A destructive active defense algorithm for deepfake face images

View article
PeerJ Computer Science

Main article text

 

Background

Introduction

Algorithm Design

Strategies for adversarial samples generation and fine-tuning

Algorithm for generating adversarial examples

Algorithm for fine-tuning against adversarial examples

Strategies to improve the offensiveness of adversarial examples

Stronger perturbation strategy

Adjust perturbation intensity

Experiments

Models, datasets and parameters

  1. Compute gradient grapara for each parameter para.

  2. Calculate the first-order moment estimate mean ¯est1 of the gradient, as shown in Eq. (15): ¯est1=α1¯est1+(1α1)grapara. Among them, α1 is used to control the exponential decay rate of the first-order moment estimate, which is set to 0.9 in the experiments.

  3. Calculate the second-order moment estimation variance σ of the gradient, as shown in Eq. (16): σ=α2σ+(1σ)gra2para. Among them, alpha2 is used to control the exponential decay rate of the second-order moment estimation, which is set to 0.99 in the experiments.

  4. Perform bias correction on the first-order moment estimate and the second-order moment estimate, as shown in Eq. (17): cor¯est1=est11αi1,corσ=σ1αi2. Among them, i represents the current iteration number.

  5. Update parameters based on first-order moment estimation and second-order moment estimation, as shown in Eq. (18): para=paraγcor¯est1corσ+τ. Among them, γ represents the learning rate, and τ is used to stabilize the value. In the experiments, it is set to 1e − 6.

Measurement methods for experimental results

Results

Validity verification

Comparative experiments

Verification experiments

Conclusion

Additional Information and Declarations

Competing Interests

The authors declare there are no competing interests.

Author Contributions

Yang Yang conceived and designed the experiments, performed the experiments, analyzed the data, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.

Norisma Binti Idris analyzed the data, prepared figures and/or tables, and approved the final draft.

Chang Liu conceived and designed the experiments, performed the experiments, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.

Hui Wu performed the experiments, analyzed the data, authored or reviewed drafts of the article, and approved the final draft.

Dingguo Yu conceived and designed the experiments, analyzed the data, performed the computation work, authored or reviewed drafts of the article, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

The CASIA-FaceV5 dataset is available from the Institute of Automation Chinese Academy of Sciences at: http://english.ia.cas.cn/db/201610/t20161026_169405.html, and at FigShare: Yang, Yang (2024). CASIA-FaceV5.zip. figshare. Dataset. https://doi.org/10.6084/m9.figshare.26509591.v1.

The CelebA large-scale face dataset is available at: https://mmlab.ie.cuhk.edu.hk/projects/CelebA.html

The code (original code (DADFI) & 3rd party models (StarGAN, StarGAN-v2 and ST GAN-SAC)) are available at Zenodo:Yang. (2024). A-destructive-active-defense-algorithm-for-deepfake-face-images [Data set]. Zenodo. https://doi.org/10.5281/zenodo.13283088.

Funding

This research was funded by the National Social Science Fund of China (grant no. 22BSH025), the National Natural Science Foundation of China (grant no. 62206241) and the Key Research and Development Program of Zhejiang Province, China (grant no. 2021C03138), the Medium and Long-Term Science and Technology Plan for Radio, Television, and Online Audiovisuals (grant no. 2022AD0400). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

646 Visitors 538 Views 61 Downloads

Your institution may have Open Access funds available for qualifying authors. See if you qualify

Publish for free

Comment on Articles or Preprints and we'll waive your author fee
Learn more

Five new journals in Chemistry

Free to publish • Peer-reviewed • From PeerJ
Find out more