請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88426完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 郭斯彥 | zh_TW |
| dc.contributor.advisor | Sy-Yen Kuo | en |
| dc.contributor.author | 袁肇謙 | zh_TW |
| dc.contributor.author | Zhao-Qian Yuan | en |
| dc.date.accessioned | 2023-08-15T16:15:02Z | - |
| dc.date.available | 2023-11-09 | - |
| dc.date.copyright | 2023-08-15 | - |
| dc.date.issued | 2023 | - |
| dc.date.submitted | 2023-07-28 | - |
| dc.identifier.citation | Deepfakes. https://github.com/deepfakes/faceswap. Accessed: 2023-4-6.
Faceswap. https://github.com/MarekKowalski/FaceSwap/. Accessed: 2023- 4-6. D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen. Mesonet: a compact facial video forgery detection network. In 2018 IEEE international workshop on information forensics and security (WIFS), pages 1–7. IEEE, 2018. N. Ahmed, T. Natarajan, and K. Rao. Discrete cosine transform. IEEE Transactions on Computers, C-23(1):90–93, Jan 1974. Y. Bai, Y. Guo, J. Wei, L. Lu, R. Wang, and Y. Wang. Fake generated painting detection via frequency analysis. In 2020 IEEE international conference on image processing (ICIP), pages 1256–1260. IEEE, 2020. L. Chen, Y. Zhang, Y. Song, L. Liu, and J. Wang. Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 18710–18719, 2022. T. Chen, S. Kornblith, M. Norouzi, and G. Hinton. A simple framework for contrastive learning of visual representations. In International conference on machine learning, pages 1597–1607. PMLR, 2020. S.-J. Cho, S.-W. Ji, J.-P. Hong, S.-W. Jung, and S.-J. Ko. Rethinking coarse-to-fine approach in single image deblurring. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pages 4641–4650, October 2021. F. Chollet. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. J. W. Cooley and J. W. Tukey. An algorithm for the machine calculation of complex fourier series. Mathematics of computation, 19(90):297–301, 1965. I. Daubechies. Orthonormal bases of compactly supported wavelets. Communications on pure and applied mathematics, 41(7):909–996, 1988. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei. Imagenet: A large scale hierarchical image database. In 2009 IEEE Conference on Computer Vision and Pattern Recognition, pages 248–255, June 2009. B. Dolhansky, J. Bitton, B. Pflaum, J. Lu, R. Howes, M. Wang, and C. C. Ferrer. The deepfake detection challenge (dfdc) dataset, 2020. R. Durall, M. Keuper, F.-J. Pfreundt, and J. Keuper. Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686, 2019. J. Frank, T. Eisenhofer, L. Schönherr, A. Fischer, D. Kolossa, and T. Holz. Leveraging frequency analysis for deep fake image recognition. In International conference on machine learning (ICML), pages 3247–3258. PMLR, 2020. I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial networks. Communications of the ACM, 63(11):139–144, 2020. Q. Gu, S. Chen, T. Yao, Y. Chen, S. Ding, and R. Yi. Exploiting fine-grained face forgery clues via progressive enhancement learning. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 36, pages 735–743, 2022. M. Guillaumin, J. Verbeek, and C. Schmid. Is that you? metric learning approaches for face identification. In 2009 IEEE 12th international conference on computer vision, pages 498–505. IEEE, 2009. K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pages 770–778, 2016. L. Jiang, R. Li, W. Wu, C. Qian, and C. C. Loy. DeeperForensics-1.0: A large-scale dataset for real-world face forgery detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2020. J. Johnson, A. Alahi, and L. Fei-Fei. Perceptual losses for real-time style transfer and super-resolution. In Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part II 14, pages 694–711. Springer, 2016. M. K. Johnson and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting. In Proceedings of the 7th workshop on Multimedia and security, pages 1–10, 2005. D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. S. Kolesnikov. Catalyst - accelerated deep learning r&d. https://github.com/ catalyst-team/catalyst, 2018. N. Krawetz and H. F. Solutions. A picture's worth. Hacker Factor Solutions, 6(2):2, 2007. A. Kumar, A. Bhavsar, and R. Verma. Detecting deepfakes with metric learning. In 2020 8th international workshop on biometrics and forensics (IWBF), pages 1–6. IEEE, 2020. J. Li, H. Xie, J. Li, Z. Wang, and Y. Zhang. Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 6458–6467, June 2021. L. Li, J. Bao, H. Yang, D. Chen, and F. Wen. Faceshifter: Towards high fidelity and occlusion aware face swapping. arXiv preprint arXiv:1912.13457, 2019. L. Li, J. Bao, T. Zhang, H. Yang, D. Chen, F. Wen, and B. Guo. Face x-ray for more general face forgery detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR), pages 5001–5010, 2020. Y. Li, X. Yang, P. Sun, H. Qi, and S. Lyu. Celeb-df: A large-scale challenging dataset for deepfake forensics. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 3204–3213, June 2020. H. Liu, X. Li, W. Zhou, Y. Chen, Y. He, H. Xue, W. Zhang, and N. Yu. Spatial phase shallow learning: Rethinking face forgery detection in frequency domain. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 772–781, June 2021. J. Liu, J. Wang, P. Zhang, C. Wang, D. Xie, and S. Pu. Multi-scale wavelet trans former for face forgery detection. In Proceedings of the Asian Conference on Computer Vision (ACCV), pages 1858–1874, 2022. Y. Luo, Y. Zhang, J. Yan, and W. Liu. Generalizing face forgery detection with high frequency features. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR), pages 16317–16326, 2021. I. Masi, A. Killekar, R. M. Mascarenhas, S. P. Gurudatt, and W. AbdAlmageed. Two-branch recurrent network for isolating deepfakes in videos. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part VII 16, pages 667–684. Springer, 2020. Y. Qian, G. Yin, L. Sheng, Z. Chen, and J. Shao. Thinking in frequency: Face forgery detection by mining frequency-aware clues. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XII, pages 86–103. Springer, 2020. A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Nießner. FaceForensics++: Learning to detect manipulated facial images. In International Conference on Computer Vision (ICCV), 2019. R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra. Grad cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE international conference on computer vision, pages 618– 626, 2017. K. Shiohara and T. Yamasaki. Detecting deepfakes with self-blended images. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 18720–18729, 2022. K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. J. Thies, M. Zollhöfer, and M. Nießner. Deferred neural rendering: Image synthesis using neural textures. Acm Transactions on Graphics (TOG), 38(4):1–12, 2019. J. Thies, M. Zollhofer, M. Stamminger, C. Theobalt, and M. Niessner. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016. L. Van der Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(11), 2008. G. Wallace. The jpeg still picture compression standard. IEEE Transactions on Consumer Electronics, 38(1):xviii–xxxiv, Feb 1992. N. Wang, Y. Bai, K. Yu, Y. Jiang, S.-t. Xia, and Y. Wang. Adaptive frequency learning in two-branch face forgery detection. arXiv preprint arXiv:2203.14315, 2022. S.-Y. Wang, O. Wang, R. Zhang, A. Owens, and A. A. Efros. Cnn-generated images are surprisingly easy to spot... for now. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR), pages 8695–8704, 2020. T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h. 264/ avc video coding standard. IEEE Transactions on circuits and systems for video technology, 13(7):560–576, 2003. S. Woo, J. Park, J.-Y. Lee, and I. S. Kweon. Cbam: Convolutional block attention module. In Proceedings of the European Conference on Computer Vision (ECCV), September 2018. H. Wu, Y. Qu, S. Lin, J. Zhou, R. Qiao, Z. Zhang, Y. Xie, and L. Ma. Contrastive learning for compact single image dehazing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 10551– 10560, 2021. D. Yi, Z. Lei, S. Liao, and S. Z. Li. Deep metric learning for person re-identification. In 2014 22nd international conference on pattern recognition, pages 34–39. IEEE, 2014. B. Yu, W. Li, X. Li, J. Lu, and J. Zhou. Frequency-aware spatiotemporal transformers for video inpainting detection. In 2021 IEEE/CVF International Conference on Computer Vision (ICCV), pages 8168–8177, 2021. K. Zhang, Z. Zhang, Z. Li, and Y. Qiao. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE signal processing letters, 23(10):1499–1503, 2016. H. Zhao, W. Zhou, D. Chen, T. Wei, W. Zhang, and N. Yu. Multi-attentional deep fake detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 2185–2194, 2021. B. Zi, M. Chang, J. Chen, X. Ma, and Y.-G. Jiang. Wilddeepfake: A challenging real-world dataset for deepfake detection. In Proceedings of the 28th ACM International Conference on Multimedia, MM ’20, page 2382–2390, New York, NY, USA, 2020. Association for Computing Machinery. | - |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88426 | - |
| dc.description.abstract | 現今基於深度學習的人臉偽造偵測技術大多藉由捕獲由偽造所形成的偽影來辨別影像的真偽。然而這類提取特定特徵的方法僅會在特定資料集表現出優異的性能,卻缺乏泛化的能力,所以在可能會出現新的或未知特徵的現實場景,將使得這類方法不再實用。人臉偽造通常會在頻域留下無法忽略的痕跡。在本研究中,我們提出了一種全新的臉部偽造偵測框架,透過學習真實人臉中的共同特徵,並以輸入圖像和重建圖像之間的距離來決定圖像的真偽。我們的方法首先破壞可疑的頻率,並在被破壞的頻帶中的進行資訊重建,使得重建影像更加接近真實,以改善對未知變造的泛化性。此外,我們提出了一種損失函數,將重建損失、度量學習損失和分類損失等相結合,以提高模型區分真偽的能力。我們在幾個基準資料集上對提出的方法進行實驗,數據顯示與最先進方法相比具有競爭力的結果。 | zh_TW |
| dc.description.abstract | Current learning-based face forgery detection methods typically discriminate between real and manipulated images by capturing artifacts caused by manipulation. However, while these artifact-based methods often perform well within a specific database, they lack the ability to generalize, making them impractical in real-world scenarios where new or unseen artifacts may be present. Fortunately, facial manipulations often leave non-negligible traces in the frequency domain. In this thesis, we propose a novel deepfake detection framework that learns the common features of real faces and uses the distance between an input image and its reconstruction image to discriminate between real and fake images. Our framework initially destructs suspicious frequencies and then reconstructs the information within the affected band to enhance the realism of the reconstruction and improve the generalization performance against unknown manipulations. In addition, we propose a loss function that combines reconstruction loss, metric learning loss, and classification loss to improve the model's ability to separate real from fake images. The proposed method is evaluated on several popular benchmark datasets and demonstrates competitive experimental results compared to state-of-the-art methods. | en |
| dc.description.provenance | Submitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-08-15T16:15:02Z No. of bitstreams: 0 | en |
| dc.description.provenance | Made available in DSpace on 2023-08-15T16:15:02Z (GMT). No. of bitstreams: 0 | en |
| dc.description.tableofcontents | Verification Letter from the Oral Examination Committee i
Acknowledgements ii 摘要 iii Abstract iv Contents vi List of Figures viii List of Tables ix Chapter 1 Introduction 1 Chapter 2 Related Works 5 2.1 Face Forgery Detection . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Frequency-based Detection . . . . . . . . . . . . . . . . . . . . . . 5 2.1.2 Adversarial-based Detection . . . . . . . . . . . . . . . . . . . . . 6 2.2 Metric Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Chapter 3 Proposed Method 8 3.1 Frequency Destructor . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 Reconstructor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Discriminator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.4 Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.5 Loss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Chapter 4 Experiment 17 4.1 Experiment Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.1.1 Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.1.2 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.1.3 Implementation Detail . . . . . . . . . . . . . . . . . . . . . . . . 18 4.2 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.1 Intra-dataset Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.2 Cross-dataset Evaluation . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.3 Robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4.3 Ablation Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.3.1 Effectiveness of Loss Component . . . . . . . . . . . . . . . . . . 22 4.3.2 Effectiveness of Classifier Backbone . . . . . . . . . . . . . . . . . 23 4.3.3 Effectiveness of Global Pooling Layer . . . . . . . . . . . . . . . . 24 4.3.4 Decision Visualization . . . . . . . . . . . . . . . . . . . . . . . . 26 Chapter 5 Conclusion 27 References 28 | - |
| dc.language.iso | en | - |
| dc.subject | 損失函數 | zh_TW |
| dc.subject | 人臉偽造偵測 | zh_TW |
| dc.subject | 離散餘弦轉換 | zh_TW |
| dc.subject | 影像重建 | zh_TW |
| dc.subject | 深度學習 | zh_TW |
| dc.subject | Discrete Cosine Transform | en |
| dc.subject | Face Forgery Detection | en |
| dc.subject | Loss Function | en |
| dc.subject | Deep Learning | en |
| dc.subject | Image Reconstruction | en |
| dc.title | 基於重建類真實頻率的人臉偽造偵測技術 | zh_TW |
| dc.title | Face Forgery Detection via Reconstructing Authentic-like Frequency | en |
| dc.type | Thesis | - |
| dc.date.schoolyear | 111-2 | - |
| dc.description.degree | 碩士 | - |
| dc.contributor.oralexamcommittee | 雷欽隆;顏嗣鈞;游家牧;黃士嘉 | zh_TW |
| dc.contributor.oralexamcommittee | Chin-Laung Lei;Hsu-Chun Yen;Chia-Mu Yu;Shih-Chia Huang | en |
| dc.subject.keyword | 人臉偽造偵測,離散餘弦轉換,影像重建,深度學習,損失函數, | zh_TW |
| dc.subject.keyword | Face Forgery Detection,Discrete Cosine Transform,Image Reconstruction,Deep Learning,Loss Function, | en |
| dc.relation.page | 35 | - |
| dc.identifier.doi | 10.6342/NTU202301740 | - |
| dc.rights.note | 未授權 | - |
| dc.date.accepted | 2023-08-01 | - |
| dc.contributor.author-college | 電機資訊學院 | - |
| dc.contributor.author-dept | 電機工程學系 | - |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-111-2.pdf 未授權公開取用 | 3.1 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
