Skip to main content

An Overview of Fake Face Detection Approaches

  • Conference paper
  • First Online:
Progress in Intelligent Decision Science (IDS 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1301))

Included in the following conference series:

  • 747 Accesses

Abstract

Human face has been one of the most popular objects in computer vision. With the advancements in computing power over the past decades, deep face understanding systems have reached (and surpassed at some cases) human performance and hence, the problem of facial analysis has changed its route from analyzing to generating. These adversarial generation techniques have been used in generating fake news, fake political and financial statements, and even fake porn videos, leveraging the wide availability of large-scale public databases and machine learning techniques. However, there are only a few studies to detect the generated face from real. This study investigates the abundantly used fake face generation models and examines the techniques for detecting facial manipulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vision 57(2), 137–154 (2004)

    Article  Google Scholar 

  2. Tao, H., Huang, T.S.: Explanation-based facial motion tracking using a piecewise bezier volume deformation model. In: Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), vol. 1, pp. 611–617. IEEE (2019)

    Google Scholar 

  3. Cao, K., Rong, Y., Li, C., Tang, C., Change Loy, C.: Pose-robust face recognition via deep residual equivariant mapping. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5187–5196 (2018)

    Google Scholar 

  4. Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701–1708 (2014)

    Google Scholar 

  5. Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)

    Google Scholar 

  6. Kumar, N., Berg, A.C., Belhumeur, N., Nayar, S.K.: Attribute and simile classifiers for face verification. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 365–372. IEEE (2009)

    Google Scholar 

  7. Zheng, W., Tang, H., Lin, Z., Huang, T.S.: A novel approach to expression recognition from non-frontal face images. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 1901–1908. IEEE (2009)

    Google Scholar 

  8. Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713–1723 (2017)

    Article  Google Scholar 

  9. Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process. Mag. 32(5), 20–30 (2015)

    Article  Google Scholar 

  10. Tolosana, R., Gomez-Barrero, M., Busch, C., Ortega-Garcia, J.: Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. 15, 1261–1275 (2019)

    Article  Google Scholar 

  11. Zao: https://zaodownload.com/. Accessed 25 Jun 2020

  12. Faceapp: https://faceapp.com/app. Accessed 25 Jun 2020

  13. Reflect: https://reflect.tech/. Accessed 25 Jun 2020

  14. Snapchat: https://www.snapchat.com/. Accessed 25 Jun 2020

  15. Jia, S., Guo, G., Xu, Z.: A survey on 3D mask presentation attack detection and countermeasures. Pattern Recogn. 98, 107032 (2020)

    Article  Google Scholar 

  16. Li, L., Correia, P.L., Hadid, A.: Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1), 3–14 (2017)

    Article  Google Scholar 

  17. Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)

    Article  Google Scholar 

  18. Zhang, X., Yin, L., Cohn, J.F., Canavan, S., Reale, M., Horowitz, A., Liu, P., Girard, J.M.: Bp4d-spontaneous: a high-resolution spontaneous 3d dynamic facial expression database. Image Vision Comput. 32(10), 692–706 (2014)

    Article  Google Scholar 

  19. Pighin, F., Hecker, J., Lischinski, D., Szeliski, R., Salesin, D.H.: Synthesizing realistic facial expressions from photographs. In: ACM SIGGRAPH 2006 Courses, p. 19 (2006)

    Google Scholar 

  20. Nebel, J.C.: Soft tissue modelling from 3d scanned data. In: Deformable Avatars, pp. 85–97. Springer (2001)

    Google Scholar 

  21. Singh, K., Fiume, E.: Wires: a geometric deformation technique. In: Proceedings of the 25th Annual Conference on Computer Graphics and Interactive Techniques, pp. 405–414 (1998)

    Google Scholar 

  22. Zhang, Q., Liu, Z., Quo, G., Terzopoulos, D., Shum, H.-Y.: Geometry-driven photorealistic facial expression synthesis. IEEE Trans. Vis. Comput. Graph. 12(1), 48–60 (2005)

    Article  Google Scholar 

  23. Halder, S., Bhattacharjee, D., Nasipuri, M.,  Basu, D.K., Kundu, M.: Face synthesis (fasy) system for generation of a face image from human description, arXiv preprint arXiv:1005.4034 (2010)

  24. Dai, Z.-l., Zhu, H.-Y., Zhang, S., Jia, J., Cai, L.-H.: Mpeg-4 based facial expression image morphing. J. Image Graph. 5 (2009)

    Google Scholar 

  25. Xudong, L.: Image morphing method for facial expression image and animation synthesis. Geomatics Inf. Sci. Wuhan Univ. 9, 796–799 2007

    Google Scholar 

  26. Fu, T., Foroosh, H.: Expression morphing from distant viewpoints. In: 2004 International Conference on Image Processing, 2004, ICIP 2004, vol. 5, pp. 3519–3522. IEEE (2004)

    Google Scholar 

  27. Wang, X., Tang, X.: Face photo-sketch synthesis and recognition. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 1955–1967 (2008)

    Article  Google Scholar 

  28. Zhang, S., Gao, X., Wang, N., Li, J., Zhang, M.: Face sketch synthesis via sparse representation-based greedy search. IEEE Trans. Image Process. 24(8), 2466–2477 (2015)

    Article  MathSciNet  Google Scholar 

  29. Liu, F., Zeng, D., Li, J., Zhao, Q.-J.: On 3d face reconstruction via cascaded regression in shape space. Front. Inf. Technol. Electron. Eng. 18(12), 1978–1990 (2017)

    Article  Google Scholar 

  30. Dale, K., Sunkavalli, K., Johnson, K., Vlasic, D., Matusik, W., Pfister, H.: Video face replacement. In: Proceedings of the 2011 SIGGRAPH Asia Conference, pp. 1–10 (2011)

    Google Scholar 

  31. Garrido, P., Valgaerts, L., Rehmsen, O., Thormahlen, T., Perez, P., Theobalt, C.: Automatic face reenactment. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4217–4224 (2014)

    Google Scholar 

  32. Garrido, P., Valgaerts, L., Sarmadi, H., Steiner, I., Varanasi, K., Perez, P., Theobalt, C.: Vdub: Modifying face video of actors for plausible visual alignment to a dubbed audio track. In: Computer Graphics Forum, vol. 34, no. 2, pp. 193–204. Wiley Online Library (2015)

    Google Scholar 

  33. Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., Nießner, M.: Face2face: real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2387–2395 (2016)

    Google Scholar 

  34. Suwajanakorn, S., Seitz, S.M., Kemelmacher-Shlizerman, I.: Synthesizing obama: learning lip sync from audio. ACM Trans. Graph. (TOG) 36(4), 1–13 (2017)

    Article  Google Scholar 

  35. Liu, F., Zhu, R., Zeng, D., Zhao, Q., Liu, X.: Disentangling features in 3d face shapes for joint face reconstruction and recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5216–5225 (2018)

    Google Scholar 

  36. Tran, L., Liu, X.: On learning 3d face morphable model from in-the-wild images. IEEE Trans. Pattern Anal. Mach. Intell. 43, 157–151 (2019)

    Google Scholar 

  37. Kingma, D.P., Welling, M.: Auto-encoding variational bayes, arXiv preprint arXiv:1312.6114 (2013)

  38. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D.. Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014)

    Google Scholar 

  39. Miyato, T., Kataoka, T., Koyama, M., Yoshida, Y.: Spectral normalization for generative adversarial networks, arXiv preprint arXiv:1802.05957 (2018)

  40. Yu, N., Davis, L.S., Fritz, M.: Attributing fake images to gans: Learning and analyzing gan fingerprints. In: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pp. 7556–7566, October 2019

    Google Scholar 

  41. Tran, L., Yin, X., Liu, X.: Disentangled representation learning gan for pose-invariant face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1415–1424 (2017)

    Google Scholar 

  42. Karras, T., Aila,T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation, arXiv preprint arXiv:1710.10196 (2017)

  43. Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4401–4410 (2019)

    Google Scholar 

  44. Bellemare, M.G.,. Danihelka, I., Dabney, W., Mohamed, S., Lakshminarayanan, B., Hoyer, S., Munos, R.: The cramer distance as a solution to biased wasserstein gradients, arXiv preprint arXiv:1705.10743 (2017)

  45. Shen, Y., Yang, C., Tang, X., Zhou, B.: Interfacegan: interpreting the disentangled face representation learned by gans, arXiv preprint arXiv:2005.09635 (2020)

  46. Choi, Y., Choi, M., Kim, M., Ha, J.-W., Kim, S., Choo, J.: Stargan: unified generative adversarial networks for multi-domain image-to-image translation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8789–8797 (2018)

    Google Scholar 

  47. Thies, J., Zollhöfer, M., Nießner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. (TOG) 38(4), 1–12 (2019)

    Article  Google Scholar 

  48. Li, H., Li, B., Tan, S., Huang, J.: Detection of deep network generated images using disparities in color components, arXiv preprint arXiv:1808.07276 (2018)

  49. Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts, arXiv preprint arXiv:1811.00656 (2018)

  50. Yang, X., Li, Y., Qi, H., Lyu, S.: Exposing gan-synthesized faces using landmark locations. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 113–118 (2019)

    Google Scholar 

  51. Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 83–92. IEEE (2019)

    Google Scholar 

  52. He, P., Li, H., Wang, H.: Detection of fake images via the ensemble of deep representations from multi color spaces. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 2299–2303. IEEE (2019)

    Google Scholar 

  53. Nataraj, L., Mohammed, T.M., Manjunath, B., Chandrasekaran, S., Flenner, A., Bappy, J.H., Roy-Chowdhury, A.K.: Detecting gan generated fake images using co-occurrence matrices. Electron. Imaging 2019(5), 1–532 (2019)

    Article  Google Scholar 

  54. Wang, R., Juefei-Xu, F., Xie, X., Ma, L., Huang, Y., Liu, Y.: Amora: black-box adversarial morphing attack, arXiv preprint arXiv:1912.03829 (2019)

  55. Huang, Y., Juefei-Xu, F., Wang, R.,. Xie, X., Ma, L., Li, J., Miao, W., Liu, Y., Pu, G.: Fakelocator: robust localization of gan-based face manipulations via semantic segmentation networks with bells and whistles, arXiv preprint arXiv:2001.09598 (2020)

  56. Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001–5010 (2020)

    Google Scholar 

  57. Liu, Z., Qi, X.,Torr, P.H.: Global texture enhancement for fake face detection in the wild. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 8060–8069 (2020)

    Google Scholar 

  58. Zhu, J.-Y.,. Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2223–2232 (2017)

    Google Scholar 

  59. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  60. Hsu, C.-C., Lee, C.-Y., Zhuang, Y.-X.: Learning to detect fake face images in the wild. In: 2018 International Symposium on Computer, Consumer and Control (IS3C), September 2018

    Google Scholar 

  61. Tariq, S., Lee, S., Kim, H., Shin, Y., Woo, S.S.: Detecting both machine and human created fake face images in the wild. In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, ser. MPS 2018, pp. 81–87. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3267357.3267367

  62. Korshunov, P., Marcel, S.: Vulnerability assessment and detection of deepfake videos. In: International Conference on Biometrics (ICB), vol. 2019, pp. 1–6 (2019)

    Google Scholar 

  63. Xuan, X., et al.: Scalable fine-grained generated image classification based on deep metric learning. arXiv preprint arXiv:1912.11082 (2019)

  64. Fu, Y., Sun, T., Jiang, X., Xu, K., He, P.: Robust gan-face detection based on dual-channel cnn network. In: 2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), pp. 1–5, October 2019

    Google Scholar 

  65. Tariq, S., Lee, S., Kim, H., Shin, Y., Woo, S.: Gan is a friend or foe?: a framework to detect various fake face images. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp. 1296–1303, April 2019

    Google Scholar 

  66. Zhuang, Y., Hsu, C.: “Detecting generated image based on a coupled network with two-step pairwise learning. In: IEEE International Conference on Image Processing (ICIP), vol. 2019, pp. 3212–3216 (2019)

    Google Scholar 

  67. Hsu, C.-C., Zhuang, Y.-X., Lee, C.-Y.: Deep fake image detection based on pairwise learning. Appl. Sci. 10, p. 370, January 2020

    Google Scholar 

  68. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730–3738 (2015)

    Google Scholar 

  69. Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection, arXiv preprint arXiv:1812.08685 (2018)

  70. Sanderson, C., Lovell, B.C.: Multi-region probabilistic histograms for robust and scalable identity inference. In: International Conference on Biometrics, pp. 199–208. Springer, (2009)

    Google Scholar 

  71. Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 3207–3216 (2020)

    Google Scholar 

  72. Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., Ferrer, C.C: The deepfake detection challenge dataset, arXiv preprint arXiv:2006.07397 (2020)

  73. Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nießner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1–11 (2019)

    Google Scholar 

  74. Fakeapp: https://www.malavida.com/en/soft/fakeapp/. Accessed 25 Jun 2020

  75. Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: On the detection of digital face manipulation. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5781–5790 (2020)

    Google Scholar 

  76. Neves, J.C.,. Tolosana, R., Vera-Rodriguez, R., Lopes, V., Proenca, H.P., Fierrez, J.:Ganprintr: improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J. Sel. Top. Signal Process. 14, 1038–1048 (2020)

    Google Scholar 

  77. Kietzmann, J., Lee, L.W., McCarthy, I.P., Kietzmann, T.C.: Deepfakes: trick or treat? Bus. Horiz. 63(2), 135–146 (2020)

    Article  Google Scholar 

  78. Zakharov, E., Shysheya, A., Burkov, E., Lempitsky, V.: Few-shot adversarial learning of realistic neural talking head models. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 9459–9468 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duygu Cakir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cakir, D., Aritürk, M., Yücel, Ö. (2021). An Overview of Fake Face Detection Approaches. In: Allahviranloo, T., Salahshour, S., Arica, N. (eds) Progress in Intelligent Decision Science. IDS 2020. Advances in Intelligent Systems and Computing, vol 1301. Springer, Cham. https://doi.org/10.1007/978-3-030-66501-2_16

Download citation

Publish with us

Policies and ethics