Face Forensics in the Wild.

作者: Wenguan Wang , Tianfei Zhou , Jianbing Shen , Zhiyuan Liang

DOI:

关键词:

摘要: On existing public benchmarks, face forgery detection techniques have achieved great success. However, when used in multi-person videos, which often contain many people …

参考文章(82)
Du Tran, Lubomir Bourdev, Rob Fergus, Lorenzo Torresani, Manohar Paluri, Learning Spatiotemporal Features with 3D Convolutional Networks 2015 IEEE International Conference on Computer Vision (ICCV). pp. 4489- 4497 ,(2015) , 10.1109/ICCV.2015.510
Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo Larochelle, François Laviolette, Mario Marchand, Victor Lempitsky, Domain-Adversarial Training of Neural Networks Domain Adaptation in Computer Vision Applications. ,vol. 17, pp. 189- 209 ,(2017) , 10.1007/978-3-319-58347-1_10
Tiago José De Carvalho, Christian Riess, Elli Angelopoulou, Helio Pedrini, Anderson de Rezende Rocha, None, Exposing Digital Image Forgeries by Illumination Color Classification IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1182- 1194 ,(2013) , 10.1109/TIFS.2013.2265677
Tiziano Bianchi, Alessandro Piva, Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 1003- 1017 ,(2012) , 10.1109/TIFS.2012.2187516
Antonio Torralba, Alexei A. Efros, Unbiased look at dataset bias computer vision and pattern recognition. pp. 1521- 1528 ,(2011) , 10.1109/CVPR.2011.5995347
Thomas G. Dietterich, Richard H. Lathrop, Tomás Lozano-Pérez, Solving the multiple instance problem with axis-parallel rectangles Artificial Intelligence. ,vol. 89, pp. 31- 71 ,(1997) , 10.1016/S0004-3702(96)00034-3
Christoph Bregler, Michele Covell, Malcolm Slaney, Video Rewrite: driving visual speech with audio international conference on computer graphics and interactive techniques. pp. 353- 360 ,(1997) , 10.1145/258734.258880
Tomás Lozano-Pérez, Oded Maron, A Framework for Multiple-Instance Learning neural information processing systems. ,vol. 10, pp. 570- 576 ,(1997)
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, G. Serra, A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 1099- 1110 ,(2011) , 10.1109/TIFS.2011.2129512
Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun, Deep Residual Learning for Image Recognition computer vision and pattern recognition. pp. 770- 778 ,(2016) , 10.1109/CVPR.2016.90