ABSTRACT
This paper proposes FakeBuster, a novel DeepFake detector for (a) detecting impostors during video conferencing, and (b) manipulated faces on social media. FakeBuster is a standalone deep learning- based solution, which enables a user to detect if another person’s video is manipulated or spoofed during a video conference-based meeting. This tool is independent of video conferencing solutions and has been tested with Zoom and Skype applications. It employs a 3D convolutional neural network for predicting video fakeness. The network is trained on a combination of datasets such as Deeperforensics, DFDC, VoxCeleb, and deepfake videos created using locally captured images (specific to video conferencing scenarios). Diversity in the training data makes FakeBuster robust to multiple environments and facial manipulations, thereby making it generalizable and ecologically valid.
- 1995. QT- One framework. One codebase. Any platform.https://www.qt.io/Google Scholar
- 2016. PyQT- Python bindings for The Qt Company’s Qt application framework. https://riverbankcomputing.com/software/pyqt/introGoogle Scholar
- 2020. Python MSS- An ultra fast cross-platform multiple screenshots module in pure python using ctypes.https://github.com/BoboTiG/python-mssGoogle Scholar
- 2020. Reality Defender 2020: A FORCE AGAINST DEEPFAKES. https://rd2020.org/index.htmlGoogle Scholar
- Ali Aliev. 2019. Avatarify- Photorealistic avatars for video-conferencing apps.https://github.com/alievk/avatarifyGoogle Scholar
- G. Bradski. 2000. The OpenCV Library. Dr. Dobb’s Journal of Software Tools(2000).Google Scholar
- Tom Bur. 2020. New Steps to Combat Disinformation. https://blogs.microsoft.com/on-the-issues/2020/09/01/disinformation-deepfakes-newsguard-video-authenticator/Google Scholar
- Komal Chugh, Parul Gupta, Abhinav Dhall, and Ramanathan Subramanian. 2020. Not Made for Each Other- Audio-Visual Dissonance-Based Deepfake Detection and Localization. In Proceedings of the 28th ACM International Conference on Multimedia (Seattle, WA, USA) (MM ’20). Association for Computing Machinery, New York, NY, USA, 439–447. https://doi.org/10.1145/3394171.3413700Google ScholarDigital Library
- Brian Dolhansky, Russ Howes, Ben Pflaum, Nicole Baram, and Cristian Canton Ferrer. 2019. The Deepfake Detection Challenge (DFDC) Preview Dataset. arxiv:1910.08854 [cs.CV]Google Scholar
- Parul Gupta, Komal Chugh, Abhinav Dhall, and Ramanathan Subramanian. 2020. The Eyes Know It: FakeET- An Eye-Tracking Database to Understand Deepfake Perception. In Proceedings of the 2020 International Conference on Multimodal Interaction (Virtual Event, Netherlands) (ICMI ’20). Association for Computing Machinery, New York, NY, USA, 519–527. https://doi.org/10.1145/3382507.3418857Google ScholarDigital Library
- Kensho Hara, Hirokatsu Kataoka, and Yutaka Satoh. 2017. Can Spatiotemporal 3D CNNs Retrace the History of 2D CNNs and ImageNet?CoRR abs/1711.09577(2017). arxiv:1711.09577http://arxiv.org/abs/1711.09577Google Scholar
- Liming Jiang, Ren Li, Wayne Wu, Chen Qian, and Chen Change Loy. 2020. DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection. arxiv:2001.03024 [cs.CV]Google Scholar
- Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-Based Generator Architecture for Generative Adversarial Networks. arxiv:1812.04948 [cs.NE]Google Scholar
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980(2014).Google Scholar
- Arsha Nagrani, Joon Son Chung, and Andrew Zisserman. 2017. VoxCeleb: A Large-Scale Speaker Identification Dataset. Interspeech 2017 (Aug 2017). https://doi.org/10.21437/interspeech.2017-950Google ScholarCross Ref
- Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., 8024–8035. http://papers.neurips.cc/paper/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdfGoogle ScholarDigital Library
- Aliaksandr Siarohin, Stéphane Lathuilière, Sergey Tulyakov, Elisa Ricci, and Nicu Sebe. 2019. First order motion model for image animation. In Advances in Neural Information Processing Systems. 7137–7147.Google Scholar
Index Terms
- FakeBuster: A DeepFakes Detection Tool for Video Conferencing Scenarios
Recommendations
A Method for Deepfake Detection Using Convolutional Neural Networks
Abstract—This paper proposes a method of countering spoofing attacks by improving the resilience of face-based biometric authentication systems to digital face manipulation attacks on the biometric input module. The proposed method of digital face ...
Biometric person authentication with liveness detection based on audio-visual fusion
In this paper, we propose two new approaches for extracting mouth features for authenticating the person identity with liveness checks. The novel correlated audio-lip features and tensor lip-motion features allow liveness checks to be included in the ...
Detecting liveness of fingerprint biometrics
Biometrics refer to automated recognition of individuals based on their biological and behavioral characteristics. Biometric systems are widely used for security. But biometric systems are vulnerable to a certain type of attack. The type 1 attack or ...
Comments