![数据与模型安全 课件 第10周:深度伪造与检测_第1页](http://file4.renrendoc.com/view12/M02/0D/14/wKhkGWcJ9CqAdA1bAACvzd8MRUc043.jpg)
![数据与模型安全 课件 第10周:深度伪造与检测_第2页](http://file4.renrendoc.com/view12/M02/0D/14/wKhkGWcJ9CqAdA1bAACvzd8MRUc0432.jpg)
![数据与模型安全 课件 第10周:深度伪造与检测_第3页](http://file4.renrendoc.com/view12/M02/0D/14/wKhkGWcJ9CqAdA1bAACvzd8MRUc0433.jpg)
![数据与模型安全 课件 第10周:深度伪造与检测_第4页](http://file4.renrendoc.com/view12/M02/0D/14/wKhkGWcJ9CqAdA1bAACvzd8MRUc0434.jpg)
![数据与模型安全 课件 第10周:深度伪造与检测_第5页](http://file4.renrendoc.com/view12/M02/0D/14/wKhkGWcJ9CqAdA1bAACvzd8MRUc0435.jpg)
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Deepfakes
and
Detection姜育刚,马兴军,吴祖煊Recap:
week9MembershipInferenceAttackDifferentialPrivacyThisWeekGeneralTampering(一般数据篡改)Deepfake(深度伪造,图像)DeepfakeVideos(深度伪造,视频)DetectionDALL·E3OpenAIText2Image,
ImageEditing…Imagen
2GoogleText2Image,
Text2VedioStableDiffusion
3StabilityAIText2Image,
ImageEditing…SignificantProgressinComputerVisionThis
person
does
not
exist,/
AnAI-generatedportraitsoldfor$432,000attheChristie‘s(2018)AIartworkwonfirstprizeinartcompetition.(2022)Theresolutionandfidelityofgeneratedfaceimagesareconstantlyimproving.20192021SignificantProgressinComputerVisionGenerateanimageusingthefirstparagraphof"OneHundredYearsofSolitude"
(2021)DaLL·E2(2022)Generateanimagebasedontext:“Ihave
alwayswantedtobeacoolpandaridingaskateboardinSantaMonica.”Imagic(2022)Editimageswithtext.SignificantProgressinComputerVisionDataTamperingandForgeryDefinition:Tamperimagesandvideoswithvarietyoftechniques,suchasdeepfakes.Accordingtothecontentandtypeofthetampereddata:
generaltampering&faceforgery.
AfakeimageaboutBushJr.electionThisWeek
GeneralTamperingDeepfakeDeepfakeVideosDetectionGeneralTamperingDefinition:tampertheoriginalimagebyadjustingthespatialpositionofobjects,replacingtheoriginalcontentwithforgedcontent(stylemodification,texturetransformation,imagerestoration…)
TaxonomyContext-basedtamperforegroundobjectstamperimagebackgroundConditionedText-guidedimagetamperingGeneralTamperingModeldifferentelementsintheimage:theshapeofobjects,theinteractionbetweenobjectsandtheirrelativepositions,…
?CoreProblem:howtodecoupledifferentelementsinanimage?(Foreground&Background,Texture&Structure,…)ForegroundTamperingConstructobject-levelsemanticsegmentationmapsHong,S
et
al.
Learninghierarchicalsemanticimagemanipulationthroughstructured
representations.
NeurIPS,
2018.BackgroundTamperingZou,Z
et
al.Castleinthesky:dynamicskyreplacementandharmonizationinvideos.
IEEETransactionsonImageProcessing.
2022.thebackgroundcanbeviewedasalargerobjectText-guidedTampering|CLIPRadford,A.
et
al.Learningtransferablevisualmodelsfromnaturallanguagesupervision.
ICML,
2021.Text-guidedTampering|CLIP+StyleGANPatashnik,O.
et
al.Styleclip:text-drivenmanipulationofstyleganimagery.
ICCV,
2021.Text-guidedTampering|StyleGANLatent
codeMapping
functionResidual
codetarget
codePatashnik,O.
et
al.Styleclip:text-drivenmanipulationofstyleganimagery.
ICCV,
2021.Text-guidedTampering|DiffusionHo,J.
et
al.Denoisingdiffusionprobabilisticmodels.NeurIPS,
2020.ThedirectedgraphicalmodelofDDPMGraphicalmodelsfordiffusion(left)andnon-Markovian(right)inferencemodelsSong,J.
et
al.Denoisingdiffusionimplicitmodels.ICLR,
2022.Text-guidedTampering|CLIP+DiffusionRombachR.etal.High-resolutionimagesynthesiswithlatentdiffusionmodels,
CVPR,2022.StableDiffusionThisWeekGeneralTampering
DeepfakeDeepfakeVideosDetectionDeepfakeDefinition:
believablemediageneratedbyadeepneuralnetworkForm:
generation&manipulationofhumanimageryDeeplearning+fakeGANs(GenerativeAdversarialNetworks)Derivesfromthe“zero-sumgame”ingametheory.LearnthedistributionofdatathroughaGeneratorandaDiscriminatorFaceForgeryAlice’sbodywithBob’sfaceAliceBobDatacollectionModeltrainingDeepfakefaceforgeryFaceForgeryDatacollectionModeltrainingDeepfakefaceforgeryFaceForgeryDatacollectionModeltrainingDeepfakefaceforgeryFaceForgeryReenactment(人脸重演)Replacement(人脸互换)Editing(人脸编辑)Synthesis(人脸合成)MirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys(CSUR),2021,54(1):1-41.
FaceForgerySTEPS:DetectsandcropsthefaceExtractsintermediaterepresentationsGeneratesanewfacebasedonsomedrivingsignalBlendsthegeneratedfacebackintothetargetframeMirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys(CSUR),2021,54(1):1-41.FaceReenactmentSTEPSingeneral:facetracking(面部追踪)facematching(面部匹配)facetransfer(面部迁移)PareidoliaFaceReenactmentSong,L.
et
al.Everything‘stalkin’:pareidoliafacereenactment.CVPR,
2021.pareidoliafacereenactmentPareidoliaFaceReenactmentChallengesThetargetfacesarenothumanfaces1Shapevariance2Texturevariancee.g.squaremouthe.g.woodtextureSong,L.
et
al.Everything‘stalkin’:pareidoliafacereenactment.CVPR,
2021.PURAParametricUnsupervisedReenactmentAlgorithmParametricShapeModeling(PSM,参数化形状建模)ExpansionaryMotionTransfer(EMT,扩展运动迁移)UnsupervisedTextureSynthesizer
(UTS,无监督纹理合成器)Song,L.
et
al.Everything‘stalkin’:pareidoliafacereenactment.CVPR,
2021.PURAParametricUnsupervisedReenactmentAlgorithmSong,L.
et
al.Everything‘stalkin’:pareidoliafacereenactment.CVPR,
2021.FaceReplacement|SimswapHighFidelityFaceSwappingChen,R.
et
al.Simswap:anefficientframeworkforhighfidelityfaceswapping.ACMMM,
2021.❌lacktheabilitytogeneralizetoarbitraryidentity❌failtopreserveattributeslikefacialexpressionandgazedirectionIDInjectionModule(IIM)(身份注入模块)WeakFeatureMatchingLoss(弱特征匹配损失)FaceReplacement|SimswapHighFidelityFaceSwappingChen,R.,et
al.
Simswap:anefficientframeworkforhighfidelityfaceswapping.ACMMM,
2020FaceReplacement|SimswapIdentityLossWeakFeatureMatchingLossChen,R.,et
al.
Simswap:anefficientframeworkforhighfidelityfaceswapping.ACMMM,
2020ThisWeekGeneralTamperingDeepfake
DeepfakeVideosDetectionDeepfakeVideosMoredimensions:TiminginformationTherelativepositionofdifferentsubjectsandobjectsAudiofakesDeepfakeVideosChallengesHowtogeneratereasonablegesturesHowtogenerateafakevideoinhighresolutionHowtogeneratehigh-qualitylongvideosReasonableGesturesSiarohin,A.
et
al.Firstordermotionmodelforimageanimation.
NeurIPS,
2-19.First-order-motionModelReasonableGesturesSiarohin,A.
et
al.
Firstordermotionmodelforimageanimation.
NeurIPS,
2019.MotionEstimationModuleUseasetoflearnedkeypointsandtheiraffinetransformationstopredictdensemotionReasonableGesturesGenerationModuleWarpthesourceimageaccordingtoInpainttheimagepartsthatareoccludedinthesourceimage.Siarohin,A.
et
al.
Firstordermotionmodelforimageanimation.
NeurIPS,
2019.HighResolutionTian,Y.,
et
al.
Agoodimagegeneratoriswhatyouneedforhigh-resolutionvideosynthesis.ICLR,
2022.MoCoGAN-HDHigh-qualityLongVideosYu,S.
et
al.Generatingvideoswithdynamics-awareimplicitgenerativeadversarialnetworks.arXivpreprintarXiv:2202.10571.DIGANThisWeekGeneralTamperingDeepfakeDeepfakeVideos
DetectionTamperingDetectionTaxonomy:GeneralTamperingDetection——whetheranordinaryobjectinanimagehasbeentamperedwithDeepfakeDetection——whetherthepartofthefaceintheimagehasbeentamperedwithFeatures&SemanticsGeneralTamperingDetectionExistinggeneraltamperingdetectionmethodsmainlyfocusonsplicing,copy-moveandremovalGeneralTamperingDetectionEarlydetectionmethodsImageTamperingThecorrelationbetweenpixelsintroducedduringcameraimaging(LCA,…)Thefrequency-domainorstatisticalfeaturesoftheimageandthenoiseitcontains(PRNU)GeneralTamperingDetectionCopy-moveDetectionMethodsBlock-basedregionduplicationDivideanimageintomanyequal-sizeblocks,andifduplicatedregionsexistintheimage,thereshouldbeduplicatedblocksaswell.Comparetheblocks.(Pixelvalues,Statisticalmeasures,Frequencycoefficients,Momentinvariants,…)Keypoint-basedregionduplicationConcentrateonafewkeypointswithinanimagesothecomputationcostcanbesignificantlyreduced.(SIFT,SURF)SplicingDetectionMethodsEdgeanomalyRegionanomaly:JPEGcompressionRegionanomaly:lightinginconsistencyRegionanomaly:inconsistencesofcameratracesGeneralTamperingDetectionGeneralTamperingDetectionRemovalDetectionMethodsBlurringartifactsbydiffusion-basedtamperingBlockduplicationbyexemplar-basedtamperingGeneralTamperingDetectionLaterdetectionmethods(DL)Medianfilteringforensics+CNN(Chenetal.,2015)RGB-N(Zhouetal.,2018)SPAN,spatialpyramidattentionnetwork(Huetal.,2020)Mantra-Net(Wuetal.,2019)PSCC-Net,progressivespatio-channelcorrelationnetwork(Liuetal.,2022)CountermeasuresDetectionPreventionMirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys,2021,54(1):1-41.Detection|Artifact-specificDeepfakesoftengenerateartifactswhichmaybesubtletohumans,butcanbeeasilydetectedusingmachinelearningandforensicanalysis.Blending
(spatial)Environment(spatial)
Forensics(spatial)
Behavior(temporal)Physiology(temporal)Synchronization
(temporal)Coherence(temporal)MirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys,2021,54(1):1-41.BlendingTrainedaCNNtopredictanimage’sblendingboundaryandalabel(realorfake)LingzhiLi,et
al.Facex-rayformoregeneralfaceforgerydetection.CVPR,
2020.BlendingSplicesimilarfacesfoundthroughfaciallandmarksimilaritytogenerateadatasetoffaceswaps.OverviewofgeneratingatrainingsampleLingzhiLi,et
al.Facex-rayformoregeneralfaceforgerydetection.CVPR,
2020.ForensicsDetectdeepfakesbyanalyzingsubtlefeaturesandpatternsleftbythemodel.GANsleaveuniquefingerprintsItispossibletoclassifythegeneratorgiventhecontent,eveninthepresenceofcompressionandnoiseNingYu
et
al.AttributingfakeimagestoGANs:LearningandanalyzingGANfingerprints.ICCV,
2019.Detection|UndirectedApproachesTraindeepneuralnetworksasgenericclassifiers,andletthenetworkdecidewhichfeaturestoanalyze.ClassificationAnomalyDetectionClassificationTharinduF.,
et
al.
ExploitingHumanSocialCognitionfortheDetectionofFakeandFraudulentFacesviaMemoryNetworks.
arXiv:1911.07844.HierarchicalMemoryNetwork(HMN)architectureAnomalyDetectionanomalydetectionmodelsaretrainedonthenormaldataandthendetectoutliersduringdeployment.RunWang
et
al.Fakespotter:
Asimplebaselineforspottingai-synthesizedfakefaces.arXiv:1909.06122.Monitorneuronbehaviors(coverage)tospotAI-synthesizedfakefaces.Obtainastrongersignalfromthanjustusingtherawpixels.Isabletoovercomenoiseandotherdistortions.Detection|SummaryMirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys,2021.Detection|SummaryMirskyY,LeeW.Thecreationanddetectionofdeepfakes:Asurvey.ACMComputingSurveys,2021.Prevention&MitigationDataprovenance(数据溯源)Dataprovenanceofmultimediashouldbetrackedthroughdistributedledgersandblockchainnetworks.(Fraga-Lamasetal.,2019)ThecontentshouldberankedbyparticipantsandAI.(Chenetal.,2019.)Thecon
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年01月中国疾控中心信息中心公开招聘1人笔试历年典型考题(历年真题考点)解题思路附带答案详解
- 2024年12月江苏苏州市昆山市市场监督管理局公开招聘编外人员4人笔试历年典型考题(历年真题考点)解题思路附带答案详解
- 在区2025年三级干部大会上的讲话稿
- 急性脑梗规范治疗死课件
- 《时尚北京》杂志2023年第1期
- 母儿血型不合、胎儿窘迫、生长受限课件
- (高清版)DB37∕T 3023.1-2017 工作场所空气有毒物质测定 第1部分:甲酸 离子色谱法
- 《对比论证类型》课件
- 二零二五年度膨润土行业绿色生产技术引进合同4篇
- 《结肠癌护理查房》课件
- 劳动合同范本1997
- 《网络安全防护项目教程》课件第3篇 管理篇
- 风山川湖泊年中工作总结年中总结述职报告工作计划
- 广东省2024年普通高中学业水平合格性考试语文仿真模拟卷01(原卷版)
- 2024CSCO食管癌诊疗指南解读
- QB/T 6019-2023 制浆造纸专业设备安装工程施工质量验收规范 (正式版)
- 农民数字素养赋能乡村振兴的理论机制与路径研究
- 2024年山东省安全生产普法知识竞赛考试题库(含答案)
- 2024年山东省高中自主招生数学模拟试卷试题(含答案)
- 2024年广西南宁市初中毕业班适应性测试数学试卷
- 建筑入侵报警系统-入侵报警系统概述
评论
0/150
提交评论