics. Deepfakes hide secret information in facial images to track the source of the forged image. An end-to-end deep neural network was designed to include an embedding network, a GAN simulator, and a recovery network. The embedding network embeds the secret information in the picture while the recovery network extracts the information. The GAN simulator simulates various GAN-based image transformations. The average normalized cross correlation coefficient(NCC) of the restored images after tampering with known GANs is higher than 0.9 and the average NCC reaches around 0.8 with tampering by unknown GANs, which shows good robustness and generalization. In addition, the secret embedded information is well concealed and the average peak signal to noise ratio(PSNR) is about 30 dB.
作者 王丽娜 聂建思 汪润 翟黎明 WANG Lina;NIE Jiansi;WANG Run;ZHAI Liming(Key Laboratory of Aerospace Information Security and Trusted Computing,Wuhan University,Wuhan 430072,China)
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2022年第5期959-964,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金面上项目(61876134) 国家自然科学基金联合基金项目(U1836112) 国家重点研发计划项目(2020YFB1805400)。
关键词 图像合成与篡改 深度伪造 溯源取证 image synthesis and manipulation deepfakes provenance and forensics
  • 相关文献

参考文献1

二级参考文献9

  • 1Ross J A.Information Hiding[C].First International Workshop,LNCS 1174.Berlin:Springer-Verlag,1996.
  • 2Schyndel R G V,Tirkel A Z,Osborne C F.A Digital Watermark[C].First IEEE International Image Processing Conference,Austin,Texas,1994,2:86-90.
  • 3Bender W,Gruhl D,Morimoto N,et al.Techniques for Data Hiding[J].IBM Systems Journal,1996,35(3/4):313-336.
  • 4Cox I,Kilian J,Leigthon F T,et al.Secure Spread Spectrum Watermarking for Images,Audio and Video[C].IEEE Int.Conference.on Images Processing,1996,3:243-246.
  • 5Serdean C V,Ambroze M A,Tomlinson M,et al.DWT-based High-capacity Blind Video Watermarking,Invariant to Geometrical Attacks[J].Vision,Image and Signal Processing,2003,150(1):51-58.
  • 6Natarajan B.Robust Public Key Watermarking of Digital Images[R].HP Labs,Tech.Reports,1997:118.
  • 7Eggers J J,Su J K,Girod B.Asymmetric Watermarking Schemes[C].Tagungsband des GI Workshops Sicherheit in Mediendaten,Berlin,2000-09.
  • 8Hernandez J R,Rodriguez J M,PG F.Improving the Performance of Spatial Watermarking of Images Using Channel Coding[J].Signal Processing,2000,80 (7):1261-1279.
  • 9Michalewicz Z.周家驹译.演化程序-遗传算法和数据编码的结合[M].北京:科学出版社,2000:1.

共引文献3

同被引文献49

引证文献4

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部