Countering malicious deepfakes: survey, battleground, and horizon

The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake, have achieved significant progress and promoted a wide range of benign and malicious applications, e.g., visual effect assistance in movie and misinformation generation by faking famous persons....

Full description

Saved in:
Bibliographic Details
Main Authors: Xu, Felix Juefei, Wang, Run, Huang, Yihao, Guo, Qing, Ma, Lei, Liu, Yang
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/162703
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-162703
record_format dspace
spelling sg-ntu-dr.10356-1627032022-11-07T04:29:08Z Countering malicious deepfakes: survey, battleground, and horizon Xu, Felix Juefei Wang, Run Huang, Yihao Guo, Qing Ma, Lei Liu, Yang School of Computer Science and Engineering Engineering::Computer science and engineering DeepFake Generation DeepFake Detection The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake, have achieved significant progress and promoted a wide range of benign and malicious applications, e.g., visual effect assistance in movie and misinformation generation by faking famous persons. The evil side of this new technique poses another popular study, i.e., DeepFake detection aiming to identify the fake faces from the real ones. With the rapid development of the DeepFake-related studies in the community, both sides (i.e., DeepFake generation and detection) have formed the relationship of battleground, pushing the improvements of each other and inspiring new directions, e.g., the evasion of DeepFake detection. Nevertheless, the overview of such battleground and the new direction is unclear and neglected by recent surveys due to the rapid increase of related publications, limiting the in-depth understanding of the tendency and future works. To fill this gap, in this paper, we provide a comprehensive overview and detailed analysis of the research work on the topic of DeepFake generation, DeepFake detection as well as evasion of DeepFake detection, with more than 318 research papers carefully surveyed. We present the taxonomy of various DeepFake generation methods and the categorization of various DeepFake detection methods, and more importantly, we showcase the battleground between the two parties with detailed interactions between the adversaries (DeepFake generation) and the defenders (DeepFake detection). The battleground allows fresh perspective into the latest landscape of the DeepFake research and can provide valuable analysis towards the research challenges and opportunities as well as research trends and future directions. We also elaborately design interactive diagrams (http://www.xujuefei.com/ dfsurvey) to allow researchers to explore their own interests on popular DeepFake generators or detectors. National Research Foundation (NRF) This research was partly supported by the National Key Research and Development Program of China Under Grant No. 2021YFB3100700, the Fellowship of China National Postdoctoral Program for Innovative Talents Under No. BX2021229, the Natural Science Foundation of Hubei Province Under No. 2021CFB089, the Fundamental Research Funds for the Central Universities Under No. 2042021kf1030, the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness under No. HNTS2022004, the National Natural Science Foundation of China (NSFC) under No. 61876134. The work was also supported by the National Research Foundation, Singapore under its the AI Singapore Programme (AISG2- RP-2020-019), the National Research Foundation, Prime Ministers Office, Singapore under its National Cybersecurity R&D Program (No. NRF2018NCR-NCR005-0001), NRF Investigatorship NRFI06- 2020-0001, the National Research Foundation through its National Satellite of Excellence in Trustworthy Software Systems (NSOETSS) project under the National Cybersecurity R&D (NCR) Grant (No. NRF2018NCR-NSOE003-0001). 2022-11-07T04:19:29Z 2022-11-07T04:19:29Z 2022 Journal Article Xu, F. J., Wang, R., Huang, Y., Guo, Q., Ma, L. & Liu, Y. (2022). Countering malicious deepfakes: survey, battleground, and horizon. International Journal of Computer Vision, 130(7), 1678-1734. https://dx.doi.org/10.1007/s11263-022-01606-8 0920-5691 https://hdl.handle.net/10356/162703 10.1007/s11263-022-01606-8 35528632 2-s2.0-85131013969 7 130 1678 1734 en AISG2- RP-2020-019 NRF2018NCR-NCR005-0001 NRFI06- 2020-0001 NRF2018NCR-NSOE003-0001 International Journal of Computer Vision © 2022 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
DeepFake Generation
DeepFake Detection
spellingShingle Engineering::Computer science and engineering
DeepFake Generation
DeepFake Detection
Xu, Felix Juefei
Wang, Run
Huang, Yihao
Guo, Qing
Ma, Lei
Liu, Yang
Countering malicious deepfakes: survey, battleground, and horizon
description The creation or manipulation of facial appearance through deep generative approaches, known as DeepFake, have achieved significant progress and promoted a wide range of benign and malicious applications, e.g., visual effect assistance in movie and misinformation generation by faking famous persons. The evil side of this new technique poses another popular study, i.e., DeepFake detection aiming to identify the fake faces from the real ones. With the rapid development of the DeepFake-related studies in the community, both sides (i.e., DeepFake generation and detection) have formed the relationship of battleground, pushing the improvements of each other and inspiring new directions, e.g., the evasion of DeepFake detection. Nevertheless, the overview of such battleground and the new direction is unclear and neglected by recent surveys due to the rapid increase of related publications, limiting the in-depth understanding of the tendency and future works. To fill this gap, in this paper, we provide a comprehensive overview and detailed analysis of the research work on the topic of DeepFake generation, DeepFake detection as well as evasion of DeepFake detection, with more than 318 research papers carefully surveyed. We present the taxonomy of various DeepFake generation methods and the categorization of various DeepFake detection methods, and more importantly, we showcase the battleground between the two parties with detailed interactions between the adversaries (DeepFake generation) and the defenders (DeepFake detection). The battleground allows fresh perspective into the latest landscape of the DeepFake research and can provide valuable analysis towards the research challenges and opportunities as well as research trends and future directions. We also elaborately design interactive diagrams (http://www.xujuefei.com/ dfsurvey) to allow researchers to explore their own interests on popular DeepFake generators or detectors.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Xu, Felix Juefei
Wang, Run
Huang, Yihao
Guo, Qing
Ma, Lei
Liu, Yang
format Article
author Xu, Felix Juefei
Wang, Run
Huang, Yihao
Guo, Qing
Ma, Lei
Liu, Yang
author_sort Xu, Felix Juefei
title Countering malicious deepfakes: survey, battleground, and horizon
title_short Countering malicious deepfakes: survey, battleground, and horizon
title_full Countering malicious deepfakes: survey, battleground, and horizon
title_fullStr Countering malicious deepfakes: survey, battleground, and horizon
title_full_unstemmed Countering malicious deepfakes: survey, battleground, and horizon
title_sort countering malicious deepfakes: survey, battleground, and horizon
publishDate 2022
url https://hdl.handle.net/10356/162703
_version_ 1749179179298979840