Deepfake Catcher: Can a Simple Fusion be Effective and Outperform Complex DNNs?
Despite having completely different configurations deep learning architectures learn a
specific set of features that are common across architectures. For example the initial few …
specific set of features that are common across architectures. For example the initial few …
Motion magnified 3-d residual-in-dense network for deepfake detection
Driven by the advances in deep learning, highly photo-realistic techniques capable of
switching the identity and expression of faces have emerged. Cheap access to computing …
switching the identity and expression of faces have emerged. Cheap access to computing …
IPDCN2: Improvised Patch-based Deep CNN for facial retouching detection
With the advancement of photo editing softwares, nowadays facial retouching becomes a
common practice across different social media platforms, Curriculum Vitae (CV) related …
common practice across different social media platforms, Curriculum Vitae (CV) related …
MD-CSDNetwork: Multi-domain cross stitched network for deepfake detection
The rapid progress in the ease of creating and spreading ultra-realistic media over social
platforms calls for an urgent need to develop a generalizable deepfake detection technique …
platforms calls for an urgent need to develop a generalizable deepfake detection technique …
Subjective and objective quality assessment of multi-attribute retouched face images
Facial retouching, aiming at enhancing an individual's appearance digitally, has become
popular in many parts of human life, such as personal entertainment, commercial …
popular in many parts of human life, such as personal entertainment, commercial …
Parameter agnostic stacked wavelet transformer for detecting singularities
Abstract Machine learning algorithms especially deep neural networks have seen
tremendous growth in their real-world deployment. While these algorithms have to yield high …
tremendous growth in their real-world deployment. While these algorithms have to yield high …
Manipulating faces for identity theft via morphing and deepfake: Digital privacy
Digital face images can be easily manipulated for obfuscating or impersonating an identity.
Several techniques are used for face manipulation, both traditional computer vision based …
Several techniques are used for face manipulation, both traditional computer vision based …
Deepfake: Classifiers, Fairness, and Demographically Robust Algorithm
Deepfake detection research has seen tremendous success and has achieved remarkably
high performance on a few existing datasets. However, the significant drawback of the …
high performance on a few existing datasets. However, the significant drawback of the …
Mannet: A Large-Scale Manipulated Image Detection Dataset And Baseline Evaluations
The sharing of fake content on social media platforms has become a major concern. In many
cases, the same content with small variations is shared multiple times on different social …
cases, the same content with small variations is shared multiple times on different social …
Improved Face Image Authentication Scheme based on Embedding in Adjacent Coefficients
Face image authentication (FIA) schemes have recently been developed using face
detection and image watermarking technology. The research in this direction proved the …
detection and image watermarking technology. The research in this direction proved the …