Media Forensics and DeepFakes: An Overview

With the rapid progress in recent years, techniques that generate and manipulate multimedia content can now provide a very advanced level of realism. The boundary between real and synthetic media has become very thin. On the one hand, this opens the door to a series of exciting applications in different fields such as creative arts, advertising, film production, and video games. On the other hand, it poses enormous security threats. Software packages freely available on the web allow any individual, without special skills, to create very realistic fake images and videos. These can be used to manipulate public opinion during elections, commit fraud, discredit or blackmail people. Therefore, there is an urgent need for automated tools capable of detecting false multimedia content and avoiding the spread of dangerous false information. This review paper aims to present an analysis of the methods for visual media integrity verification, that is, the detection of manipulated images and videos. Special emphasis will be placed on the emerging phenomenon of deepfakes, fake media created through deep learning tools, and on modern data-driven forensic methods to fight them. The analysis will help highlight the limits of current forensic tools, the most relevant issues, the upcoming challenges, and suggest future directions for research.

[1]  Amit K. Roy-Chowdhury,et al.  Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries , 2019, IEEE Transactions on Image Processing.

[2]  Siwei Lyu,et al.  Exposing DeepFake Videos By Detecting Face Warping Artifacts , 2018, CVPR Workshops.

[3]  Benjamin Cohen,et al.  Where and Who? Automatic Semantic-Aware Person Composition , 2017, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[4]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[5]  Shilin Wang,et al.  Detection of Double Compression With the Same Coding Parameters Based on Quality Degradation Mechanism Analysis , 2018, IEEE Transactions on Information Forensics and Security.

[6]  Dorothea Kolossa,et al.  Leveraging Frequency Analysis for Deep Fake Image Recognition , 2020, ICML.

[7]  Gianluca Roscigno,et al.  A Possible Pitfall in the Experimental Analysis of Tampering Detection Algorithms , 2014, 2014 17th International Conference on Network-Based Information Systems.

[8]  Hany Farid,et al.  Photo forensics from JPEG dimples , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[9]  Matthew C. Stamm,et al.  The Video Authentication and Camera Identification Database: A New Database for Video Forensics , 2019, IEEE Access.

[10]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[11]  Premkumar Natarajan,et al.  Recurrent Convolutional Strategies for Face Manipulation Detection in Videos , 2019, CVPR Workshops.

[12]  Alex ChiChung Kot,et al.  Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Timo Aila,et al.  A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[14]  Gregory Dudek,et al.  Detecting GAN generated errors , 2019, ArXiv.

[15]  Anthony Hoogs,et al.  A Coarse-to-fine Deep Convolutional Neural Network Framework for Frame Duplication Detection and Localization in Forged Videos , 2018, CVPR Workshops.

[16]  Baoyuan Wu,et al.  Hiding Faces in Plain Sight: Disrupting AI Face Synthesis with Adversarial Perturbations , 2019, ArXiv.

[17]  Yiannis Kompatsiaris,et al.  Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.

[18]  Luisa Verdoliva,et al.  Do GANs Leave Artificial Fingerprints? , 2018, 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).

[19]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[20]  Matthew C. Stamm,et al.  Exposing Fake Images With Forensic Similarity Graphs , 2020, IEEE Journal of Selected Topics in Signal Processing.

[21]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[22]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[23]  Andrew Owens,et al.  Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.

[24]  H. Farid Photo Forensics , 2016 .

[25]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[26]  Jan Kautz,et al.  Video-to-Video Synthesis , 2018, NeurIPS.

[27]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[28]  Mo Chen,et al.  Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Transactions on Information Forensics and Security.

[29]  Oscar C. Au,et al.  Inter-channel demosaicking traces for digital image forensics , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[30]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[31]  Hugo Proença,et al.  Real or Fake? Spoofing State-Of-The-Art Face Synthesis Detection Systems , 2019, ArXiv.

[32]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[33]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[34]  Hongxia Wang,et al.  Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[35]  Jaakko Lehtinen,et al.  Analyzing and Improving the Image Quality of StyleGAN , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[36]  Julian Fierrez,et al.  GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation Detection , 2019, IEEE Journal of Selected Topics in Signal Processing.

[37]  Davide Cozzolino,et al.  Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[38]  Davide Cozzolino,et al.  Camera-based Image Forgery Localization using Convolutional Neural Networks , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[39]  David Vazquez-Padin,et al.  Detection of video double encoding with GOP size estimation , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[40]  Davide Cozzolino,et al.  Multiple Classifier Systems for Image Forgery Detection , 2013, ICIAP.

[41]  Arnav Bhavsar,et al.  Detecting Deepfakes with Metric Learning , 2020, 2020 8th International Workshop on Biometrics and Forensics (IWBF).

[42]  Matthew C. Stamm,et al.  Generative Adversarial Attacks Against Deep-Learning-Based Camera Model Identification , 2019, IEEE Transactions on Information Forensics and Security.

[43]  Victor Lempitsky,et al.  Few-Shot Adversarial Learning of Realistic Neural Talking Head Models , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[44]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[45]  Davide Cozzolino,et al.  Residual-based forensic comparison of video sequences , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[46]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[47]  Tal Hassner,et al.  FSGAN: Subject Agnostic Face Swapping and Reenactment , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[48]  Khaled Salah,et al.  Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.

[49]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[50]  Margret Keuper,et al.  Watch Your Up-Convolution: CNN Based Generative Deep Neural Networks Are Failing to Reproduce Spectral Distributions , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[51]  Yao Zhao,et al.  A gradient-based pixel-domain attack against SVM detection of global image manipulations , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[52]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[53]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[54]  Luisa Verdoliva,et al.  On the vulnerability of deep learning to adversarial attacks for camera model identification , 2018, Signal Process. Image Commun..

[55]  Premkumar Natarajan,et al.  ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[56]  Paolo Bestagini,et al.  Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier , 2018, Media Watermarking, Security, and Forensics.

[57]  Junichi Yamagishi,et al.  MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[58]  Yuxing Wu,et al.  Exposing video inter-frame forgery based on velocity field consistency , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[59]  Paolo Bestagini,et al.  Local tampering detection in video sequences , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[60]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[61]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[62]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[63]  Alberto Del Bimbo,et al.  Deepfake Video Detection through Optical Flow Based CNN , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).

[64]  Sonja Grgic,et al.  CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.

[65]  Fabio Roli,et al.  Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2018, CCS.

[66]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[67]  Larry S. Davis,et al.  Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[68]  Chen Change Loy,et al.  DeeperForensics-1.0: A Large-Scale Dataset for Real-World Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[69]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[70]  Mauro Barni,et al.  Copy Move Source-Target Disambiguation Through Multi-Branch CNNs , 2021, IEEE Transactions on Information Forensics and Security.

[71]  Chia-Wen Lin,et al.  Video forgery detection using correlation of noise residue , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[72]  Matthew C. Stamm,et al.  Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[73]  Andreas Rössler,et al.  FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[74]  Davide Cozzolino,et al.  Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.

[75]  Marina Del Rey,et al.  Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection , 2017, ACM Multimedia.

[76]  Matthew C. Stamm,et al.  Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration , 2018, IEEE Transactions on Information Forensics and Security.

[77]  Paolo Bestagini,et al.  A Counter-Forensic Method for CNN-Based Camera Model Identification , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[78]  Tiberio Uricchio,et al.  Localization of JPEG Double Compression Through Multi-domain Convolutional Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[79]  Edward J. Delp,et al.  Deepfake Video Detection Using Recurrent Neural Networks , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[80]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[81]  Bin Li,et al.  Identification of deep network generated images using disparities in color components , 2020, Signal Process..

[82]  Kilian Q. Weinberger,et al.  Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[83]  Heung-Kyu Lee,et al.  Double JPEG Detection in Mixed JPEG Quality Factors Using Deep Convolutional Neural Network , 2018, ECCV.

[84]  C.-C. Jay Kuo,et al.  Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN) , 2017, J. Vis. Commun. Image Represent..

[85]  Edward Y. Chang,et al.  RelGAN: Multi-Domain Image-to-Image Translation via Relative Attributes , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[86]  Aleksander Madry,et al.  Adversarial Robustness as a Prior for Learned Representations , 2019 .

[87]  Pavel Korshunov,et al.  Tampered Speaker Inconsistency Detection with Phonetically Aware Audio-visual Features , 2019, ICML 2019.

[88]  Bernt Schiele,et al.  Adversarial Scene Editing: Automatic Object Removal from Weak Supervision , 2018, NeurIPS.

[89]  Mo Chen,et al.  Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.

[90]  Daniel Cohen-Or,et al.  Bringing portraits to life , 2017, ACM Trans. Graph..

[91]  Hao Li,et al.  Protecting World Leaders Against Deep Fakes , 2019, CVPR Workshops.

[92]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[93]  Mauro Barni,et al.  A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.

[94]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[95]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[96]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[97]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[98]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[99]  Chip-Hong Chang,et al.  A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification , 2020, IEEE Transactions on Information Forensics and Security.

[100]  Justus Thies,et al.  Deferred neural rendering , 2019, ACM Trans. Graph..

[101]  Davide Cozzolino,et al.  Extracting camera-based fingerprints for video forensics , 2019, CVPR Workshops.

[102]  Junichi Yamagishi,et al.  Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[103]  Jing Dong,et al.  On the generalization of GAN image forensics , 2019, CCBR.

[104]  Bernt Schiele,et al.  Generative Adversarial Text to Image Synthesis , 2016, ICML.

[105]  Yiannis Kompatsiaris,et al.  A corpus of debunked and verified user-generated videos , 2019, Online Inf. Rev..

[106]  Priyanka Singh,et al.  Robust Homomorphic Image Hashing , 2019, CVPR Workshops.

[107]  Paolo Bestagini,et al.  Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..

[108]  Babak Mahdian,et al.  Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..

[109]  Jean-Luc Dugelay,et al.  Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones , 2017, Media Watermarking, Security, and Forensics.

[110]  Jeff Donahue,et al.  Large Scale GAN Training for High Fidelity Natural Image Synthesis , 2018, ICLR.

[111]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[112]  Heung-Kyu Lee,et al.  Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks , 2018, IEEE Signal Processing Letters.

[113]  Alessandro Piva,et al.  Image and Video Processing History Recovery , 2015 .

[114]  Larry S. Davis,et al.  Generate, Segment, and Refine: Towards Generic Manipulation Segmentation , 2018, AAAI.

[115]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[116]  Alex ChiChung Kot,et al.  Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.

[117]  Shaziya .P.S. Khan,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .

[118]  Xu Zhang,et al.  Detecting and Simulating Artifacts in GAN Fake Images , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).

[119]  Anderson Rocha,et al.  Video Phylogeny: Recovering near-duplicate video relationships , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[120]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[121]  Dan Boneh,et al.  How Relevant Is the Turing Test in the Age of Sophisbots? , 2019, IEEE Security & Privacy.

[122]  Jiwu Huang,et al.  Evaluation of random field models in multi-modal unsupervised tampering localization , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[123]  Francesco G. B. De Natale,et al.  3D-Model-Based Video Analysis for Computer Generated Faces Identification , 2015, IEEE Transactions on Information Forensics and Security.

[124]  Sumit Kumar Jha,et al.  Predicting Heart Rate Variations of Deepfake Videos using Neural ODE , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).

[125]  Cristian Canton-Ferrer,et al.  The Deepfake Detection Challenge (DFDC) Preview Dataset , 2019, ArXiv.

[126]  Jiwu Huang,et al.  Localization of Deep Inpainting Using High-Pass Fully Convolutional Network , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[127]  Sébastien Marcel,et al.  DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.

[128]  Jessica J. Fridrich,et al.  Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.

[129]  Li Chen,et al.  SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression , 2018, KDD.

[130]  Mauro Barni,et al.  Identification of cut & paste tampering by means of double-JPEG detection and image segmentation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[131]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[132]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[133]  Apostol Natsev,et al.  YouTube-8M: A Large-Scale Video Classification Benchmark , 2016, ArXiv.

[134]  Christian Riess,et al.  Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).

[135]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[136]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[137]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[138]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[139]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[140]  Paolo Bestagini,et al.  We Need No Pixels: Video Manipulation Detection Using Stream Descriptors , 2019, ArXiv.

[141]  Hany Farid,et al.  Evading Deepfake-Image Detectors with White- and Black-Box Attacks , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[142]  Xing Zhang,et al.  Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.

[143]  Saniat Javid Sohrawardi,et al.  Poster: Towards Robust Open-World Detection of Deepfakes , 2019, CCS.

[144]  Ilke Demir,et al.  FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals , 2019, IEEE transactions on pattern analysis and machine intelligence.

[145]  Qing Wang,et al.  Double JPEG compression forensics based on a convolutional neural network , 2016, EURASIP J. Inf. Secur..

[146]  Adam Finkelstein,et al.  Text-based editing of talking-head video , 2019, ACM Trans. Graph..

[147]  Pawel Korus,et al.  Digital image integrity - a survey of protection and verification techniques , 2017, Digit. Signal Process..

[148]  Joon Son Chung,et al.  You said that? , 2017, BMVC.

[149]  Jinseok Park,et al.  Two-Stream Network for Detecting Double Compression of H.264 Videos , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[150]  Babak Mahdian,et al.  IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images , 2020, 2020 IEEE Winter Applications of Computer Vision Workshops (WACVW).

[151]  Davide Cozzolino,et al.  Autoencoder with recurrent neural networks for video forgery detection , 2017, Media Watermarking, Security, and Forensics.

[152]  Vasudeva Varma,et al.  MVAE: Multimodal Variational Autoencoder for Fake News Detection , 2019, WWW.

[153]  Hagit Hel-Or,et al.  Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.

[154]  Jia Li,et al.  Zooming into Face Forensics: A Pixel-level Analysis , 2019, ArXiv.

[155]  Xia Hu,et al.  Towards Generalizable Deepfake Detection with Locality-aware AutoEncoder , 2019, CIKM.

[156]  Christian Riess,et al.  Image Forensics from Chroma Subsampling of High-Quality JPEG Images , 2019, IH&MMSec.

[157]  Xin Yang,et al.  Exposing GAN-synthesized Faces Using Landmark Locations , 2019, IH&MMSec.

[158]  Andreas Rössler,et al.  SpoC: Spoofing Camera Fingerprints , 2019, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[159]  A. Piva,et al.  overview paper An overview on video forensics , 2012 .

[160]  Andrew Owens,et al.  CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[161]  Larry S. Davis,et al.  Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[162]  Ira Kemelmacher-Shlizerman,et al.  Synthesizing Obama , 2017, ACM Trans. Graph..

[163]  Antoine Doucet,et al.  Find it! Fraud Detection Contest Report , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[164]  B. S. Manjunath,et al.  Detecting GAN generated Fake Images using Co-occurrence Matrices , 2019, Media Watermarking, Security, and Forensics.

[165]  Marco Fontani,et al.  A Video Forensic Framework for the Unsupervised Analysis of MP4-Like File Container , 2019, IEEE Transactions on Information Forensics and Security.

[166]  Giulia Boato,et al.  Physiologically-based detection of computer generated faces in video , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[167]  Davide Cozzolino,et al.  Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.

[168]  Nasir D. Memon,et al.  Content Authentication for Neural Imaging Pipelines: End-To-End Optimization of Photo Provenance in Complex Distribution Channels , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[169]  Cristiano Saltori,et al.  Incremental learning for the detection and classification of GAN-generated images , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).

[170]  Siwei Lyu,et al.  In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[171]  Xianfeng Zhao,et al.  Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution , 2019, IEEE Transactions on Information Forensics and Security.

[172]  Alexei A. Efros,et al.  Everybody Dance Now , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[173]  A. De Rosa,et al.  Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[174]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[175]  Xiaojuan Qi,et al.  Global Texture Enhancement for Fake Face Detection in the Wild , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[176]  Jaakko Lehtinen,et al.  Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.

[177]  Marco Fontani,et al.  VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.

[178]  Davide Cozzolino,et al.  PRNU-Based Forgery Localization in a Blind Scenario , 2017, ICIAP.

[179]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[180]  Mario Fritz,et al.  Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[181]  Yiannis Kompatsiaris,et al.  Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[182]  Eli Shechtman,et al.  PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, ACM Trans. Graph..

[183]  Jiwu Huang,et al.  Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[184]  Yao Zhao,et al.  A New Dataset for Source Identification of High Dynamic Range Images , 2018, Sensors.

[185]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[186]  Davide Cozzolino,et al.  A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[187]  Farinaz Koushanfar,et al.  Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples , 2020, ArXiv.

[188]  Xia Hu,et al.  Towards Generalizable Forgery Detection with Locality-aware AutoEncoder , 2019, ArXiv.

[189]  François Chollet,et al.  Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[190]  Kiran B. Raja,et al.  Fake Face Detection Methods: Can They Be Generalized? , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).

[191]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[192]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[193]  Junichi Yamagishi,et al.  Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[194]  Luisa Verdoliva,et al.  Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[195]  Luisa Verdoliva,et al.  Counter-forensics in machine learning based forgery detection , 2015, Electronic Imaging.

[196]  Sridha Sridharan,et al.  Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks , 2019, ArXiv.

[197]  Junichi Yamagishi,et al.  Distinguishing computer graphics from natural images using convolution neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[198]  Tal Hassner,et al.  On Face Segmentation, Face Swapping, and Face Perception , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).

[199]  Philip S. Yu,et al.  An Introduction to Image Synthesis with Generative Adversarial Nets , 2018, ArXiv.

[200]  Davide Cozzolino,et al.  Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[201]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[202]  Scott McCloskey,et al.  Source Generator Attribution via Inversion , 2019, CVPR Workshops.

[203]  Heiko Schuldt,et al.  The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.

[204]  Scott McCloskey,et al.  Detecting GAN-Generated Imagery Using Saturation Cues , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[205]  Shih-Fu Chang,et al.  Internet image archaeology: automatically tracing the manipulation history of photographs on the web , 2008, ACM Multimedia.

[206]  Yang Wei,et al.  RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[207]  Jonathan G. Fiscus,et al.  MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).

[208]  Fernando Pérez-González,et al.  Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats , 2017, IEEE Transactions on Information Forensics and Security.

[209]  Justus Thies,et al.  Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.

[210]  Yiannis Kompatsiaris,et al.  Content-aware detection of JPEG grid inconsistencies for intuitive image forensics , 2018, J. Vis. Commun. Image Represent..

[211]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[212]  Chi-Man Pun,et al.  An End-to-End Dense-InceptionNet for Image Copy-Move Forgery Detection , 2020, IEEE Transactions on Information Forensics and Security.

[213]  Jan Kautz,et al.  Few-shot Video-to-Video Synthesis , 2019, NeurIPS.

[214]  Tian-Tsong Ng,et al.  Camera response function signature for digital forensics - Part II: Signature extraction , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[215]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[216]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[217]  Patrick J. Flynn,et al.  Image Provenance Analysis at Scale , 2018, IEEE Transactions on Image Processing.

[218]  Hao Li,et al.  High-Resolution Image Inpainting Using Multi-scale Neural Patch Synthesis , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[219]  Thomas Gloe,et al.  Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.

[220]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[221]  Mauro Barni,et al.  On the Transferability of Adversarial Examples against CNN-based Image Forensics , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[222]  Shih-Fu Chang,et al.  Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.

[223]  Nasir D. Memon,et al.  Image manipulation detection , 2006, J. Electronic Imaging.

[224]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[225]  A. Piva An Overview on Image Forensics , 2013 .

[226]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[227]  Andreas Rössler,et al.  ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.

[228]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[229]  Davide Cozzolino,et al.  A PatchMatch-Based Dense-Field Algorithm for Video Copy–Move Detection and Localization , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[230]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[231]  Davide Cozzolino,et al.  Attacking the triangle test in sensor-based camera identification , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[232]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[233]  Feng Liu,et al.  On the Detection of Digital Face Manipulation , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[234]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[235]  Bin Li,et al.  Detection of Deep Network Generated Images Using Disparities in Color Components , 2018, ArXiv.

[236]  Baining Guo,et al.  Face X-Ray for More General Face Forgery Detection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[237]  Andrew Owens,et al.  Detecting Photoshopped Faces by Scripting Photoshop , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[238]  Wael Abd-Almageed,et al.  Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[239]  Patrick Pérez,et al.  Deep video portraits , 2018, ACM Trans. Graph..

[240]  Xin Yang,et al.  Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[241]  Tsuhan Chen,et al.  Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[242]  Luisa Verdoliva,et al.  A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection , 2019, IEEE Access.

[243]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[244]  Francesco G. B. De Natale,et al.  Discrimination between computer generated and natural human faces based on asymmetry information , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[245]  Takahiro Okabe,et al.  Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.

[246]  Alexei A. Efros,et al.  Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[247]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[248]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[249]  Jianhua Li,et al.  Image splicing detection based on noncausal Markov model , 2013, 2013 IEEE International Conference on Image Processing.

[250]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[251]  David Vazquez-Padin,et al.  Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint , 2020, IEEE Transactions on Information Forensics and Security.

[252]  Honggang Qi,et al.  Celeb-DF: A New Dataset for DeepFake Forensics , 2019, ArXiv.

[253]  Andreas Rössler,et al.  FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces , 2018, ArXiv.

[254]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[255]  Luisa Verdoliva,et al.  A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.

[256]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[257]  Xiaochun Cao,et al.  Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.

[258]  Xingming Sun,et al.  Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[259]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[260]  Fumin Shen,et al.  Make a Face: Towards Arbitrary High Fidelity Face Manipulation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[261]  Gaël MAHFOUDI,et al.  DEFACTO: Image and Face Manipulation Dataset , 2019, 2019 27th European Signal Processing Conference (EUSIPCO).

[262]  Davide Cozzolino,et al.  Detection of GAN-Generated Fake Images over Social Networks , 2018, 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).

[263]  Yiannis Kompatsiaris,et al.  Detection and visualization of misleading content on Twitter , 2017, International Journal of Multimedia Information Retrieval.

[264]  Matthew C. Stamm,et al.  Adversarial Multimedia Forensics: Overview and Challenges Ahead , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[265]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[266]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[267]  Jung-Woo Ha,et al.  StarGAN: Unified Generative Adversarial Networks for Multi-domain Image-to-Image Translation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[268]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[269]  Mauro Barni,et al.  A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[270]  Taesung Park,et al.  Semantic Image Synthesis With Spatially-Adaptive Normalization , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[271]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.