• Title/Summary/Keyword: Fake image

Search Result 58, Processing Time 0.026 seconds

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Comparative study of data augmentation methods for fake audio detection (음성위조 탐지에 있어서 데이터 증강 기법의 성능에 관한 비교 연구)

  • KwanYeol Park;Il-Youp Kwak
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • The data augmentation technique is effectively used to solve the problem of overfitting the model by allowing the training dataset to be viewed from various perspectives. In addition to image augmentation techniques such as rotation, cropping, horizontal flip, and vertical flip, occlusion-based data augmentation methods such as Cutmix and Cutout have been proposed. For models based on speech data, it is possible to use an occlusion-based data-based augmentation technique after converting a 1D speech signal into a 2D spectrogram. In particular, SpecAugment is an occlusion-based augmentation technique for speech spectrograms. In this study, we intend to compare and study data augmentation techniques that can be used in the problem of false-voice detection. Using data from the ASVspoof2017 and ASVspoof2019 competitions held to detect fake audio, a dataset applied with Cutout, Cutmix, and SpecAugment, an occlusion-based data augmentation method, was trained through an LCNN model. All three augmentation techniques, Cutout, Cutmix, and SpecAugment, generally improved the performance of the model. In ASVspoof2017, Cutmix, in ASVspoof2019 LA, Mixup, and in ASVspoof2019 PA, SpecAugment showed the best performance. In addition, increasing the number of masks for SpecAugment helps to improve performance. In conclusion, it is understood that the appropriate augmentation technique differs depending on the situation and data.

Multipath Ghosts in Through-the-Wall Radar Imaging: Challenges and Solutions

  • Abdalla, Abdi T.;Alkhodary, Mohammad T.;Muqaibel, Ali H.
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.376-388
    • /
    • 2018
  • In through-the-wall radar imaging (TWRI), the presence of front and side walls causes multipath propagation, which creates fake targets called multipath ghosts. They populate the scene and reduce the probability of correct target detection, classification, and localization. In modern TWRI, specular multipath exploitation has received considerable attention for reducing the effects of multipath ghosts. However, this exploitation is challenged by the requirements of the reflecting geometry, which is not always available. Currently, the demand for a high radar image resolution dictates the use of a large aperture and wide bandwidth. This results in a large amount of data. To tackle this problem, compressive sensing (CS) is applied to TWRI. With CS, only a fraction of the data are used to produce a high-quality image, provided that the scene is sparse. However, owing to multipath ghosts, the scene sparsity is highly deteriorated; hence, the performance of the CS algorithms is compromised. This paper presents and discusses the adverse effects of multipath ghosts in TWRI. It describes the physical formation of ghosts, their challenges, and existing suppression techniques.

The Study of Chanel in Coutume Jewelry (샤넬의 커스튬 주어리에 관한 연구)

  • 유송옥
    • Journal of the Korean Society of Costume
    • /
    • v.32
    • /
    • pp.45-56
    • /
    • 1997
  • The purpose of this study was to investigate the relationship between Chanel design and her Costume jewelry in 1920's-1930's through documentary studies. According to the study the result was as follows: 1. Chanel's esthetic in the field of Fashion Design bore the double stamp of "elegance" and 'simplicity' 2. Chanel changed the concept of costume jewelry. Chanel's great innovation was that she let 'fake' jewels always keep the intrinsic value of 'real' ones. 3. The simplicity of her perfectly tailored suit was Paradoxically overwhelmed by a fan-tastic array of jewels. The relationhship be-tween Chanel design and her costume jewelry was not able to be seperated. Chanel was a fashion leader fifty years ago and the name "Chanel" will be at the forefornt of fashon fifty years from now. The image of quality will always remain the same in the futures.

  • PDF

Segmentation of Mammography Breast Images using Automatic Segmen Adversarial Network with Unet Neural Networks

  • Suriya Priyadharsini.M;J.G.R Sathiaseelan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.151-160
    • /
    • 2023
  • Breast cancer is the most dangerous and deadly form of cancer. Initial detection of breast cancer can significantly improve treatment effectiveness. The second most common cancer among Indian women in rural areas. Early detection of symptoms and signs is the most important technique to effectively treat breast cancer, as it enhances the odds of receiving an earlier, more specialist care. As a result, it has the possible to significantly improve survival odds by delaying or entirely eliminating cancer. Mammography is a high-resolution radiography technique that is an important factor in avoiding and diagnosing cancer at an early stage. Automatic segmentation of the breast part using Mammography pictures can help reduce the area available for cancer search while also saving time and effort compared to manual segmentation. Autoencoder-like convolutional and deconvolutional neural networks (CN-DCNN) were utilised in previous studies to automatically segment the breast area in Mammography pictures. We present Automatic SegmenAN, a unique end-to-end adversarial neural network for the job of medical image segmentation, in this paper. Because image segmentation necessitates extensive, pixel-level labelling, a standard GAN's discriminator's single scalar real/fake output may be inefficient in providing steady and appropriate gradient feedback to the networks. Instead of utilising a fully convolutional neural network as the segmentor, we suggested a new adversarial critic network with a multi-scale L1 loss function to force the critic and segmentor to learn both global and local attributes that collect long- and short-range spatial relations among pixels. We demonstrate that an Automatic SegmenAN perspective is more up to date and reliable for segmentation tasks than the state-of-the-art U-net segmentation technique.

Comparative Evaluation of 18F-FDG Brain PET/CT AI Images Obtained Using Generative Adversarial Network (생성적 적대 신경망(Generative Adversarial Network)을 이용하여 획득한 18F-FDG Brain PET/CT 인공지능 영상의 비교평가)

  • Kim, Jong-Wan;Kim, Jung-Yul;Lim, Han-sang;Kim, Jae-sam
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.24 no.1
    • /
    • pp.15-19
    • /
    • 2020
  • Purpose Generative Adversarial Network(GAN) is one of deep learning technologies. This is a way to create a real fake image after learning the real image. In this study, after acquiring artificial intelligence images through GAN, We were compared and evaluated with real scan time images. We want to see if these technologies are potentially useful. Materials and Methods 30 patients who underwent 18F-FDG Brain PET/CT scanning at Severance Hospital, were acquired in 15-minute List mode and reconstructed into 1,2,3,4,5 and 15minute images, respectively. 25 out of 30 patients were used as learning images for learning of GAN and 5 patients used as verification images for confirming the learning model. The program was implemented using the Python and Tensorflow frameworks. After learning using the Pix2Pix model of GAN technology, this learning model generated artificial intelligence images. The artificial intelligence image generated in this way were evaluated as Mean Square Error(MSE), Peak Signal to Noise Ratio(PSNR), and Structural Similarity Index(SSIM) with real scan time image. Results The trained model was evaluated with the verification image. As a result, The 15-minute image created by the 5-minute image rather than 1-minute after the start of the scan showed a smaller MSE, and the PSNR and SSIM increased. Conclusion Through this study, it was confirmed that AI imaging technology is applicable. In the future, if these artificial intelligence imaging technologies are applied to nuclear medicine imaging, it will be possible to acquire images even with a short scan time, which can be expected to reduce artifacts caused by patient movement and increase the efficiency of the scanning room.

U.S. Consumers' Motivations for Purchasing and Not Purchasing Fashion Counterfeit Goods

  • Kim, Hye-Jeong;Latour, Brittany N.
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.11-27
    • /
    • 2012
  • This study explores U.S. consumers' perceptions about fashion counterfeit goods and counter feiting and motivations for purchasing and not purchasing those goods. A qualitative research technique utilizing self-administered essay questions was used to collect data. A convenience sample of female college students(N=128) drawn from classes at Midwestern and Southern universities in the U.S. participated in this study. This study found that a majority of consumers tended to perceive that fashion counterfeit goods are merely imitations of the legitimate goods and that counterfeiting is producing and selling fake goods, but a small number of consumers associated those goods with illegally produced goods and illegal practices or violations of intellectual property rights. The major motivations for purchasing counterfeit fashion goods were found to be price/value consciousness, appearance of counterfeit goods, status consumption, availability of the goods, desire for souvenirs, and social(family and peer) influences. In addition, the major deterrents to purchasing these goods were identified as integrity/ethical judgment, poor quality of counterfeit goods, self-image/status, and unavailability of the goods. This study provides policy makers and anti-counterfeit coalitions with information to develop effective educational programs or campaigns to influence consumers' counterfeit fashion purchasing behavior.

A Study on the Aesthetic Characteristics of Splatter Films' Make-up (스플레터 영화 분장의 미적 특성 연구)

  • Chang, Mee-Sook
    • Fashion & Textile Research Journal
    • /
    • v.10 no.6
    • /
    • pp.827-835
    • /
    • 2008
  • The purpose of this paper is to clarify the aesthetic characteristics of splatter films' make-up. Splatter films are one of horror movies that consist of gore and excessive violence. These represent the cruelty with the victims' physical damages made by special effect make-up. Splatter make-up is classified into the trickle of blood, the cutting of body, and the exposure of the inner parts of body, and changes a fake into a fact with reality. The aesthetic characteristics of splatter make-up were shown in the uncanny, the abjection and the irony. The uncanny which is strange and displeasure feeling is presented by the fragmentation of body, and the living of nonliving thing. The abjection means humble image, and the concept of border or ambiguity. The former is expressed by the matters of body's secretion and excretion. The latter is shown by the use of blood(the life and death) and corpses(the human and inhuman), and animatronics(the human and instruments). The irony which is a sense of humor caused by conflict between external appearance and reality. This is represented by comics induced by discord between excessive violence and make-up tricks, and the brutality and the weakness.

Detection of Needle in trimmings or meat offals using DCGAN (DCGAN을 이용한 잡육에서의 바늘 검출)

  • Jang, Won-Jae;Cha, Yun-Seok;Keum, Ye-Eun;Lee, Ye-Jin;Kim, Jeong-Do
    • Journal of Sensor Science and Technology
    • /
    • v.30 no.5
    • /
    • pp.300-308
    • /
    • 2021
  • Usually, during slaughter, the meat is divided into large chunks by part after deboning. The meat chunks are inspected for the presence of needles with an X-ray scanner. Although needles in the meat chunks are easily detectable, they can also be found in trimmings and meat offals, where meat skins, fat chunks, and pieces of meat from different parts get agglomerated. Detection of needles in trimmings and meat offals becomes challenging because of many needle-like patterns that are detected by the X-ray scanner. This problem can be solved by learning the trimmings or meat offals using deep learning. However, it is not easy to collect a large number of learning patterns in trimmings or meat offals. In this study, we demonstrate the use of deep convolutional generative adversarial network (DCGAN) to create fake images of trimmings or meat offals and train them using a convolution neural network (CNN).

Cascaded-Hop For DeepFake Videos Detection

  • Zhang, Dengyong;Wu, Pengjie;Li, Feng;Zhu, Wenjie;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1671-1686
    • /
    • 2022
  • Face manipulation tools represented by Deepfake have threatened the security of people's biological identity information. Particularly, manipulation tools with deep learning technology have brought great challenges to Deepfake detection. There are many solutions for Deepfake detection based on traditional machine learning and advanced deep learning. However, those solutions of detectors almost have problems of poor performance when evaluated on different quality datasets. In this paper, for the sake of making high-quality Deepfake datasets, we provide a preprocessing method based on the image pixel matrix feature to eliminate similar images and the residual channel attention network (RCAN) to resize the scale of images. Significantly, we also describe a Deepfake detector named Cascaded-Hop which is based on the PixelHop++ system and the successive subspace learning (SSL) model. By feeding the preprocessed datasets, Cascaded-Hop achieves a good classification result on different manipulation types and multiple quality datasets. According to the experiment on FaceForensics++ and Celeb-DF, the AUC (area under curve) results of our proposed methods are comparable to the state-of-the-art models.