期刊文献+

深度伪造及其取证技术综述

A survey of Deepfake and related digital forensics
原文传递
导出
摘要 深度学习作为机器学习的一个具有前景的重要分支,在计算机视觉方面取得了重大突破。深度伪造(Deepfake)通常指的是使用深度学习(deep learning)进行涉及人脸和人声的多媒体伪造技术,如果被恶意滥用会给社会带来灾难。深度伪造不仅限于面部的替换,还有修改面部特征、修改表情、唇形同步、姿势变换、完整脸生成、篡改音频到视频以及文本到视频等方式。人类面部在社会、政治、经济等方面的敏感性,使得深度伪造技术威胁着社会和个人的安全。对深度伪造产物进行检测也成为数字取证领域的一个重要研究课题。为了提供对Deepfake检测研究工作的最新概述,本文描述了各种针对解决Deepfake相关问题的处理方法。本文主要参考了谷歌学术检索2018—2022共5年的深度伪造论文,分为不同类别进行分析比较,并且详细介绍了深度伪造数据集的特点以及伪造方法,简述了深度伪造技术及其基本原理,介绍了检测器在深度伪造技术数据集上的性能效果,分别从输入维度、浅层特征和深层特针对深度伪造检测技术进行分类,并对未来发展前景进行展望。 Deep learning,a promising branch of machine learning,has made significant breakthroughs in computervision.However,Deepfake,which refers to the set of techniques for forging human-related multimedia data using deeplearning,can bring disasters to society if used maliciously.It is not only limited to facial replacement,but also othermanipulations,such as fabricating facial features,manipulating expressions,synchronizing lips,modifying head gestures,entire face synthesis,and tampering related audios to videos and related texts to videos.Moreover,it can be used to gener⁃ate faked pornographic videos or even faked speeches to subvert state power.Thus,deep forgery technology can greatlythreaten society and individuals,thereyby detecting Deepfake has also become an important research topic in digital foren⁃sics.We conducted a systematic and critical survey to provide an overview of the latest research on Deepfake detection by exploring the recent developments in Deepfake and related forensic techniques.This survey mainly referred to papers onDeepfake in Google Scholar during 2018—2022.This survey divided the Deepfake detection techniques into two categoriesfor analysis and comparison:input dimensions and forensic features.First,a comprehensive and systematic introduction ofdigital forensics is presented from the following aspects:1)the development and security of deep forgery detection technol⁃ogy,2)Deepfake technology architecture,and 3)the prevailing datasets and evaluation metrics.Then,this survey pres⁃ents Deepfake techniques in several categories.Finally,future challenges and development prospects are discussed.Interms of image and video effects,Deepfake techniques are usually divided into four categories:face replacement,lip syn⁃chronization,head puppets,and attribute modification.The most commonly used Deepfake algorithms are based on selfencoders,generative adversarial networks,and diffusion models.An typical autoencoder consists of two convolutional neu⁃ral networks acting as an encoder and a decod
作者 丁峰 匡仁盛 周越 孙珑 朱小刚 朱国普 Ding Feng;Kuang Rensheng;Zhou Yue;Sun Long;Zhu Xiaogang;Zhu Guopu(School of Software,Nanchang University,Nanchang 330047,China;School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150006,China;School of Public Policy and Administration,Nanchang University,Nanchang 330047,China;Jiangxi Institute of Interest of Things Industry Technology,Yingtan 335003,China)
出处 《中国图象图形学报》 CSCD 北大核心 2024年第2期295-317,共23页 Journal of Image and Graphics
基金 国家自然科学基金项目(62262041,62172402) 数据安全治理关键技术研究与应用项目(20224BBC41001) 江西省自然科学基金项目(20232BAB202011)。
关键词 深度造假 机器学习 人工智能 深度学习 数字取证 数字反取证 Deepfake machine learning artificial intelligence deep learning digital forensics digital anti-forensics
  • 相关文献

参考文献7

二级参考文献45

  • 1姜楠,王健,杨义先.新的唯秘密载体信息隐藏分析方法[J].北京邮电大学学报,2006,29(2):1-4. 被引量:7
  • 2United States Department of Agriculture.NRCS photo gallery[EB/OL].(2002-05-24)[2006-12].http://photogallery.nrcs.usda.gov/. 被引量:1
  • 3Hsu C W,Chang C C,Lin C J.A practical guide to support vector classification[EB/OL].(2006-10-20)[2006-12-12].http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf. 被引量:1
  • 4Farid H.Detecting hidden messages using higher-order statistical models[C]//Proceedings of IEEE International Conference on Image Processing.New York,USA,2002,2:905-908. 被引量:1
  • 5Xuan G R,Shi Y Q,Gao J J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[C]//Proceedings of 7th International Information Hiding Workshop,Lecture Notes in Computer Science 3727.Barcelona,Spain,2005:262-277. 被引量:1
  • 6Lie W,Lin G.A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia,2005,7(6):1007-1020. 被引量:1
  • 7Luo X Y,Yang C F,Wang D S,et al.LTSB steganalysis based on quartic equation[J].LNCS Transactions on Data Hiding and Multimedia Security,2007(Ⅱ):68-90. 被引量:1
  • 8Fridrich J,Soukal D,Goljan M.Maximum likelihood estimation of length of secret message embedded using+-K steganography in spatial domain[C]//Proceedings of Security and Watermarking of Multimedia Contents VII,SPIE 5681.San Jose,USA,2005:595-606. 被引量:1
  • 9Brown A.S-Tools steganography[EB/OL].(2003-09-30)[20012].http://www.jjtc.com/Security/stegtools.htm. 被引量:1
  • 10Westfeld A.Steganography software F5[EB/OL].(2003-03)[2006-12].http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html. 被引量:1

共引文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部