Image authenticity identification method

An image and authenticity technology, which is applied in the field of identification of deep fake images, can solve problems that rarely involve the identification of real and fake faces in intelligent directions, and achieve the effect of improving speed and accuracy

Active Publication Date: 2021-01-01
TIANJIN UNIV
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the research on the identification of true and false faces at home and abroad has shifted from the traditional digital forensics method to the research of artificial intelligence methods, and among the many patents currently published, few of them involve research on the identification of true and false faces in the direction of intelligence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image authenticity identification method
  • Image authenticity identification method
  • Image authenticity identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the technical solution of the present invention clearer, the present invention will be further elaborated below in conjunction with the accompanying drawings. The invention according to figure 1 The steps shown are implemented in detail:

[0030] The first step is to visualize the texture difference between real and fake images.

[0031] The image saliency method is used to process a large number of real face images and fake face images respectively, and the two types of face images are visualized to reveal the potential texture differences of face regions. In order to better grasp the texture information of the input image, the present invention uses superpixels as the minimum processing unit.

[0032] (3) Segment the original image through the simple linear iterative clustering (SLIC) algorithm to obtain superpixels, and calculate the contrast between each superpixel and the edge superpixels to obtain a salient image based on the background.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image authenticity identification method, which comprises the following steps of: image saliency processing: segmenting an original image through an SLIC algorithm to obtain superpixels, and calculating the contrast between each superpixel and an edge superpixel to obtain a background-based saliency image; segmenting the original image according to the pixel threshold to select a foreground, and calculating the similarity between the original image and the foreground to obtain a foreground-based salient image; fusing the salient image based on the foreground and thebackground, and performing smoothing processing by using a Gaussian filter to obtain a local feature salient image; obtaining a saliency image of a pixel level; obtaining a texture enhanced image; and training a true and false face image identification network.

Description

technical field [0001] The invention relates to the field of image forensics, in particular to a method for identifying deep fake images. Background technique [0002] In recent years, with the development of generative confrontation network (GANs) technology, the birth of GANs-based Deepfake in 2017 opened a precedent for face replacement. Later, Deepnude and Zao software were also born for face replacement. These software can replace the selected face with any other person's face, and use it to create various videos such as pornographic clips that do not exist, and spread them on the Internet, polluting the network environment and seriously endangering personal information security. . What's more, rumormongers use deep forgery technology to publish false speech videos of leaders of countries and public organizations, creating hidden dangers for the world's public safety. Therefore, it is imminent to establish an effective identification system for fake images. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/62G06K9/38G06T7/11G06T7/194
CPCG06T7/11G06T7/194G06T2207/10024G06T2207/20081G06T2207/20192G06T2207/20221G06T2207/30201G06V40/162G06V40/171G06V40/172G06V40/40G06V10/28G06F18/23G06F18/25
Inventor 杨嘉琛肖帅
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products