MDD-watermark: multi-domain decoupled watermarking for deepfake detection and source tracing (original) (raw)

References

  1. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)
    Article MathSciNet Google Scholar
  2. Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840–6851 (2020)
    Google Scholar
  3. Liang, P., Liu, G., Xiong, Z., Fan, H., Zhu, H., Zhang, X.: A facial geometry based detection model for face manipulation using cnn-lstm architecture. Inf. Sci. 633, 370–383 (2023)
    Article Google Scholar
  4. AlDuaij, N.: Veracos: an operating system extension for the veracity of files. Comput. Secur. 157, 104565 (2025)
    Article Google Scholar
  5. Chen, Z., Xie, L., Pang, S., He, Y., Zhang, B.: Magdr: Mask-guided detection and reconstruction for defending deepfakes. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9010–9019 (2021)
  6. Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nießner, M.: Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 1–11 (2019)
  7. Durall, R., Keuper, M., Keuper, J.: Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 7890–7899 (2020)
  8. Wang, G., Jiang, Q., Jin, X., Li, W., Cui, X.: Mc-lcr: multimodal contrastive classification by locally correlated representations for effective face forgery detection. Knowl.-Based Syst. 250, 109114 (2022)
    Article Google Scholar
  9. Liu, D., Dang, Z., Peng, C., Zheng, Y., Li, S., Wang, N., Gao, X.: Fedforgery: generalized face forgery detection with residual federated learning. IEEE Trans. Inf. Forensics Secur. 18, 4272–4284 (2023)
    Article Google Scholar
  10. Ahmed, K.: 2dots-multi-bit-encoding for robust and imperceptible image watermarking. Multimed. Tools Appl. 80(2), 2395–2411 (2021).
  11. Rabeah, N., Ahmed, K., Aaliya, S.: High performance and energy efficient image watermarking for video using a mobile device. Wirel. Pers. Commun. 104, 1535–1551 (2019).
  12. Yu, N., Skripniuk, V., Abdelnabi, S., Fritz, M.: Artificial fingerprinting for generative models: Rooting deepfake attribution in training data. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 14448–14457 (2021)
  13. Wang, R., Juefei-Xu, F., Luo, M., Liu, Y., Wang, L.: Faketagger: Robust safeguards against deepfake dissemination via provenance tracking. In: Proceedings of the ACM International Conference on Multimedia, pp. 3546–3555 (2021)
  14. Fernandez, P., Sablayrolles, A., Furon, T., Jégou, H., Douze, M.: Watermarking Images in Self-Supervised Latent Spaces (2022). https://arxiv.org/abs/2112.09581
  15. Yan, Z., Zhang, Y., Fan, Y., Wu, B.: Ucf: Uncovering common features for generalizable deepfake detection. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 22355–22366 (2023).
  16. Yan, Z., Zhang, Y., Yuan, X., Lyu, S., Wu, B.: Deepfakebench: a comprehensive benchmark of deepfake detection. In: In Proceedings of the International Conference on Neural Information Processing Systems, pp. 4534–4565 (2023)
  17. Baluja, S.: Hiding images in plain sight: Deep steganography. Advances in Neural Information Processing Systems 30, (2017)
  18. Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision, pp. 657–672 (2018)
  19. Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: Invisible hyperlinks in physical photographs. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117–2126 (2020)
  20. Wu, X., Liao, X., Ou, B.: Sepmark: Deep separable watermarking for unified source tracing and deepfake detection. In: Proceedings of the ACM International Conference on Multimedia, pp. 1190–1201 (2023)
  21. Poobathy, D., Chezian, R.M.: Edge detection operators: peak signal to noise ratio based comparison. IJ Image, Graph. Signal Process. 10, 55–61 (2014)
    Google Scholar
  22. Ronneberger, O., Fischer, P., Brox, T.: U-net: Convolutional networks for biomedical image segmentation. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 234–241 (2015)
  23. Chollet, F.: Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1251–1258 (2017)
  24. Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132–7141 (2018)
  25. Pumarola, A., Agudo, A., Martinez, A.M., Sanfeliu, A., Moreno-Noguer, F.: Ganimation: Anatomically-aware facial animation from a single image. In: Proceedings of the European Conference on Computer Vision, pp. 818–833 (2018)
  26. Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)
  27. Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 586–595 (2018)
  28. Jia, Z., Fang, H., Zhang, W.: Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression. In: Proceedings of the ACM International Conference on Multimedia, pp. 41–49 (2021)
  29. Ma, R., Guo, M., Hou, Y., Yang, F., Li, Y., Jia, H., Xie, X.: Towards blind watermarking: Combining invertible and non-invertible mechanisms. In: Proceedings of the ACM International Conference on Multimedia, pp. 1532–1542 (2022)
  30. Fang, H., Jia, Z., Ma, Z., Chang, E.-C., Zhang, W.: Pimog: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network. In: Proceedings of the ACM International Conference on Multimedia, pp. 2267–2275 (2022)
  31. Chen, R., Chen, X., Ni, B., Ge, Y.: Simswap: An efficient framework for high fidelity face swapping. In: Proceedings of the ACM International Conference on Multimedia, pp. 2003–2011 (2020)

Download references