A survey on deepfake video detection

P Yu, Z Xia, J Fei, Y Lu - Iet Biometrics, 2021 - Wiley Online Library
Recently, deepfake videos, generated by deep learning algorithms, have attracted
widespread attention. Deepfake technology can be used to perform face manipulation with …

A comprehensive review of deep-learning-based methods for image forensics

I Castillo Camacho, K Wang - Journal of imaging, 2021 - mdpi.com
Seeing is not believing anymore. Different techniques have brought to our fingertips the
ability to modify an image. As the difficulty of using such techniques decreases, lowering the …

Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection

L Jiang, R Li, W Wu, C Qian… - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
We present our on-going effort of constructing a large-scale benchmark for face forgery
detection. The first version of this benchmark, DeeperForensics-1.0, represents the largest …

Noiseprint: A CNN-based camera model fingerprint

D Cozzolino, L Verdoliva - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Forensic analyses of digital images rely heavily on the traces of in-camera and out-camera
processes left on the acquired images. Such traces represent a sort of camera fingerprint. If …

Faceforensics: A large-scale video dataset for forgery detection in human faces

A Rössler, D Cozzolino, L Verdoliva, C Riess… - arXiv preprint arXiv …, 2018 - arxiv.org
With recent advances in computer vision and graphics, it is now possible to generate videos
with extremely realistic synthetic faces, even in real time. Countless applications are …

Faceforensics++: Learning to detect manipulated facial images

A Rossler, D Cozzolino, L Verdoliva… - Proceedings of the …, 2019 - openaccess.thecvf.com
The rapid progress in synthetic image generation and manipulation has now come to a point
where it raises significant concerns for the implications towards society. At best, this leads to …

{CT-GAN}: Malicious tampering of 3d medical imagery using deep learning

Y Mirsky, T Mahler, I Shelef, Y Elovici - 28th USENIX Security …, 2019 - usenix.org
In 2018, clinics and hospitals were hit with numerous attacks leading to significant data
breaches and interruptions in medical services. An attacker with access to medical records …

Learning jpeg compression artifacts for image manipulation detection and localization

MJ Kwon, SH Nam, IJ Yu, HK Lee, C Kim - International Journal of …, 2022 - Springer
Detecting and localizing image manipulation are necessary to counter malicious use of
image editing techniques. Accordingly, it is essential to distinguish between authentic and …

Image forgery detection: a survey of recent deep-learning approaches

M Zanardelli, F Guerrini, R Leonardi… - Multimedia Tools and …, 2023 - Springer
In the last years, due to the availability and easy of use of image editing tools, a large
amount of fake and altered images have been produced and spread through the media and …

Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering

B Xiao, Y Wei, X Bi, W Li, J Ma - Information Sciences, 2020 - Elsevier
This paper proposes a splicing forgery detection method with two parts: a coarse-to-refined
convolutional neural network (C2RNet) and diluted adaptive clustering. The proposed …