Proactively enhancing detection methods and improving deepfake datasets

0
102
Proactively enhancing detection methods and improving deepfake datasets


Illustrative instances of distinct face manipulations: the first row features original samples while the second row presents manipulated counterparts created using mobile apps like FaceApp. Credit: Forensic Sciences (2024). DOI: 10.3390/forensicsci4030021

A new study from SUNY Polytechnic Institute provides a detailed overview of deepfake datasets and identifies key challenges, offering valuable insights for researchers, engineers, and practitioners. It emphasizes the importance of developing proactive detection methods and improving existing datasets to combat deepfake threats effectively.

This work is crucial for maintaining digital information integrity and aiding forensic investigations against sophisticated threats. The research is published in the journal Forensic Sciences.

The study was led by SUNY Polytechnic Institute Assistant Professor of Network and Computer Security: Cybersecurity Dr. Zahid Akhtar and graduate students Thanvi Lahari Pendyala, and Virinchi Sai Athmakuri.

Their paper categorizes deepfakes into identity swap, face reenactment, attribute manipulation, and entire face synthesis, emphasizing the need for improved datasets and robust detection methods.

Existing frameworks struggle with and are prone to adversarial attacks, necessitating advancements in detection technologies. The authors suggest future research should focus on creating comprehensive datasets and enhancing detection methods’ accuracy, robustness, and real-time capabilities.

More information:
Zahid Akhtar et al, Video and Audio Deepfake Datasets and Open Issues in Deepfake Technology: Being Ahead of the Curve, Forensic Sciences (2024). DOI: 10.3390/forensicsci4030021

Citation:
Proactively enhancing detection methods and improving deepfake datasets (2024, July 29)
retrieved 29 July 2024
from https://techxplore.com/news/2024-07-proactively-methods-deepfake-datasets.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here