期刊文献+
共找到249篇文章
< 1 2 13 >
每页显示 20 50 100
A Thorough Investigation on Image Forgery Detection
1
作者 Anjani Kumar Rai Subodh Srivastava 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1489-1528,共40页
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for... Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field. 展开更多
关键词 forgery detection digital forgery image forgery localization image segmentation image forensics multimedia security
下载PDF
An Active Image Forgery Detection Approach Based on Edge Detection
2
作者 Hüseyin Bilal Macit Arif Koyun 《Computers, Materials & Continua》 SCIE EI 2023年第4期1603-1619,共17页
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo... Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression. 展开更多
关键词 Image forgery image tampering edge detection
下载PDF
Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique
3
作者 C.D.Prem Kumar S.Saravana Sundaram 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期881-899,共19页
The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-mo... The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-move forgery.Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification.Contrast-ingly,deep learning(DL)models have demonstrated significant performance over the other statistical techniques.With this motivation,this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection(ODTL-CMFD)technique.The presented ODTL-CMFD technique aims to derive a DL model for the classification of target images into the original and the forged/tampered,and then localize the copy moved regions.To perform the feature extraction process,the political optimizer(PO)with Mobile Networks(MobileNet)model has been derived for generating a set of useful vectors.Finally,an enhanced bird swarm algorithm(EBSA)with least square support vector machine(LS-SVM)model has been employed for classifying the digital images into the original or the forged ones.The utilization of the EBSA algorithm helps to properly modify the parameters contained in the Multiclass Support Vector Machine(MSVM)technique and thereby enhance the classification performance.For ensuring the enhanced performance of the ODTL-CMFD technique,a series of simulations have been performed against the benchmark MICC-F220,MICC-F2000,and MICC-F600 datasets.The experimental results have demonstrated the improvised performance of the ODTL-CMFD approach over the other techniques in terms of several evaluation measures. 展开更多
关键词 Copy move detection image forgery deep learning machine learning parameter tuning FORENSICS
下载PDF
A New Method for Image Tamper Detection Based on an Improved U-Net
4
作者 Jie Zhang Jianxun Zhang +2 位作者 Bowen Li Jie Cao Yifan Guo 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2883-2895,共13页
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery dete... With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery detection techniques.In this paper,a U-Net with multiple sensory field feature extraction(MSCU-Net)for image forgery detection is proposed.The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing.MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the features of different perceptual fields use residual propagation and residual feedback to recall the input feature information and consolidate the input feature information to make the difference in image attributes between the untampered and tampered regions more obvious,and introduce the channel coordinate confusion attention mechanism(CCCA)in skip-connection to further improve the segmentation accuracy of the network.In this paper,extensive experiments are conducted on various mainstream datasets,and the results verify the effectiveness of the proposed method,which outperforms the state-of-the-art image forgery detection methods. 展开更多
关键词 forgery detection multiple receptive fields cyclic residuals U-Net channel coordinate confusion attention
下载PDF
Copy-Move Forgeries Detection and Localization Using Two Levels of Keypoints Extraction 被引量:1
5
作者 Soad Samir Eid Emary +1 位作者 Khaled Elsayed Hoda Onsi 《Journal of Computer and Communications》 2019年第9期1-18,共18页
Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. There... Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. Therefore, Copy-Move forgery is a very significant problem and active research area to check the confirmation of the image. In this paper, a system for Copy Move Forgery detection is proposed. The proposed system is composed of two stages: one is called the detection stages and the second is called the refine detection stage. The detection stage is executed using Speeded-Up Robust Feature (SURF) and Binary Robust Invariant Scalable Keypoints (BRISK) for feature detection and in the refine detection stage, image registration using non-linear transformation is used to enhance detection efficiency. Initially, the genuine image is picked, and then both SURF and BRISK feature extractions are used in parallel to detect the interest keypoints. This gives an appropriate number of interest points and gives the assurance for finding the majority of the manipulated regions. RANSAC is employed to find the superior group of matches to differentiate the manipulated parts. Then, non-linear transformation between the best-matched sets from both extraction features is used as an optimization to get the best-matched set and detect the copied regions. A number of numerical experiments performed using many benchmark datasets such as, the CASIA v2.0, MICC-220, MICC-F600 and MICC-F2000 datasets. With the proposed algorithm, an overall average detection accuracy of 95.33% is obtained for evaluation carried out with the aforementioned databases. Forgery detection achieved True Positive Rate of 97.4% for tampered images with object translation, different degree of rotation and enlargement. Thus, results from different datasets have been set, proving that the proposed algorithm can individuate the altered areas, with high reliability and dealing with multiple cloning. 展开更多
关键词 COPY MOVE forgery detection Keypoint Based Methods SURF BRISK Bi-Cubic Interpolation
下载PDF
Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques 被引量:6
6
作者 SHI Wenchang ZHAO Fei +1 位作者 QIN Bo LIANG Bin 《China Communications》 SCIE CSCD 2016年第1期139-149,共11页
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach... Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance. 展开更多
关键词 粒子群优化算法 图像复制 检测结果 优化技术 伪造 SIFT 移动 CMF
下载PDF
Multiple Forgery Detection in Video Using Convolution Neural Network
7
作者 Vinay Kumar Vineet Kansal Manish Gaur 《Computers, Materials & Continua》 SCIE EI 2022年第10期1347-1364,共18页
With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to de... With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to detect such problem and do the necessary actions.In this work,we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations.The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to these features to find the forgery in the video.This work calculates the correlation coefficient from the deep features of the adjacent frames rather than calculating directly from the frames.We divide the procedure of forgery detection into two phases–video forgery detection and video forgery classification.In video forgery detection,this approach detect input video is original or tampered.If the video is not original,then the video is checked in the next phase,which is video forgery classification.In the video forgery classification,method review the forged video for insertion forgery,deletion forgery,and also again check for originality.The proposed work is generalized and it is tested on two different datasets.The experimental results of our proposed model show that our approach can detect the forgery with the accuracy of 91%on VIFFD dataset,90%in TDTV dataset and classify the type of forgery–insertion and deletion with the accuracy of 82%on VIFFD dataset,86%on TDTV dataset.This work can helps in the analysis of original and tempered video in various domain. 展开更多
关键词 Digital forensic forgery detection video authentication video interframe forgery video processing deep learning
下载PDF
Fast Forgery Detection with the Intrinsic Resampling Properties
8
作者 Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou 《Journal of Information Security》 2010年第1期11-22,共12页
With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies of... With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regions in the image, in which the resampling and interpolation processes are often demanded. By observing the detectable periodic distribution properties generated from the resampling and interpolation processes, we propose a novel method based on the intrinsic properties of resampling scheme to detect the tampered regions. The proposed method applies the pre-calculated resampling weighting table to detect the periodic properties of prediction error distribution. The experimental results show that the proposed method outperforms the conventional methods in terms of efficiency and accuracy. 展开更多
关键词 IMAGE forgery RESAMPLING forgery detection INTRINSIC PROPERTIES of RESAMPLING
下载PDF
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH
9
作者 Mahmoud Emam Qi Han Hongli Zhang 《国际计算机前沿大会会议论文集》 2016年第1期83-85,共3页
Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo ... Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo some manipulations before being shared without leaving any obvious traces of tampering; due to existence of the powerful image editing softwares. Copy-move forgery technique is a very simple and common type of image forgery, where a part of the image is copied and then pasted in the same image to replicate or hide some parts from the image. In this paper, we proposed a copy-scale-move forgery detection method based on Scale Invariant Feature Operator (SFOP) detector. The keypoints are then described using MROGH descriptor. Experimental results show that the proposed method is able to locate and detect the forgery even if under some geometric transformations such as scaling. 展开更多
关键词 Image FORENSICS Copy-move forgery detection SCALE invariant feature RANSAC MROGH descriptor
下载PDF
Mining Fine-Grain Face Forgery Cues with Fusion Modality
10
作者 Shufan Peng Manchun Cai +1 位作者 Tianliang Lu Xiaowen Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期4025-4045,共21页
Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain f... Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain forgery cues with high transferability.Such cues positively impact the model’s accuracy and generalizability.Moreover,single-modality often causes overfitting of the model,and Red-Green-Blue(RGB)modal-only is not conducive to extracting the more detailed forgery traces.We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues.First,we propose two functional modules to reveal and locate the deeper forged features.Our method locates deeper forgery cues through a dual-modality progressive fusion module and a noise adaptive enhancement module,which can excavate the association between dualmodal space and channels and enhance the learning of subtle noise features.A sensitive patch branch is introduced on this foundation to enhance the mining of subtle forgery traces under fusion modality.The experimental results demonstrate that our proposed framework can desirably explore the differences between authentic and forged images with supervised learning.Comprehensive evaluations of several mainstream datasets show that our method outperforms the state-of-the-art detection methods with remarkable detection ability and generalizability. 展开更多
关键词 Face forgery detection fine-grain forgery cues fusion modality adaptive enhancement
下载PDF
基于BiFormer与跨尺度相关性计算的高精度复制移动篡改检测网络
11
作者 张祝薇 于丽芳 《北京印刷学院学报》 2024年第6期9-13,共5页
针对目前复制移动伪造检测(Copy-Move Forgery Detection, CMFD)网络难以同时有效地检测不同尺度的篡改区域的问题,提出了一种融合了BiFormer与跨尺度相关性计算模块的U型网络BCSU-Net。不同于已有的CMFD网络采用卷积骨干网络提取局部特... 针对目前复制移动伪造检测(Copy-Move Forgery Detection, CMFD)网络难以同时有效地检测不同尺度的篡改区域的问题,提出了一种融合了BiFormer与跨尺度相关性计算模块的U型网络BCSU-Net。不同于已有的CMFD网络采用卷积骨干网络提取局部特征,BCSU-Net采用BiFormer捕获像素之间的长距离依赖关系,以更好地提取特征图中的高相关性特征。此外,还提出了跨尺度相关性计算模块,来计算不同尺度的特征之间的相似度,从而帮助模型更准确地定位出Copy-Move伪造图像中的篡改区域。与现有方法相比,BCSU-Net在COVERAGE和CoMoFod数据集上表现出更优的性能。 展开更多
关键词 复制移动伪造检测 BiFormer 跨尺度相关性计算模块
下载PDF
Protecting the trust and credibility of data by tracking forgery trace based on GANs
12
作者 Shuai Xiao Jiachen Yang Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2022年第6期877-884,共8页
With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rap... With the advent of the 5G Internet of Things era,communication and social interaction in our daily life have changed a lot,and a large amount of social data is transmitted to the Internet.At the same time,with the rapid development of deep forgery technology,a new generation of social data trust crisis has also followed.Therefore,how to ensure the trust and credibility of social data in the 5G Internet of Things era is an urgent problem to be solved.This paper proposes a new method for forgery detection based on GANs.We first discover the hidden gradient information in the grayscale image of the forged image and use this gradient information to guide the generation of forged traces.In the classifier,we replace the traditional binary loss with the focal loss that can focus on difficult-to-classify samples,which can achieve accurate classification when the real and fake samples are unbalanced.Experimental results show that the proposed method can achieve high accuracy on the DeeperForensics dataset and with the highest accuracy is 98%. 展开更多
关键词 forgery detection Trace generation Social data Privacy protection
下载PDF
基于空频联合卷积神经网络的GAN生成人脸检测 被引量:1
13
作者 王金伟 曾可慧 +2 位作者 张家伟 罗向阳 马宾 《计算机科学》 CSCD 北大核心 2023年第6期216-224,共9页
生成式对抗网络(GAN)的快速发展使其在图像生成领域取得了前所未有的成功。StyleGAN等新型GAN的出现使得生成的图像更真实且具有欺骗性,对国家安全、社会稳定和个人隐私都构成了较大威胁。文中提出了一种基于空频联合的双流卷积神经网... 生成式对抗网络(GAN)的快速发展使其在图像生成领域取得了前所未有的成功。StyleGAN等新型GAN的出现使得生成的图像更真实且具有欺骗性,对国家安全、社会稳定和个人隐私都构成了较大威胁。文中提出了一种基于空频联合的双流卷积神经网络的检测模型。鉴于GAN图像在生成过程中因上采样操作在频谱上留下了清晰可辨的伪影,设计了可学习的频率域滤波核以及频率域网络来充分学习并提取频率域特征。为了减弱图像变换至频域过程中丢弃部分信息而带来的影响,同样设计了空间域网络来学习图像内容本身具有差异化的空间域特征,最终将两种特征融合来实现对GAN生成人脸图像的检测。在多个数据集上的实验结果表明,所提模型在高质量生成数据集上的检测精度及在跨数据集的泛化性上都优于现有算法,且对于JPEG压缩、随机剪裁、高斯模糊等图像变换具有更强的鲁棒性。不仅如此,所提方案在GAN生成的局部人脸数据集上也有不错表现,进一步证明了所提模型有着更好的通用性以及更加广泛的应用前景。 展开更多
关键词 数字图像取证 人脸伪造检测 卷积神经网络 生成式对抗网络 频率域
下载PDF
AdfNet:一种基于多样化特征的自适应深度伪造检测网络
14
作者 李家春 李博文 林伟伟 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2023年第9期82-89,共8页
视频篡改造成的危害一直在危及人们的生活,这使深度伪造检测技术逐渐得到广泛关注和发展。然而,目前的检测方法由于使用了不灵活的约束条件,无法有效捕获噪声残差;此外,也忽略了纹理和语义特征之间的关联,以及时序特征对检测性能提升的... 视频篡改造成的危害一直在危及人们的生活,这使深度伪造检测技术逐渐得到广泛关注和发展。然而,目前的检测方法由于使用了不灵活的约束条件,无法有效捕获噪声残差;此外,也忽略了纹理和语义特征之间的关联,以及时序特征对检测性能提升的影响。为了解决上述问题,文中提出了一种用于深度伪造检测的、具有多样化特征的自适应网络(AdfNet),它通过提取语义特征、纹理特征和时序特征帮助分类器判断真伪;探索了自适应纹理噪声提取机制(ATNEM),通过未池化的特征映射与基于频域的通道注意力机制,灵活捕获非固定频段的噪声残差;设计了深层语义分析指导策略(DSAGS),通过空间注意力机制突出篡改痕迹,并引导特征提取器关注焦点区域的深层特征;研究了多尺度时序特征处理方法(MTFPM),利用时序注意力机制给不同视频帧分配权重,捕获被篡改视频中时间序列的差异。实验结果表明,所提出的网络在FaceForensics++(FF++)数据集HQ模式中的ACC值为97.41%,相比当前主流网络有较为明显的性能提升;并且在FF++数据集上保持AUC值为99.80%的同时,在CelebDF上AUC值可达到76.41%,具有较强的泛化性。 展开更多
关键词 深度学习 深度伪造检测 多尺度时序特征 注意力机制 自适应网络
下载PDF
基于改进CenterNet的图像多篡改检测模型
15
作者 夏涛 黄俊 徐太秀 《电讯技术》 北大核心 2023年第8期1228-1236,共9页
针对目前的图像篡改数据集中缺少同时包含多种篡改操作的单张图像的问题,构建了包含多种图像篡改手段的综合数据集(MTO Dataset),每张图片包含复制移动、拼接和移除中的2种或3种篡改操作。针对多篡改检测,提出了一种基于改进CenterNet... 针对目前的图像篡改数据集中缺少同时包含多种篡改操作的单张图像的问题,构建了包含多种图像篡改手段的综合数据集(MTO Dataset),每张图片包含复制移动、拼接和移除中的2种或3种篡改操作。针对多篡改检测,提出了一种基于改进CenterNet的图像多篡改检测模型,将RGB图像和经过隐写分析得到的噪声特征图作为特征提取网络的输入,在特征提取网络ResNet-50的每一层卷积前加入门控通道注意力转换单元以促进特征通道间关系。为得到更具辨别性的特征,通过改进后的注意力机制自适应学习并调节特征权重,最后使用改进的损失函数优化边框预测的准确度。实验结果证明,与当前先进模型DETR、EfficientDet和VarifocalNet相比,该模型的F1分数提升0.4%~7.4%,检测速率提高1.32~3.06倍。 展开更多
关键词 数字图像 图像多篡改检测 CenterNet 注意力机制 损失函数
下载PDF
基于三维人脸数据增强的深度伪造检测方法
16
作者 王昊冉 杨敏敏 +3 位作者 王泽源 白亮 于天元 郭延明 《网络安全与数据治理》 2023年第9期11-20,共10页
随着深度伪造技术的发展,深度伪造视频的制作及传播变得越来越容易,给社会带来了巨大的安全风险,深度伪造检测算法成为当前网络安全领域的重要方向。聚焦于提出一种泛化性能更好、效率更高、可解释性更强的深度伪造检测算法,主要针对DFD... 随着深度伪造技术的发展,深度伪造视频的制作及传播变得越来越容易,给社会带来了巨大的安全风险,深度伪造检测算法成为当前网络安全领域的重要方向。聚焦于提出一种泛化性能更好、效率更高、可解释性更强的深度伪造检测算法,主要针对DFDC、FaceForensic++及Celeb-DF三个深度伪造视频数据集进行实验并以这三个数据集集中训练出检测模型,首先使用人脸检测算法MTCNN提取人脸图像,进而将EfficientNet网络与Transformer架构相结合作为检测模型,通过采用三维人脸数据增强、注意力机制以及全局局部融合方法对模型进行训练和测试。模型在未使用型集成、知识蒸馏等方法的基础上,达到了与最优检测效果相当的检测水平。 展开更多
关键词 深度伪造检测 注意力机制 数据增强 神经网络
下载PDF
人脸视频深度伪造检测方法综述 被引量:6
17
作者 张璐 芦天亮 杜彦辉 《计算机科学与探索》 CSCD 北大核心 2023年第1期1-26,共26页
深度伪造(deepfake)技术的非法应用会对社会稳定、个人名誉甚至国家安全造成恶劣影响,因此针对人脸视频的深度伪造检测成为计算机视觉领域中的难点与研究热点。目前该领域的研究建立在传统人脸识别与图像分类技术基础上,通过搭建深度学... 深度伪造(deepfake)技术的非法应用会对社会稳定、个人名誉甚至国家安全造成恶劣影响,因此针对人脸视频的深度伪造检测成为计算机视觉领域中的难点与研究热点。目前该领域的研究建立在传统人脸识别与图像分类技术基础上,通过搭建深度学习网络判别真伪,但存在数据集质量不一、多模态特征如何有效结合、模型泛化能力较差等问题。为进一步促进深度伪造检测技术的发展,对当前各类人脸视频深度伪造算法进行了全面总结,并对已有算法进行了归类、分析、比较。首先,主要介绍人脸视频深度伪造检测数据集;其次,对近三年主要的伪造视频检测方法进行总结,以特征选择为切入点,从空间特征、时空融合特征、生物特征的角度对各项检测技术进行分类整理,并对基于水印与区块链等非主流检测方法进行介绍;然后,从特征选择、迁移学习、模型设计与训练思路等方面介绍了各类检测方法所呈现出的主流趋势;最后,对全文进行总结并对未来技术发展进行展望。 展开更多
关键词 深度学习 多媒体取证 深度伪造 视频检测 人脸篡改
下载PDF
预训练驱动的多模态边界感知视觉Transformer 被引量:1
18
作者 石泽男 陈海鹏 +1 位作者 张冬 申铉京 《软件学报》 EI CSCD 北大核心 2023年第5期2051-2067,共17页
卷积神经网络(convolutional neural network,CNN)在图像篡改检测任务中不断取得性能突破,但在面向真实场景下篡改手段未知的情况时,现有方法仍然无法有效地捕获输入图像的长远依赖关系以缓解识别偏差问题,从而影响检测精度.此外,由于... 卷积神经网络(convolutional neural network,CNN)在图像篡改检测任务中不断取得性能突破,但在面向真实场景下篡改手段未知的情况时,现有方法仍然无法有效地捕获输入图像的长远依赖关系以缓解识别偏差问题,从而影响检测精度.此外,由于标注困难,图像篡改检测任务通常缺乏精准的像素级图像标注信息.针对以上问题,提出一种预训练驱动的多模态边界感知视觉Transformer.首先,为捕获在RGB域中不可见的细微伪造痕迹,引入图像的频域模态并将其与RGB空间域结合作为多模态嵌入形式.其次利用ImageNet对主干网络的编码器进行训练以缓解当前训练样本不足的问题.然后,Transformer模块被整合到该编码器的尾部,以达到同时捕获低级空间细节信息和全局上下文的目的,从而提升模型的整体表征能力.最后,为有效地缓解因伪造区域边界模糊导致的定位难问题,构建边界感知模块,其可以通过Scharr卷积层获得的噪声分布以更多地关注噪声信息而不是语义内容,并利用边界残差块锐化边界信息,从而提升模型的边界分割性能.大量实验结果表明,所提方法在识别精度上优于现有的图像篡改检测方法,并对不同的篡改手段具有较好的泛化性和鲁棒性. 展开更多
关键词 模型预训练 多模态 视觉Transformer 边界感知 图像篡改检测
下载PDF
基于多尺度Transformer融合多域信息的伪造人脸检测
19
作者 马欣 吉立新 李邵梅 《计算机科学》 CSCD 北大核心 2023年第10期112-118,共7页
当前,基于Deepfakes等深度伪造技术生成的“换脸”类伪造视频泛滥,给公民个人隐私和国家政治安全带来巨大威胁,为此,研究视频中深度伪造人脸检测技术具有重要意义。针对已有伪造人脸检测方法存在的面部特征提取不充分、泛化能力弱等不足... 当前,基于Deepfakes等深度伪造技术生成的“换脸”类伪造视频泛滥,给公民个人隐私和国家政治安全带来巨大威胁,为此,研究视频中深度伪造人脸检测技术具有重要意义。针对已有伪造人脸检测方法存在的面部特征提取不充分、泛化能力弱等不足,提出一种基于多尺度Transformer对多域信息进行融合的伪造人脸检测方法。基于多域特征融合的思路,同时从视频帧的频域与RGB域进行特征提取,提高模型的泛化性;联合EfficientNet和多尺度Transformer,设计多层级的特征提取网络以提取更精细的伪造特征。在开源数据集上的测试结果表明,相比已有方法,所提方法具有更好的检测效果;同时在跨数据集上的实验结果证明了所提模型具有较好的泛化性能。 展开更多
关键词 伪造人脸检测 多尺度Transformer EfficientNet 频域特征 特征融合
下载PDF
基于深度特征提取和DCT变换的图像复制粘贴篡改检测 被引量:2
20
作者 魏伟一 赵毅凡 陈帼 《计算机工程与科学》 CSCD 北大核心 2023年第1期163-170,共8页
针对图像复制粘贴篡改检测中算法时间复杂度过高和定位区域不完整的问题,提出一种基于深度特征提取和离散余弦变换的图像复制粘贴篡改检测算法。首先,融合图像颜色和纹理信息获得四通道图像,计算自适应特征提取阈值,并通过基于全卷积神... 针对图像复制粘贴篡改检测中算法时间复杂度过高和定位区域不完整的问题,提出一种基于深度特征提取和离散余弦变换的图像复制粘贴篡改检测算法。首先,融合图像颜色和纹理信息获得四通道图像,计算自适应特征提取阈值,并通过基于全卷积神经网络的特征检测器提取图像深度特征;其次,通过离散余弦变换提取块特征进行初步匹配,再利用点特征向量消除误匹配;最后,通过卷积运算精确定位篡改区域。通过在公共数据集上进行验证,充分展示了该算法在检测效率和定位区域完整性方面的优势。 展开更多
关键词 复制粘贴篡改 深度特征 离散余弦变换 卷积运算
下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部