skip to main content
10.1145/3397482.3450726acmconferencesArticle/Chapter ViewAbstractPublication PagesiuiConference Proceedingsconference-collections
Work in Progress

FakeBuster: A DeepFakes Detection Tool for Video Conferencing Scenarios

Authors Info & Claims
Published:14 April 2021Publication History

ABSTRACT

This paper proposes FakeBuster, a novel DeepFake detector for (a) detecting impostors during video conferencing, and (b) manipulated faces on social media. FakeBuster is a standalone deep learning- based solution, which enables a user to detect if another person’s video is manipulated or spoofed during a video conference-based meeting. This tool is independent of video conferencing solutions and has been tested with Zoom and Skype applications. It employs a 3D convolutional neural network for predicting video fakeness. The network is trained on a combination of datasets such as Deeperforensics, DFDC, VoxCeleb, and deepfake videos created using locally captured images (specific to video conferencing scenarios). Diversity in the training data makes FakeBuster robust to multiple environments and facial manipulations, thereby making it generalizable and ecologically valid.

References

  1. 1995. QT- One framework. One codebase. Any platform.https://www.qt.io/Google ScholarGoogle Scholar
  2. 2016. PyQT- Python bindings for The Qt Company’s Qt application framework. https://riverbankcomputing.com/software/pyqt/introGoogle ScholarGoogle Scholar
  3. 2020. Python MSS- An ultra fast cross-platform multiple screenshots module in pure python using ctypes.https://github.com/BoboTiG/python-mssGoogle ScholarGoogle Scholar
  4. 2020. Reality Defender 2020: A FORCE AGAINST DEEPFAKES. https://rd2020.org/index.htmlGoogle ScholarGoogle Scholar
  5. Ali Aliev. 2019. Avatarify- Photorealistic avatars for video-conferencing apps.https://github.com/alievk/avatarifyGoogle ScholarGoogle Scholar
  6. G. Bradski. 2000. The OpenCV Library. Dr. Dobb’s Journal of Software Tools(2000).Google ScholarGoogle Scholar
  7. Tom Bur. 2020. New Steps to Combat Disinformation. https://blogs.microsoft.com/on-the-issues/2020/09/01/disinformation-deepfakes-newsguard-video-authenticator/Google ScholarGoogle Scholar
  8. Komal Chugh, Parul Gupta, Abhinav Dhall, and Ramanathan Subramanian. 2020. Not Made for Each Other- Audio-Visual Dissonance-Based Deepfake Detection and Localization. In Proceedings of the 28th ACM International Conference on Multimedia (Seattle, WA, USA) (MM ’20). Association for Computing Machinery, New York, NY, USA, 439–447. https://doi.org/10.1145/3394171.3413700Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Brian Dolhansky, Russ Howes, Ben Pflaum, Nicole Baram, and Cristian Canton Ferrer. 2019. The Deepfake Detection Challenge (DFDC) Preview Dataset. arxiv:1910.08854 [cs.CV]Google ScholarGoogle Scholar
  10. Parul Gupta, Komal Chugh, Abhinav Dhall, and Ramanathan Subramanian. 2020. The Eyes Know It: FakeET- An Eye-Tracking Database to Understand Deepfake Perception. In Proceedings of the 2020 International Conference on Multimodal Interaction (Virtual Event, Netherlands) (ICMI ’20). Association for Computing Machinery, New York, NY, USA, 519–527. https://doi.org/10.1145/3382507.3418857Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kensho Hara, Hirokatsu Kataoka, and Yutaka Satoh. 2017. Can Spatiotemporal 3D CNNs Retrace the History of 2D CNNs and ImageNet?CoRR abs/1711.09577(2017). arxiv:1711.09577http://arxiv.org/abs/1711.09577Google ScholarGoogle Scholar
  12. Liming Jiang, Ren Li, Wayne Wu, Chen Qian, and Chen Change Loy. 2020. DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection. arxiv:2001.03024 [cs.CV]Google ScholarGoogle Scholar
  13. Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-Based Generator Architecture for Generative Adversarial Networks. arxiv:1812.04948 [cs.NE]Google ScholarGoogle Scholar
  14. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).Google ScholarGoogle Scholar
  15. Arsha Nagrani, Joon Son Chung, and Andrew Zisserman. 2017. VoxCeleb: A Large-Scale Speaker Identification Dataset. Interspeech 2017 (Aug 2017). https://doi.org/10.21437/interspeech.2017-950Google ScholarGoogle ScholarCross RefCross Ref
  16. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., 8024–8035. http://papers.neurips.cc/paper/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdfGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  17. Aliaksandr Siarohin, Stéphane Lathuilière, Sergey Tulyakov, Elisa Ricci, and Nicu Sebe. 2019. First order motion model for image animation. In Advances in Neural Information Processing Systems. 7137–7147.Google ScholarGoogle Scholar

Index Terms

  1. FakeBuster: A DeepFakes Detection Tool for Video Conferencing Scenarios
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IUI '21 Companion: Companion Proceedings of the 26th International Conference on Intelligent User Interfaces
          April 2021
          101 pages
          ISBN:9781450380188
          DOI:10.1145/3397482

          Copyright © 2021 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 April 2021

          Check for updates

          Qualifiers

          • Work in Progress
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate746of2,811submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format