Deepfake Network Architecture Attribution

نویسندگان

چکیده

With the rapid progress of generation technology, it has become necessary to attribute origin fake images. Existing works on image attribution perform multi-class classification several Generative Adversarial Network (GAN) models and obtain high accuracies. While encouraging, these are restricted model-level attribution, only capable handling images generated by seen with a specific seed, loss dataset, which is limited in real-world scenarios when may be privately trained models. This motivates us ask whether possible source models' architectures even if they finetuned or retrained under different configurations. In this work, we present first study Deepfake Architecture Attribution architecture-level. Based an observation that GAN architecture likely leave globally consistent fingerprints while traces left model weights vary regions, provide simple yet effective solution named DNA-Det for problem. Extensive experiments multiple cross-test setups large-scale dataset demonstrate effectiveness DNA-Det.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Architecture for Attack Attribution

Anonymity is important to perpetrators of network-based attacks. One of the simplest ways to remain anonymous is to hide the source of an attack by chaining together multiple connections into an extended connection. This is typically done by logging into a remote host, then from there logging into a third and fourth and so on until, at the final host, an attack is launched. These intermediate h...

متن کامل

Architecture in Transition Era toward Network Society

Technology affected human life in many ways in different eras of mankind history. Today, the information and telecommunication technology has revolutionized basic structures of human life. Changes are from the whole to the parts and vice versa, which include family and society too. Family lost its former structure in the information age and differentiated from patriarchy family. Societies have ...

متن کامل

Kaleido: Network Traffic Attribution using Multifaceted Footprinting

Network traffic attribution, namely, inferring users responsible for activities observed on network interfaces, is one fundamental yet challenging task in network security forensics. Compared with other user-system interaction records, network traces are inherently coarsegrained, context-sensitive, and detached from user ends. This paper presents Kaleido, a new network traffic attribution tool ...

متن کامل

Authorship Attribution Using Word Network Features

In this paper, we explore a set of novel features for authorship attribution of documents. These features are derived from a word network representation of natural language text. As has been noted in previous studies, natural language tends to show complex network structure at word level, with low degrees of separation and scale-free (power law) degree distribution. There has also been work on ...

متن کامل

architecture in transition era toward network society

technology affected human life in many ways in different eras of mankind history. today, the information and telecommunication technology has revolutionized basic structures of human life. changes are from the whole to the parts and vice versa, which include family and society too. family lost its former structure in the information age and differentiated from patriarchy family. societies have ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... AAAI Conference on Artificial Intelligence

سال: 2022

ISSN: ['2159-5399', '2374-3468']

DOI: https://doi.org/10.1609/aaai.v36i4.20391