4.6 Review

Deepfake Detection: A Systematic Literature Review

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Dynamic Closest Color Warping to Sort and Compare Palettes

Suzi Kim et al.

Summary: This paper introduces a method for evaluating the similarity between color palettes by sorting colors, termed dynamic closest color warping (DCCW). Experimental results demonstrate that DCCW outperforms previous methods in terms of accuracy and computing time, with the effectiveness of the proposed sorting technique validated through a perceptual study.

ACM TRANSACTIONS ON GRAPHICS (2021)

Letter Hospitality, Leisure, Sport & Tourism

Deepfake: a social construction of technology perspective

Andrei O. J. Kwok et al.

Summary: The emergence of deepfake videos as a new form of media manipulation has raised concerns due to its malicious use for fraud and misrepresentation. More research is needed to understand the Generative Adversarial Networks behind deepfake technology. There is a call for exploring the potential beneficial applications of deepfake technology despite existing skepticism.

CURRENT ISSUES IN TOURISM (2021)

Article Chemistry, Multidisciplinary

Deep Fake Image Detection Based on Pairwise Learning

Chih-Chung Hsu et al.

APPLIED SCIENCES-BASEL (2020)

Review Medicine, Legal

Recent advances in digital image manipulation detection techniques: A brief review

Rahul Thakur et al.

FORENSIC SCIENCE INTERNATIONAL (2020)

Article Engineering, Electrical & Electronic

Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection

Akash Chintha et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2020)

Article Engineering, Electrical & Electronic

Media Forensics and DeepFakes: An Overview

Luisa Verdoliva

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2020)

Article Computer Science, Artificial Intelligence

Deepfakes and beyond: A Survey of face manipulation and fake detection

Ruben Tolosana et al.

INFORMATION FUSION (2020)

Proceedings Paper Computer Science, Information Systems

Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN)

Xurong Li et al.

WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020 (2020)

Proceedings Paper Computer Science, Theory & Methods

Digital Forensics and Analysis of Deepfake Videos

Mousa Tayseer Jafar et al.

2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) (2020)

Proceedings Paper Computer Science, Information Systems

Training Strategies and Data Augmentations in CNN-based DeepFake Video Detection

Luca Bondi et al.

2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Adversarial Perturbations Fool Deepfake Detectors

Apurva Gandhi et al.

2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2020)

Proceedings Paper Computer Science, Information Systems

DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection

Md Shohel Rana et al.

2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020) (2020)

Article Computer Science, Information Systems

Swapped face detection using deep learning and subjective assessment

Xinyi Ding et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2020)

Review Computer Science, Information Systems

A Systematic Literature Review of Android Malware Detection Using Static Analysis

Ya Pan et al.

IEEE ACCESS (2020)

Article Business

Deepfakes: Trick or treat?

Jan Kietzmann et al.

BUSINESS HORIZONS (2020)

Article Computer Science, Information Systems

Fighting Deepfake by Exposing the Convolutional Traces on Images

Luca Guarnera et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

Jawadul H. Bappy et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)

Article Computer Science, Artificial Intelligence

Face image manipulation detection based on a convolutional neural network

L. Minh Dang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Predicting Heart Rate Variations of Deepfake Videos using Neural ODE

Steven Fernandes et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW) (2019)

Proceedings Paper Computer Science, Information Systems

Poster: Towards Robust Open-World Detection of Deepfakes

Saniat Javid Sohrawardi et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Article Computer Science, Information Systems

Combating Deepfake Videos Using Blockchain and Smart Contracts

Haya R. Hasan et al.

IEEE ACCESS (2019)

Review Management

The Emergence of Deepfake Technology: A Review

Mika Westerlund

TECHNOLOGY INNOVATION MANAGEMENT REVIEW (2019)

Review Computer Science, Information Systems

Static analysis of android apps: A systematic literature review

Li Li et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Article Computer Science, Software Engineering

Synthesizing Obama: Learning Lip Sync from Audio

Supasorn Suwajanakorn et al.

ACM TRANSACTIONS ON GRAPHICS (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Densely Connected Convolutional Networks

Gao Huang et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Xception: Deep Learning with Depthwise Separable Convolutions

Francois Chollet

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Article Computer Science, Software Engineering

Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact

HS Do et al.

EMPIRICAL SOFTWARE ENGINEERING (2005)

Article Computer Science, Information Systems

Authentication theory and hypothesis testing

UM Maurer

IEEE TRANSACTIONS ON INFORMATION THEORY (2000)