Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

False face video tampering detection method and system based on time domain self-attention mechanism

A tampering detection and attention technology, applied in the field of fake face video tampering detection, can solve the problems of decreased accuracy, insufficient generalization ability, and no use of the timing information of the frames before and after the fake face video, and achieves high accuracy and good The effect of versatility and good compatibility

Active Publication Date: 2021-04-30
SOUTH CHINA UNIV OF TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current mainstream fake face video detection technology is mainly based on the neural network to extract features. Although fake face videos can be identified to a certain extent, especially in the database test, it can achieve a high accuracy rate. However, the cross-database test is accurate. sharp drop in rates
In fact, most of the published face-changing and tampering detection algorithms based on deep networks have such problems, that is, the problem of insufficient generalization ability
In addition, most of the current related algorithms are based on the detection of a single image, and do not use the timing information of the front and back frames in the fake face video
So far, the method of fake face video detection using the color features, noise features and temporal features of the picture space domain, and the neural network constructed by the self-attention mechanism in the temporal domain has not been reported.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False face video tampering detection method and system based on time domain self-attention mechanism
  • False face video tampering detection method and system based on time domain self-attention mechanism
  • False face video tampering detection method and system based on time domain self-attention mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0100] Such as figure 1 As shown, this embodiment provides a fake face video tampering detection method based on the time-domain self-attention mechanism. The dual-stream feature extraction module is used to extract the color features and noise features of the image space domain and then merge them, and then use the time-domain self-attention module. After extracting the time domain information of the front and back frames, and accurately predicting the tampered area, the facial intersection ratio under the calculation trust mechanism of the predicted tampered area is used to judge the true and false faces, including the network training part and the sample test part;

[0101] This embodiment takes training on the FaceForensics++ (FF++) (C0&C23) database, in-database testing on the FF++ (C0&C23) database, and cross-database testing on the TIMIT database as examples, and introduces the implementation process of this example in detail. The experiment is carried out on the Ubuntu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a false face video tampering detection method and system based on a time domain self-attention mechanism, and the method comprises a network training step and a sample testing step, and the network training step mainly comprises the steps of video preprocessing, segmentation network building and training. The sample test mainly comprises the steps of preprocessing a video, building a segmentation network, predicting a tampered area through three modules in sequence, and calculating a facial intersection ratio of a prediction mask to obtain a detection result. According to the invention, color features, noise features and time domain features of a spatial domain are input into a neural network comprising a double-flow feature extraction module, a time domain self-attention module and an up-sampling module to predict a tampered area, a detection object comprises a single picture and a plurality of video frame pictures, and relatively ideal accuracy is obtained in different databases. Compared with other existing algorithms, the cross-database test performance is obviously improved, and the invention has great potential application value.

Description

technical field [0001] The invention relates to the technical field of digital video tampering detection, in particular to a fake face video tampering detection method and system based on a time-domain self-attention mechanism. Background technique [0002] With the rapid development of face recognition technology, the security threat posed by face tampering is getting bigger and bigger, and related fake face videos are also emerging in an endless stream on the Internet. Deepfake face-changing tools mainly use deep neural networks such as autoencoders or confrontation generation networks to generate false faces and then replace the faces of the original video. The present invention mainly detects face-changing videos generated by this type of face tampering technology . [0003] The current mainstream fake face video detection technology is mainly based on the neural network to extract features. Although fake face videos can be identified to a certain extent, especially in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/62G06N3/04G06N3/08G06T7/90
CPCG06N3/08G06T7/90G06V40/168G06V20/44G06V20/49G06V20/46G06N3/045G06F18/214
Inventor 胡永健高逸飞佘惠敏刘琲贝
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products