Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Deepfake Video Traceability and Authentication via Source Attribution

View through CrossRef
In recent years, deepfake videos have emerged as a significant threat to societal and cybersecurity landscapes. Artificial intelligence (AI) techniques are used to create convincing deepfakes. The main counter method is deepfake detection. Currently, most of the mainstream detectors are based on deep neural networks. Such deep learning detection frameworks often face several problems that need to be addressed, for example, dependence on large‐annotated datasets, lack of interpretability, and limited attention to source traceability. Towards overcoming these limitations, in this paper, we propose a novel training‐free deepfake detection framework based on the interpretable inherent source attribution. The proposed framework not only distinguishes between real and fake videos but also traces their origins using camera fingerprints. Moreover, we have also constructed a new deepfake video dataset from 10 distinct camera devices. Experimental evaluations on multiple datasets show that the proposed method can attain high detection accuracies (ACCs) comparable to state‐of‐the‐art (SOTA) deep learning techniques and also has superior traceability capabilities. This framework provides a robust and efficient solution for deepfake video authentication and source attribution, thus, making it highly adaptable to real‐world scenarios.
Title: Deepfake Video Traceability and Authentication via Source Attribution
Description:
In recent years, deepfake videos have emerged as a significant threat to societal and cybersecurity landscapes.
Artificial intelligence (AI) techniques are used to create convincing deepfakes.
The main counter method is deepfake detection.
Currently, most of the mainstream detectors are based on deep neural networks.
Such deep learning detection frameworks often face several problems that need to be addressed, for example, dependence on large‐annotated datasets, lack of interpretability, and limited attention to source traceability.
Towards overcoming these limitations, in this paper, we propose a novel training‐free deepfake detection framework based on the interpretable inherent source attribution.
The proposed framework not only distinguishes between real and fake videos but also traces their origins using camera fingerprints.
Moreover, we have also constructed a new deepfake video dataset from 10 distinct camera devices.
Experimental evaluations on multiple datasets show that the proposed method can attain high detection accuracies (ACCs) comparable to state‐of‐the‐art (SOTA) deep learning techniques and also has superior traceability capabilities.
This framework provides a robust and efficient solution for deepfake video authentication and source attribution, thus, making it highly adaptable to real‐world scenarios.

Related Results

Evaluating the Threshold of Authenticity in Deepfake Audio and Its Implications Within Criminal Justice
Evaluating the Threshold of Authenticity in Deepfake Audio and Its Implications Within Criminal Justice
Deepfake technology has come a long way in recent years and the world has already seen cases where it has been used maliciously. After a deepfake of UK independent financial adviso...
How Frequency and Harmonic Profiling of a ‘Voice’ Can Inform Authentication of Deepfake Audio: An Efficiency Investigation
How Frequency and Harmonic Profiling of a ‘Voice’ Can Inform Authentication of Deepfake Audio: An Efficiency Investigation
As life in the digital era becomes more complex, the capacity for criminal activity within the digital realm becomes even more widespread. More recently, the development of deepfak...
Deepfake Detection with Choquet Fuzzy Integral
Deepfake Detection with Choquet Fuzzy Integral
Deep forgery has been spreading quite quickly in recent years and continues to develop. The development of deep forgery has been used in films. This development and spread have beg...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
A New Deepfake Detection Method Based on Compound Scaling Dual-Stream Attention Network
A New Deepfake Detection Method Based on Compound Scaling Dual-Stream Attention Network
INTRODUCTION: Deepfake technology allows for the overlaying of existing images or videos onto target images or videos. The misuse of this technology has led to increasing complexit...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection
Novel Convolutional Neural Networks based Jaya algorithm Approach for Accurate Deepfake Video Detection
Deepfake videos are becoming an increasing concern due to their potential to spread misinformation and cause harm. In this paper, we propose a novel approach for accurately detecti...

Back to Top