Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack
نویسندگان
چکیده
DeepFakes are raising significant social concerns. Although various DeepFake detectors have been developed as forensic countermeasures, these still vulnerable to attacks. Recently, a few attacks, principally adversarial succeeded in cloaking images evade detection. However, attacks typical detector-specific designs, which require prior knowledge about the detector, leading poor transferability. Moreover, only consider simple security scenarios. Less is known how effective they high-level scenarios where detector's defensive capability or attacker's varies. To address challenges, this paper, we propose novel attack for anti-forensics called trace removal attack. Instead of investigating detector side, looks into original creation pipeline, attempting remove all detectable natural traces render fake more “authentic”. This detector-agnostic design allows be against arbitrary even unknown detectors. implement attack, first perform an in-depth discovery, identifies three discernible traces: spatial anomalies, spectral disparities, and noise fingerprints. Then learning-based network (TR-Net) proposed that involves one generator multiple discriminators. Each discriminator responsible individual representation avoid cross-trace interference. These discriminators arranged parallel, prompts simultaneously. evaluate efficacy crafted heterogeneous were embedded with different levels defense, attackers' background data varied. The experimental results show can significantly compromise detection accuracy six state-of-the-art while causing negligible degradation visual quality.
منابع مشابه
Differential Forgery Attack Against LAC
LAC is one of the candidates to the CAESAR competition. In this paper we present a differential forgery attack on LAC. We study the collection of characteristics following a fixed truncated characteristic, in order to obtain a lower bound on the probability of a differential. We show that some differentials have a probability higher than 2−64, which allows a forgery attack on the full LAC. This...
متن کاملResampling Forgery Detection Using Deep Learning and A-Contrario Analysis
The amount of digital imagery recorded has recently grown exponentially, and with the advancement of software, such as Photoshop or Gimp, it has become easier to manipulate images. However, most images on the internet have not been manipulated and any automated manipulation detection algorithm must carefully control the false alarm rate. In this paper we discuss a method to automatically detect...
متن کاملPractical View on Face Presentation Attack Detection
Face recognition is one of the most socially accepted forms of biometric recognition. The recent availability of very accurate and efficient face recognition algorithms leaves the vulnerability to presentation attacks as the major challenge to face recognition solutions. Previous works have shown high preforming presentation attack detection PAD solutions under controlled evaluation scenarios. ...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملForgery Detection by Local Correspondence Forgery Detection by Local Correspondence Forgery Detection by Local Correspondence
Signatures may be stylish or unconventional and have many personal characteristics that are challenging to reproduce by anyone other then the original author For this reason signatures are used and accepted as proof of authorship or consent on personal checks credit purchases and legal documents Currently signatures are veri ed only informally in many environments but the rapid development of c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2023
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2023.3241604