The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information *** enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover *** this paper,a novel encrypted communication scheme for image SWE is *** reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer *** employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be *** receiver can restore the secretmessage fromthe received image using only the list header position *** scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover *** boasts high concealment and security,along with a complete message restoration rate,making it resistant to ***,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of *** validate the proposed framework,practical tests and comparisons are conducted using multiple *** results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
The accurate identification of students in need is crucial for governments and colleges to allocate resources more effectively and enhance social equity and educational fairness. Existing approaches to identifying stu...
详细信息
Cloud computing is a technology that allows the utilisation of a vast network of computers that are distributed and run in parallel with one another. The management of the multimedia files presents challenges and the ...
详细信息
The deaf and mute population has difficulty conveying their thoughts and ideas to others. Sign language is their most expressive mode of communication, but the general public is callow of sign language;therefore, the ...
详细信息
Edge learning (EL) is an end-to-edge collaborative learning paradigm enabling devices to participate in model training and data analysis, opening countless opportunities for edge intelligence. As a promising EL framew...
详细信息
Materials datasets usually contain many redundant(highly similar)materials due to the tinkering approach historically used in material *** redundancy skews the performance evaluation of machine learning(ML)models when...
详细信息
Materials datasets usually contain many redundant(highly similar)materials due to the tinkering approach historically used in material *** redundancy skews the performance evaluation of machine learning(ML)models when using random splitting,leading to overestimated predictive performance and poor performance on out-of-distribution *** issue is well-known in bioinformatics for protein function prediction,where tools like CD-HIT are used to reduce redundancy by ensuring sequence similarity among samples greater than a given *** this paper,we survey the overestimated ML performance in materials science for material property prediction and propose MD-HIT,a redundancy reduction algorithm for material *** MD-HIT to composition-and structure-based formation energy and band gap prediction problems,we demonstrate that with redundancy control,the prediction performances of the ML models on test sets tend to have relatively lower performance compared to the model with high redundancy,but better reflect models’true prediction capability.
Dynamic flexible job shop scheduling is an important combinatorial optimization problem that has rich real-world applications such as product processing in manufacturing. Genetic programming has been successfully used...
详细信息
Diffusion tensor imaging (DTI) is a neuroimaging approach that lets in for the visualization and quantification of the structural integrity of white depend fibers in the brain. In latest years, DTI has come to be an e...
详细信息
Quasi-Affine Transformation Evolutionary (QUATRE) algorithm is a kind of swarm-based collaborative optimization algorithm that solves the problem of a position deviation in a DE search by using the co-evolution matrix...
详细信息
暂无评论