A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training

نویسندگان

چکیده

Facial manipulation enables facial expressions to be tampered with or identities replaced in videos. The fake videos are so realistic that they even difficult for human eyes distinguish. This poses a great threat social and public information security. A number of detectors have been proposed address this threat. However, previous studies shown the accuracy these is sensitive adversarial examples. existing defense methods very limited terms applicable scenes effects. paper proposes new strategy detectors, which combines passive method, bilateral filtering, proactive joint training, mitigate vulnerability against filtering method applied preprocessing stage model without any modification denoise input training starts from model, mixes various examples original train model. introduction can defends multiple attacks. experimental results show positively helps counter

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unifying Bilateral Filtering and Adversarial Training for Robust Neural Networks

Recent analysis of deep neural networks has revealed their vulnerability to carefully structured adversarial examples. Many effective algorithms exist to craft these adversarial examples, but performant defenses seem to be far away. In this work, we attempt to combine denoising and robust optimization methods into a unified defense which we found to not only work extremely well, but also makes ...

متن کامل

A Bilateral Tessier Number 4 and 5 Facial Cleft and Surgical Strategy: A Case Report

Introduction: Tessier facial cleft is among the rarest facial clefts reported in literatures and there are many issues arguing about its multidisciplinary repairing techniques. Tessier number 4 and 5 are extremely rare facial anomalies. There are few literatures describing these clefts and their surgical modalities. Number 5 Tessier cleft begins medial to oral commissure in the upper lip and ex...

متن کامل

Accurate and Efficient Cost Aggregation Strategy for Stereo Correspondence Based on Approximated Joint Bilateral Filtering

Recent local state-of-the-art stereo algorithms based on variable cost aggregation strategies allow for inferring disparity maps comparable to those yielded by algorithms based on global optimization schemes. Unfortunately, thought these results are excellent, they are obtained at the expense of high computational requirements that are comparable or even higher than those required by global app...

متن کامل

a bilateral tessier number 4 and 5 facial cleft and surgical strategy: a case report

introduction: tessier facial cleft is among the rarest facial clefts reported in literatures and there are many issues arguing about its multidisciplinary repairing techniques. tessier number 4 and 5 are extremely rare facial anomalies. there are few literatures describing these clefts and their surgical modalities. number 5 tessier cleft begins medial to oral commissure in the upper lip and ex...

متن کامل

Pixel-Based Skin Detection for Pornography Filtering

A robust skin detector is the primary need of many fields of computer vision, including face detection, gesture recognition, and pornography filtering. Less than 10 years ago, the first paper on automatic pornography filtering was published. Since then, different researchers claim different color spaces to be the best choice for skin detection in pornography filtering. Unfortunately, no com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/4280328