Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (4): 1-15.doi: 10.11959/j.issn.2096-109x.2023049

• Comprehensive Review •    

Survey on adversarial attacks and defense of face forgery and detection

Shiyu HUANG1, Feng YE1,2, Tianqiang HUANG1,2, Wei LI1, Liqing HUANG1,2, Haifeng LUO1,2   

  1. 1 College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China
    2 Digital Fujian Institute of Big Data Security Technology, Fuzhou 350117, China
  • Revised:2023-05-30 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Natural Science Foundation of China(62072106);The Natural Science Foundation of Fujian Province(2020J01168)

Abstract:

Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it is crucial to develop effective detection methods to identify fake videos.In recent years, deep learning technology has made the task of face forgery and detection more accessible.Deep learning-based face forgery methods can generate highly realistic faces, while deep learning-based fake face detection methods demonstrate higher accuracy compared to traditional approaches.However, it has been shown that deep learning models are vulnerable to adversarial examples, which can lead to a degradation in performance.Consequently, games involving adversarial examples have emerged in the field of face forgery and detection, adding complexity to the original task.Both fakers and detectors now need to consider the adversarial security aspect of their methods.The combination of deep learning methods and adversarial examples is thus the future trend in this research field, particularly with a focus on adversarial attack and defense in face forgery and detection.The concept of face forgery and detection and the current mainstream methods were introduced.Classic adversarial attack and defense methods were reviewed.The application of adversarial attack and defense methods in face forgery and detection was described, and the current research trends were analyzed.Moreover, the challenges of adversarial attack and defense for face forgery and detection were summarized, and future development directions were discussed.

Key words: deepfake, fake face detection, adversarial example, social media forensics

CLC Number: 

No Suggested Reading articles found!