Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3427228.3427285acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

NoiseScope: Detecting Deepfake Images in a Blind Setting

Published: 08 December 2020 Publication History

Abstract

Recent advances in Generative Adversarial Networks (GANs) have significantly improved the quality of synthetic images or deepfakes. Photorealistic images generated by GANs start to challenge the boundary of human perception of reality, and brings new threats to many critical domains, e.g., journalism, and online media. Detecting whether an image is generated by GAN or a real camera has become an important yet under-investigated area. In this work, we propose a blind detection approach called NoiseScope for discovering GAN images among other real images. A blind approach requires no a priori access to GAN images for training, and demonstrably generalizes better than supervised detection schemes. Our key insight is that, similar to images from cameras, GAN images also carry unique patterns in the noise space. We extract such patterns in an unsupervised manner to identify GAN images. We evaluate NoiseScope on 11 diverse datasets containing GAN images, and achieve up to 99.68% F1 score in detecting GAN images. We test the limitations of NoiseScope against a variety of countermeasures, observing that NoiseScope holds robust or is easily adaptable.

References

[1]
Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: a Compact Facial Video Forgery Detection Network. In Proc. of WIFS.
[2]
Michael Albright and Scott McCloskey. 2019. Source Generator Attribution via Inversion. In Proc. of CVPR Workshop on Media Forensics.
[3]
Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein Generative Adversarial Networks. In Proc. of ICML.
[4]
Sudipta Banerjee, Vahid Mirjalili, and Arun Ross. 2019. Spoofing PRNU Patterns of Iris Sensors While Preserving Iris Recognition. In Proc. of ISBA.
[5]
Christian F Baumgartner, Lisa M Koch, Kerem Can Tezcan, Jia Xi Ang, and Ender Konukoglu. 2018. Visual Feature Attribution Using Wasserstein GANs. In Proc. of CVPR.
[6]
Greg J Bloy. 2008. Blind Camera Fingerprinting and Image Clustering. In Proc. of TPAMI (2008).
[7]
G. Bradski. 2000. The OpenCV Library. Dr. Dobb’s Journal of Software Tools(2000).
[8]
Markus M Breunig, Hans-Peter Kriegel, Raymond T Ng, and Jörg Sander. 2000. LOF: Identifying Density-based Local Outliers. In ACM Sigmod Record.
[9]
Andrew Brock, Jeff Donahue, and Karen Simonyan. 2019. Large Scale GAN Training For High Fidelity Natural Image Synthesis. In Proc. of ICLR.
[10]
Antoni Buades, Bartomeu Coll, and J-M Morel. 2005. A Non-local Algorithm For Image Denoising. In Proc. of CVPR.
[11]
Mo Chen, Jessica Fridrich, and Miroslav Goljan. 2007. Digital Imaging Sensor Identification. In Proc. of Security, Steganography, and Watermarking of Multimedia Contents.
[12]
Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining Image Origin and Integrity Using Sensor Noise. IEEE Transactions on Information Forensics and Security (2008).
[13]
Giovanni Chierchia, Sara Parrilli, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2010. On the Influence of Denoising in PRNU Based Forgery Detection. In Proc. of MiFor Workshop.
[14]
NVIDIA CORPORATION.2019. StyleGAN-Bed Fake Image Source. https://drive.google.com/drive/folders/1Vxz9fksw4kgjiHrvHkX4Hze4dyThFW6t.
[15]
NVIDIA CORPORATION.2019. StyleGAN-Face1 Fake Image Source. https://drive.google.com/drive/folders/14lm8VRN1pr4g_KVe6_LvyDX1PObst6d4.
[16]
Jack Corrigan. 2019. Darpa Is Taking on the Deepfake Problem. https://www.nextgov.com/emerging-tech/2019/08/darpa-taking-deepfake-problem/158980/.
[17]
Andrea Cortiana, Valentina Conotter, Giulia Boato, and Francesco GB De Natale. 2011. Performance Comparison of Denoising Filters for Source Camera Identification. In Proc. of MWSF.
[18]
Davide Cozzolino and Luisa Verdoliva. 2019. Noiseprint: a CNN-based Camera Model Fingerprint. IEEE Transactions on Information Forensics and Security (2019).
[19]
Antonia Creswell and Anil Anthony Bharath. 2018. Inverting the Generator of A Generative Adversarial Network. IEEE Transactions on Neural Networks and Learning Systems (2018).
[20]
Kostadin Dabov, Alessandro Foi, Vladimir Katkovnik, and Karen Egiazarian. 2007. Image Denoising by Sparse 3-D Transform-domain Collaborative Filtering. IEEE Transactions on Image Processing(2007).
[21]
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. ImageNet: A Large-scale Hierarchical Image Database. In Proc. of CVPR.
[22]
Chris Donahue, Julian McAuley, and Miller Puckette. 2019. Adversarial Audio Synthesis. In Proc. of ICLR.
[23]
Vincent Dumoulin and Francesco Visin. 2016. A Guide to Convolution Arithmetic for Deep Learning. arXiv preprint arXiv:1603.07285(2016).
[24]
Donie O’Sullivan et al.2019. Inside the Pentagon’s Race Against Deepfake Videos. https://www.cnn.com/interactive/2019/01/business/pentagons-race-against-deepfakes/.
[25]
Facebook. 2019. Creating A Data Set and A Challenge for Deepfakes. https://ai.facebook.com/blog/deepfake-detection-challenge/.
[26]
Maayan Frid-Adar, Eyal Klang, Michal Amitai, Jacob Goldberger, and Hayit Greenspan. 2018. Synthetic Data Augmentation Using GAN for Improved Liver Lesion Classification. In Proc. of ISBI.
[27]
E. S. Gedraite and M. Hadad. 2011. Investigation on the Effect of a Gaussian Blur In Image Filtering and Segmentation. In Proc. of ELMAR.
[28]
Inc Generated Media. 2019. StyleGAN-Face2 Fake Image Source. https://drive.google.com/drive/folders/1wSy4TVjSvtXeRQ6Zr8W98YbSuZXrZrgY.
[29]
Generated Media, Inc. 2019. Unique, worry-free model photos. https://generated.photos/.
[30]
Miroslav Goljan. 2008. Digital Camera Identification From Images – Estimating False Acceptance Probability. In Proc. of International Workshop on Digital Watermarking.
[31]
Miroslav Goljan, Mo Chen, Pedro Comesaña, and Jessica Fridrich. 2016. Effect of Compression on Sensor-fingerprint Based Camera Identification. Electronic Imaging (2016).
[32]
Miroslav Goljan, Jessica Fridrich, and Tomáš Filler. 2009. Large Scale Test of Sensor Fingerprint Camera Identification. In Proc. of Media Forensics and Security.
[33]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Proc. of NeurIPS.
[34]
Jiaxian Guo, Sidi Lu, Han Cai, Weinan Zhang, Yong Yu, and Jun Wang. 2018. Long Text Generation via Adversarial Training with Leaked Information. In Proc. of AAAI.
[35]
R. M. Haralick. 1979. Statistical and Structural Approaches to Texture. IEEE (1979).
[36]
TensorFlow Hub. 2019. BigGAN Deep Pretrained Model. https://tfhub.dev/deepmind/biggan-deep-256/1.
[37]
Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A Efros. 2017. Image-to-image Translation with Conditional Adversarial Networks. In Proc. of CVPR.
[38]
Xiang Jiang, Shikui Wei, Ruizhen Zhao, Yao Zhao, and Xindong Wu. 2016. Camera Fingerprint: A New Perspective for Identifying User’s Identity. arXiv preprint arXiv:1610.07728(2016).
[39]
Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing Of GANs for Improved Quality, Stability, and Variation. In Proc. of ICLR.
[40]
Tero Karras, Samuli Laine, and Timo Aila. 2019. A Style-based Generator Architecture for Generative Adversarial Networks. In Proc. of CVPR.
[41]
Diederik P Kingma and Max Welling. 2014. Auto-encoding Variational Bayes. In Proc. of ICLR.
[42]
Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, and Afzel Noore. 2017. Synthetic Iris Presentation Attack Using iDCGAN. In Proc. of IJCB.
[43]
Alex Krizhevsky, Geoffrey Hinton, 2009. Learning Multiple Layers of Features from Tiny Images. Technical Report. Citeseer.
[44]
Chang-Tsun Li, Chih-Yuan Chang, and Yue Li. 2009. On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise. In Proc. of ISDF.
[45]
Haodong Li, Bin Li, Shunquan Tan, and Jiwu Huang. 2018. Detection of Deep Network Generated Images Using Disparities in Color Components. arXiv preprint arXiv:1808.07276(2018).
[46]
Xiaodan Liang, Lisa Lee, Wei Dai, and Eric P Xing. 2017. Dual Motion GAN For Futureflow Embedded Video Prediction. In Proc. of ICCV.
[47]
Ming-Yu Liu and Oncel Tuzel. 2016. Coupled Generative Adversarial Networks. In Proc. of NeurIPS.
[48]
Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep Learning Face Attributes in the Wild. In Proc of ICCV.
[49]
Jan Lukáš, Jessica Fridrich, and Miroslav Goljan. 2006. Digital Camera Identification From Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security (2006).
[50]
Tim Mak. 2018. Can You Believe Your Own Ears? With New ‘Fake News’ Tech, Not Necessarily. https://www.npr.org/2018/04/04/599126774/can-you-believe-your-own-ears-with-new-fake -news-tech-not-necessarily.
[51]
Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharyam, Chandan Reddy, and Bimal Viswanath. 2020. Jekyll: Attacking Medical Image Diagnostics Using Neural Translation. In Proc. of Euro S&P.
[52]
Francesco Marra, Diego Gragnaniello, Davide Cozzolino, and Luisa Verdoliva. 2018. Detection Of GAN-generated Fake Images Over Social Networks. In Proc. of MIPR.
[53]
Francesco Marra, Diego Gragnaniello, Luisa Verdoliva, and Giovanni Poggi. 2019. Do GANs Leave Artificial Fingerprints?. In Proc. of MIPR.
[54]
M Kivanc Mihcak, Igor Kozintsev, and Kannan Ramchandran. 1999. Spatially Adaptive Statistical Modeling Of Wavelet Image Coefficients And Its Application To Denoising. In Proc. of ICASSP.
[55]
Huaxiao Mo, Bolin Chen, and Weiqi Luo. 2018. Fake Faces Identification Via Convolutional Neural Network. In Proc. of IH&MMSEC.
[56]
Benjamin Moseley, Kefu Lu, Silvio Lattanzi, and Thomas Lavastida. 2019. A Framework for Parallelizing Hierarchical Clustering Methods. In Proc. of ECML PKDD.
[57]
Lakshmanan Nataraj, Tajuddin Manhar Mohammed, BS Manjunath, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H Bappy, and Amit K Roy-Chowdhury. 2019. Detecting GAN Generated Fake Images Using Co-occurrence Matrices. arXiv preprint arXiv:1903.06836(2019).
[58]
Kamyar Nazeri, Eric Ng, and Mehran Ebrahimi. 2018. Image Colorization Using Generative Adversarial Networks. In Proc. of International Conference on Articulated Motion and Deformable Objects.
[59]
A Miranda Neto, A Correa Victorino, Isabelle Fantoni, Douglas Eduardo Zampieri, Janito Vaqueiro Ferreira, and Danilo Alves Lima. 2013. Image Processing Using Pearson’s Correlation Coefficient: Applications on Autonomous Robotics. In Proc. of ICARSC.
[60]
BBC News. 2019. Deepfake Videos Could ‘Spark’ Violent Social Unrest. https://www.bbc.com/news/technology-48621452.
[61]
Augustus Odena, Vincent Dumoulin, and Chris Olah. 2016. Deconvolution and Checkerboard Artifacts. http://distill.pub/2016/deconv-checkerboard.
[62]
Clark F. Olson. 1995. Parallel Algorithms for Hierarchical Clustering. Parallel Comput. (1995).
[63]
Jon Porter. 2019. 100,000 Free AI-generated Headshots Put Stock Photo Companies on Notice. https://www.theverge.com/2019/9/20/20875362/100000-fake-ai-photos-stock-photography- royalty-free.
[64]
Corinne Reichert Queenie Wong. 2019. Facebook Removes Bogus Accounts That Used AI to Create Fake Profile Pictures. https://www.cnet.com/news/facebook-removed-fake-accounts-that-used-ai-to-create-fake-profile-pictures/.
[65]
Alec Radford, Luke Metz, and Soumith Chintala. 2016. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks. In Proc. of ICLR.
[66]
S. Rajasekaran. 2005. Efficient Parallel Hierarchical Clustering Algorithms. IEEE Transactions on Parallel and Distributed Systems (2005).
[67]
NVIDIA Research. 2019. Fake Image Source of PGGAN-Face and PGGAN-Tower. https://drive.google.com/drive/folders/1j6uZ_a6zci0HyKZdpDq9kSa8VihtEPCp.
[68]
Kurt Rosenfeld and Husrev Taha Sencar. 2009. A Study of the Robustness of PRNU-based Camera Identification. In Proc. of Media Forensics and Security.
[69]
Andreas Rossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nießner. 2019. Faceforensics++: Learning to Detect Manipulated Facial Images. In Proc. of ICCV.
[70]
Stamatis Samaras, Vasilis Mygdalis, and Ioannis Pitas. 2016. Robustness in Blind Camera Identification. In Proc. of ICPR.
[71]
SmugMug, Inc.[n.d.]. Flickr Website. https://www.flickr.com/.
[72]
Shahroz Tariq, Sangyup Lee, Hoyoung Kim, Youjin Shin, and Simon S Woo. 2018. Detecting Both Machine and Human Created Fake Face Images in the Wild. In Proc. of MPS.
[73]
Dr. Matt Turek. [n.d.]. Media Forensics (MediFor). https://www.darpa.mil/program/media-forensics.
[74]
https://faceswap.dev//. [n.d.]. Deepfakes FaceSwap. https://github.com/deepfakes/faceswap.
[75]
Carl Vondrick, Hamed Pirsiavash, and Antonio Torralba. 2016. Generating Videos with Scene Dynamics. In Proc. of NeurIPS.
[76]
Sheng-Yu Wang, Oliver Wang, Andrew Owens, Richard Zhang, and Alexei A Efros. 2019. Detecting Photoshopped Faces by Scripting Photoshop. In Proc. of ICCV.
[77]
Sheng-Yu Wang, Oliver Wang, Richard Zhang, Andrew Owens, and Alexei A Efros. 2020. CNN-generated Images are Surprisingly Easy to Spot... for Now. In Proc. of CVPR.
[78]
Xin Yang, Yuezun Li, and Siwei Lyu. 2019. Exposing Deep Fakes Using Inconsistent Head Poses. In Proc. of ICASSP.
[79]
Fisher Yu, Yinda Zhang, Shuran Song, Ari Seff, and Jianxiong Xiao. 2015. LSUN: Construction of a Large-scale Image Dataset Using Deep Learning with Humans in The Loop. arXiv preprint arXiv:1506.03365(2015).
[80]
Ning Yu, Larry S Davis, and Mario Fritz. 2019. Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints. In Proc. of ICCV.
[81]
Hui Zeng, Jiansheng Chen, Xiangui Kang, and Wenjun Zeng. 2015. Removing Camera Fingerprint to Disguise Photograph Source. In Proc. of ICIP.
[82]
Han Zhang, Ian Goodfellow, Dimitris Metaxas, and Augustus Odena. 2019. Self-attention generative adversarial networks. In Proc. of ICML.
[83]
Xu Zhang, Svebor Karaman, and Shih-Fu Chang. 2019. Detecting and Simulating Artifacts in GAN Fake Images. In Proc. of WIFS.
[84]
Zhengjun Zhang. 2008. Quotient Correlation: A Sample Based Alternative to Pearson’s Correlation. The Annals of Statistics(2008).
[85]
Jun-Yan Zhu. [n.d.]. Real Image Source of CycleGAN-Winter and CycleGAN-Zebra. https://people.eecs.berkeley.edu/~taesung_park/CycleGAN/datasets/.
[86]
Jun-Yan Zhu. 2018. CycleGAN Pretrained Models. https://github.com/junyanz/CycleGAN.
[87]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. 2017. Unpaired Image-to-image Translation Using Cycle-consistent Adversarial Networks. In Proc. of ICCV.

Cited By

View all
  • (2024)An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00194(91-109)Online publication date: 19-May-2024
  • (2024)Unmasking Deepfakes: Understanding the Technology, Risks, and Countermeasures2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM)10.1109/ICIPTM59628.2024.10563353(1-6)Online publication date: 21-Feb-2024
  • (2024)Exposing the Limits of Deepfake Detection using novel Facial mole attack: A Perceptual Black- Box Adversarial Attack Study2024 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP51287.2024.10647949(3820-3826)Online publication date: 27-Oct-2024
  • Show More Cited By

Index Terms

  1. NoiseScope: Detecting Deepfake Images in a Blind Setting
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ACSAC '20: Proceedings of the 36th Annual Computer Security Applications Conference
          December 2020
          962 pages
          ISBN:9781450388580
          DOI:10.1145/3427228
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 08 December 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Blind Detection
          2. Clustering
          3. Deepfakes
          4. Machine Learning

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ACSAC '20

          Acceptance Rates

          Overall Acceptance Rate 104 of 497 submissions, 21%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)120
          • Downloads (Last 6 weeks)9
          Reflects downloads up to 18 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00194(91-109)Online publication date: 19-May-2024
          • (2024)Unmasking Deepfakes: Understanding the Technology, Risks, and Countermeasures2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM)10.1109/ICIPTM59628.2024.10563353(1-6)Online publication date: 21-Feb-2024
          • (2024)Exposing the Limits of Deepfake Detection using novel Facial mole attack: A Perceptual Black- Box Adversarial Attack Study2024 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP51287.2024.10647949(3820-3826)Online publication date: 27-Oct-2024
          • (2024)Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A Survey2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC60891.2024.10427620(0329-0335)Online publication date: 8-Jan-2024
          • (2024)eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC SystemsIEEE Access10.1109/ACCESS.2024.336918712(30876-30892)Online publication date: 2024
          • (2024)Deepfakes: current and future trendsArtificial Intelligence Review10.1007/s10462-023-10679-x57:3Online publication date: 19-Feb-2024
          • (2024)Facial Deepfake Detection Using Gaussian ProcessesImage and Video Technology10.1007/978-981-97-0376-0_27(353-365)Online publication date: 12-Feb-2024
          • (2023)An Investigation of the Effectiveness of Deepfake Models and ToolsJournal of Sensor and Actuator Networks10.3390/jsan1204006112:4(61)Online publication date: 4-Aug-2023
          • (2023)Deepfakes Generation and Detection: A Short SurveyJournal of Imaging10.3390/jimaging90100189:1(18)Online publication date: 13-Jan-2023
          • (2023)Exploring Generative Adversarial Networks (GANs) for Deepfake Detection: A Systematic Literature Review2023 International Workshop on Artificial Intelligence and Image Processing (IWAIIP)10.1109/IWAIIP58158.2023.10462832(189-194)Online publication date: 1-Dec-2023
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media