FaceForensics++: Learning to Detect Manipulated Facial Images
暂无分享,去创建一个
Andreas Rössler | Davide Cozzolino | Luisa Verdoliva | Christian Riess | Justus Thies | Matthias Nießner | M. Nießner | C. Riess | Justus Thies | A. Rössler | L. Verdoliva | Davide Cozzolino | D. Cozzolino | Andreas Rössler
[1] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[2] Anderson Rocha,et al. Illuminant-Based Transformed Spaces for Image Forensics , 2016, IEEE Transactions on Information Forensics and Security.
[3] Ran He,et al. Beyond Face Rotation: Global and Local Perception GAN for Photorealistic and Identity Preserving Frontal View Synthesis , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[4] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[5] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[6] Jean-Luc Dugelay,et al. Face aging with conditional generative adversarial networks , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[7] Kiran B. Raja,et al. Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[8] B. S. Manjunath,et al. Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[9] Nasir Memon,et al. Digital Image Forensics: There is More to a Picture than Meets the Eye , 2012 .
[10] Junichi Yamagishi,et al. Distinguishing computer graphics from natural images using convolution neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[11] Justus Thies,et al. FaceVR , 2018, ACM Trans. Graph..
[12] Giulia Boato,et al. Physiologically-based detection of computer generated faces in video , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[13] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Zhenan Sun,et al. Recent Progress of Face Image Synthesis , 2017, 2017 4th IAPR Asian Conference on Pattern Recognition (ACPR).
[15] Yu Qiao,et al. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.
[16] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..
[17] Larry S. Davis,et al. Two-Stream Neural Networks for Tampered Face Detection , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[18] Ira Kemelmacher-Shlizerman,et al. Synthesizing Obama , 2017, ACM Trans. Graph..
[19] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[20] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[21] Matthias Nießner,et al. ScanNet: Richly-Annotated 3D Reconstructions of Indoor Scenes , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Robert Pless,et al. Deep Feature Interpolation for Image Content Changes , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Paolo Bestagini,et al. Local tampering detection in video sequences , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[25] Patrick Pérez,et al. VDub: Modifying Face Video of Actors for Plausible Visual Alignment to a Dubbed Audio Track , 2015, Comput. Graph. Forum.
[26] François Chollet,et al. Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[27] Jiwu Huang,et al. Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.
[28] Kiran B. Raja,et al. Fake Face Detection Methods: Can They Be Generalized? , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).
[29] Mauro Barni,et al. A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[30] Xingming Sun,et al. Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[31] H. Farid. Photo Forensics , 2016 .
[32] Francesco G. B. De Natale,et al. Identify computer generated characters by analysing facial expressions variation , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[33] Patrick Pérez,et al. State of the Art on Monocular 3D Face Reconstruction, Tracking, and Applications , 2018, Comput. Graph. Forum.
[34] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[35] Davide Cozzolino,et al. Residual-based forensic comparison of video sequences , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[36] Andreas Rössler,et al. FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces , 2018, ArXiv.
[37] Guillaume Lample,et al. Fader Networks: Manipulating Images by Sliding Attributes , 2017, NIPS.
[38] Daniel Rueckert,et al. Real-Time Single Image and Video Super-Resolution Using an Efficient Sub-Pixel Convolutional Neural Network , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[40] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[41] Anthony Hoogs,et al. A C3D-Based Convolutional Neural Network for Frame Dropping Detection in a Single Video Shot , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[42] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[43] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[44] Daniel Cohen-Or,et al. Bringing portraits to life , 2017, ACM Trans. Graph..
[45] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[46] Weihong Wang,et al. Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.
[47] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[48] Justus Thies,et al. Headon , 2018, ACM Trans. Graph..
[49] Patrick Pérez,et al. Deep video portraits , 2018, ACM Trans. Graph..
[50] Justus Thies,et al. Deferred neural rendering , 2019, ACM Trans. Graph..
[51] Chi-Keung Tang,et al. Conditional CycleGAN for Attribute Guided Face Image Generation , 2017, ArXiv.
[52] Edward J. Delp,et al. Deepfake Video Detection Using Recurrent Neural Networks , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[53] Justus Thies,et al. Real-time expression transfer for facial reenactment , 2015, ACM Trans. Graph..
[54] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[55] Yiannis Kompatsiaris,et al. Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[56] Christoph Bregler,et al. Video Rewrite: Driving Visual Speech with Audio , 1997, SIGGRAPH.
[57] Junichi Yamagishi,et al. MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[58] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[59] Apostol Natsev,et al. YouTube-8M: A Large-Scale Video Classification Benchmark , 2016, ArXiv.
[60] Patrick Pérez,et al. Automatic Face Reenactment , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[61] C. Frith. Role of facial expressions in social interactions , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.
[62] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[63] Andreas Rössler,et al. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.
[64] Davide Cozzolino,et al. A PatchMatch-Based Dense-Field Algorithm for Video Copy–Move Detection and Localization , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[65] Wojciech Matusik,et al. Video face replacement , 2011, ACM Trans. Graph..
[66] Jonathan G. Fiscus,et al. MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[67] Justus Thies,et al. Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.