Generalized Deepfake Attribution
Abstract
The landscape of fake media creation changed with the introduction of Generative Adversarial Networks (s). Fake media creation has been on the rise with the rapid advances in generation technology, leading to new challenges in Detecting fake media. A fundamental characteristic of s is their sensitivity to parameter initialization, known as seeds. Each distinct seed utilized during training leads to the creation of unique model instances, resulting in divergent image outputs despite employing the same architecture. This means that even if we have one architecture, it can produce countless variations of models depending on the seed used. Existing methods for attributing deepfakes work well only if they have seen the specific model during training. If the architectures are retrained with a different seed, these methods struggle to attribute the fakes. This seed dependency issue made it difficult to attribute deepfakes with existing methods. We proposed a generalized deepfake attribution network (-) to attribute fake images to their respective architectures, even if they are generated from a retrained version of the architecture with a different seed (cross-seed) or from the fine-tuned version of the existing model. Extensive experiments on cross-seed and fine-tuned data of models show that our method is highly effective compared to existing methods. We have provided the source code to validate our results.
Keywords:
Model attribution, GAN fingerprints, Generative Adversarial Networks, Deep fake, Contrastive Learning1 Introduction
Deepfakes are fake media (images, videos, audio, .) generated using deep learning methods [14, 19]. Visual forensics has been confronted with several serious issues due to the development of deepfake technology. Deepfake leverages to generate realistic media capable of deceiving people, which prompts concerns about its potential for spreading misinformation and infringing on privacy rights [1, 5, 22]. Deepfake detection is the process of identifying manipulated media information, which is often accomplished by analyzing abnormalities or inconsistencies in the generated fake media. Various approaches have arisen to address the issue of deepfake, including traditional forensic procedures, machine learning algorithms, and deep neural networks [10, 29, 4, 11, 7, 23]. Even though efforts have been made to identify generated fake media, the process of discriminating between real and fake is just getting started. Along the same line, attributing fake media generated by Generative Adversarial Networks (s) is an important step in combating misinformation and identifying the architectures involved in the generation of fake media [16, 28, 27, 18, 24, 12, 8, 26, 6, 25]. is a type of deep learning model that has gained popularity for its capability to produce realistic images and videos that are often indistinguishable from real media. However, this capability also raises concerns regarding the proliferation of fake images and its potential societal impact. Law enforcement agencies face significant challenges in determining and validating the genuineness of any image. At the same time, it is also hard to train s as it demands substantial computational resources, data, and expertise from seasoned engineers, making it a high-value intellectual property. Therefore, trained s should be protected through patents, licensing, copyrights, and trademarks. This led to an increased interest in fingerprinting and attributing generative models (), where the generator or its output images are labeled based on its fingerprint. This field is still in its early stages and needs extensive investigation and resolution towards its maturity.
Attributing -generated images involves identifying the fingerprint or the pattern of a specific model in its generated image. This can be thought of as map** the ballistic fingerprint of a fired bullet to its gun. Previous research has mainly focused on two aspects for identifying the generated images: The first one involves embedding a unique fingerprint in the training data such that the generated image will contain the same fingerprint [16, 28, 27]. The second approach focuses on identifying the unique -patterns left behind by different architectures on generated images [18, 24, 12, 8, 26, 6, 11]. The first approach needs white box access to the s for training attribution networks. The second approach is more popular as fingerprints may include distinctive patterns in the generated images, such as artifacts, textures, or stylistic features, which can be indicative of the underlying model’s characteristics without needing access to the model.
In terms of practical implementation, prior research on attribution has solely addressed model-level attribution [18, 24, 12, 8, 26, 6, 11]. This means that both training and testing images are generated from a single model (a architecture trained with a specific seed), thereby limiting the attribution model’s ability to attribute fake images as it overfits with the training data of seen models and fails to attribute images generated from unseen models. Overfitting highlights the inability of the attribution network to extract architecture-dependent features. One can bypass this method by retraining or fine-tuning the generator for extra epochs, which will alter its fingerprint, making it a new/unseen generator model to the attribution network. Thus, there are an infinite number of unseen generator models possible that too for a given architecture. Therefore, model-level attribution becomes infeasible and impractical. This will also make it difficult to protect the intellectual property of architectures, as just retraining or fine-tuning the for a few extra epochs will lead to a new model. This motivated us to address the problem of fake image attribution in a broader context by attributing such images to the underlying architecture. In this paper, we introduce a novel approach utilizing the Generalized Deepfake Attribution Network (-).
Architecture-level attribution necessitates the attribution of fake images to the architectures of the models, irrespective of any modifications made to the models, such as retraining it with a new seed or fine-tuning it for certain extra epochs. Despite being more general in scope compared to model-level attribution, architecture-level attribution remains a formidable task. In the experiments, we observe that architecture will likely leave consistent architecture-dependent patterns in all its generated images. To highlight the traces of the architecture on the images, we have used supervised contrastive learning [15] and formed a Feature Extraction Network (), which, with the help of a classifier network, can successfully attribute the fake image to its corresponding architecture. To capture high-level content independent of architecture-level traces, we employed a denoising autoencoder. In summary, we make the following contributions:
-
•
We proposed a -, which aims to attribute fake images to their source architectures, irrespective of whether the models producing those images have been retrained with an alternative seed or fine-tuned for additional epochs.
-
•
We devise along with a denoising autoencoder to find the data-independent and architecture-dependent traces using supervised contrastive learning.
-
•
We conducted comprehensive evaluations of our attribution network on various s to demonstrate the accuracy and robustness of our approach in attribution.
2 Related Work
2.1 Deepfake Attribution
Many methods are proposed to tackle the increased use of deepfakes by differentiating real and fake images [10, 29, 3, 4, 11, 7, 23]. These methods solve one set of challenges, , identifying fake images. Deepfakes are used to perform various malicious activities like scamming, blackmailing, etc. Along with that, training and fine-tuning models to generate high-quality deepfakes need a lot of resources and domain knowledge. Hence, there is a high chance that deepfake creators use existing methods to generate fake data. Thus, the original fake creator can be backtracked successfully through an attribution network. Identifying the source of these deepfakes is a huge help for law enforcement agencies. This highlights the need to attribute the models responsible for generating deepfake, which will protect the generative model and restrict its misuse.
Existing Deepfake attribution methods can be classified into two categories. Methods used in the first category attribute fake images by retrieving the fingerprint from the fake images [16, 28, 27]. Generally, these fingerprints are inserted in the training dataset of the generative models while training. Thus, fingerprints from the generated image are extracted to find a particular generative model. The primary issue in this approach is the need for white box access to the generative model. Another issue is that attribution cannot be performed on pre-trained models where the training is not performed on fingerprint-embedded datasets, and retraining existing models to embed fingerprints is a time and resource-consuming procedure. Methods in the second category attribute fake images by finding unique patterns in the images generated by different models [18, 24, 12, 8, 26, 6, 25]. These methods do not require access to generative models and align with real-world scenarios. These methods are mainly based on statistical and deep learning methods. In statistical methods, the focus is finding residual noise in the generated image using the denoising filters [18] and performing frequency analysis by transforming the generated image using discrete cosine transform [8] and discrete Fourier transform [12]. The deep learning methods use different image transformation techniques, filters, residual images, and loss functions to find the subtle features, which are passed into a classifier for attribution. These methods can attribute s with high accuracy [24, 26, 25].
Still, almost all the approaches focus on performing attribution of seen models, , both training and testing data are generated from the same trained generative model. These methods fail to generalize if the testing data is generated from the retrained version of the generative model (cross-seed data and fine-tuned). The authors of [25] addressed this issue and proposed a Patchwise Contrastive Learning approach called -. In this work, they focused on patches of the images to identify the traces. As their model focuses on patch level, any change in test image size will result in drastic failure in attribution. Hence, the persistence of seed dependency poses a significant challenge in performing attribution. This issue arises due to the fact that infinite possible models can be generated by varying the seed. Consequently, this variability complicates the process of attributing -generated image to its origin. In this paper, we proposed a - to attribute fake images to their respective architecture, even if the fake images used in testing are generated from the retrained version of architecture with different seed or fine-tuned version of the architecture as shown in Fig 1.
2.2 Supervised Contrastive Learning
Supervised Contrastive Learning [15] is a technique through which a pair of data points belonging to the same class (positive samples) are drawn close together within the embedding space. In contrast, a pair of data points belonging to different classes (negative samples) are pushed farther apart as shown in Fig 2. Here, each sample (positive or negative) is passed through a convolutional neural network to extract high-level features. The features extracted by the neural network are used to compute supervised contrastive loss. Optimization of this loss function brings positive samples close together in the embedding space and negative samples far apart. The authors of [25] utilized supervised contrastive loss within their patch-wise contrastive learning technique, demonstrating enhanced results in fake attribution compared to their baseline approach. Similarly, in the work by the authors of [9], an unsupervised version of contrastive loss was employed to train their feature extraction network, leading to improved deepfake detection performance. Contrastive learning proves to be highly effective as it maintains the consistency of extracted features. Leveraging this technique, we trained our feature extraction model to obtain data-independent, seed-independent features corresponding to images generated from a specific architecture as shown in Fig 2. The supervised contrastive loss is calculated using the following equation:
(1) |
where be the index of an arbitrary augmented sample in a minibatch and A(i) , is the set of indices of all positives samples in the mini-batch distinct from , and its cardinality. The notations are used by referring [15].
3 Proposed Approach
3.1 Problem definition
The popularity of s has inspired the research community to use it in various applications. This has led to the development of diverse architectures with enhanced generation capabilities. architecture attribution can be formulated as a multi-class classification task, where the aim is to attribute each image to its source architecture or label it as real. Given an image with source , where , are different architectures. Our goal is to learn a map** .
3.2 Overview
The framework of - can be seen in Fig 3 and Fig 4. - contains two sub-networks: one is a Feature Extraction Network (), and the other is a multi-class classification network. Both networks are trained separately. First, the is trained to extract seed-independent features from fake images, which focus more on the architecture of the rather than the data generated by it. These features essentially represent the fingerprints of the architecture. Secondly, the class classification network is trained using the features obtained from the for final attribution. There are two different variations of used in our proposed approach.
3.2.1 Feature extraction network(FEN)
Using deep learning to perform multi-class classification is a well-known approach. The same approach can be followed in attribution, where the training set will contain the images generated from different s along with the real images. A regular deep learning-based classifier can be trained using this training data and attribution can be performed. This approach seems intuitive and can be used to address the problem of attribution. Although using a regular deep learning-based classifier will work to a certain extent, there is a drawback in training it using the generated images directly. The drawback is that the classifier learns the semantic features (low-level features) that are specific to the content of the image. This can impact the accuracy of the classifier due to the fact that different s can be trained to generate similar types of images. Thus, the classification based on semantic features will extract similar features from different generated images, which will result in low accuracy. The incorporation of solves this issue by extracting the semantic invariant features. The goal of is to extract features related to the architecture of the that are least dependent on the generated content. Essentially, FEN acts as a fingerprint identifier for the underlying architecture. We have proposed two different variations for the network, which are Vanilla- and Denoiser-.
3.2.2 Vanilla-:
The input to Vanilla- (Fig 3) is real () and fake image generated from different architectures. It outputs a -dimensional feature embedding that is again downscaled to -dimensional feature embedding using a deep neural network. The -dimensional feature embedding is called as classification head, which is used to train the classification network for attribution. The -dimensional feature embedding is called as projection head, which is used to calculate the supervised contrastive loss for training the . The idea behind using and training it using supervised contrastive loss is to get content-independent feature embeddings such that the similarity between these embeddings should be very high if the embeddings correspond to the same-seed or cross-seed images of the same architecture.
3.2.3 Denoiser-:
To enhance the capability of Vanilla- in extracting content-independent features, we have to reduce the semantic dependency arising by directly giving the image as an input to . Previous works [18, 8] have shown that high-level features are content-independent and can be used as a fingerprint of by extracting unique patterns using residual filers and frequency analysis. Motivated by the work of [8, 18], we have trained a denoising autoencoder on the real images. Once the denoising autoencoder is trained, a generic image , which can be a real or a generated image, is given as an input. The high-level content of is calculated as where represents the trained denoising autoencoder (). Now, we calculated the residual () for each image where represents absolute value. These residuals are semi-content dependent (unique for each input image), as shown in Fig 4. Hence, we can’t directly consider these residuals as fingerprints corresponding to a particular . To extract the hidden fingerprint from these residuals, is trained on these residuals using supervised contrastive loss. Unlike Vanilla-, instead of directly feeding the images as input to , the extracted residuals for all the images (real and generated images) are fed as input to of Denoiser-. Similar to Vanilla-, there is a projection head and a classification head in Denoiser-, which have and -dimensional feature embedding, respectively.
3.2.4 Multi-class classification network:
Our multi-class classification network is a deep neural network with fully connected layers. We trained this network using the -dimensional feature embeddings generated from the classification head of . This classification network makes the final attribution of the architecture. It is to be noted that we have trained different classifiers for Vanilla- and Denoiser-.
4 Experiments
4.1 Setup
In this section, we validate the effectiveness of - by conducting in-depth experiments. We performed all our experiments using the machine with - , , and two - s with each.
4.1.1 Dataset:
In the case of Vanilla- training data consists of real images from the [17] dataset and fake images generated from trained instances based on four different architectures ( [21], [2], [13] and [20]) trained on referred to as , , , , respectively. The classification network of Vanilla-, used to attribute features to respective architecture, is trained with the output of the classification head of Vanilla- (-dimensional feature embedding Fig 3). For Denoiser-, the denoising autoencoder is trained on the dataset. The of Denoiser- is trained with the residual images of real as well as fake images from four models of , , and . The classifier used to attribute features to respective architecture is trained with the output of the classification head of Denoiser- (-dimensional feature embedding Fig 4).
4.1.2 Model Architecture:
We considered the encoder network and the projection network used by [15] as our network for both Vanilla- and Denoiser-. The projection network is concatenated with the encoder network such that the output of the encoder network is input to the projection network. The classification network contains fully connected layers with ,,, and neurons in each layer, respectively, for both Vanilla- and Denoiser-. activation is used in the intermediate layers, and softmax is in the final layer. In the case of Denoiser-, the denoising autoencoder consists of encoder and decoder architecture based on a convolution neural network. The encoder, decoder contains , convolutional layers respectively excluding pooling and normalization layers.
4.1.3 Training Details:
We trained our , of both Vanilla- and Denoiser-, using supervised contrastive loss with optimizer (learning rate 0.003) and classifier network, attached to both Vanilla- and Denoiser-, using cross-entropy loss with optimizer (learning rate ). While the denoising autoencoder is trained using mean absolute error with optimizer (learning rate ). To generate fake images, we trained five instances corresponding to each of the four architectures using . We refer these instances as , where () is the architecture corresponding to which five instances () are trained with different seeds. Out of these five instances () for each architecture (), we generate images from four instances () for training and from the fifth instance () for testing our -. While training our -, we clubbed the generated images from four instances of each architecture and gave four labels based on architectures and one label for real images. The benefit of clubbing the images with different seeds of the same architecture during training is that we can get similar embeddings for images generated from a particular architecture, although trained with different seeds, as shown in Fig 5.
4.2 Results
Initially, we started our experiments with simple setups, with only two instances and of each architecture , (). We first trained a simple multiclass classifier with real images of and fake images from models. When we tested this classifier with fake images of , the same instance used to generate the training data, it gave a high accuracy of . However, when tested with the fake images from the second instance of the same architectures , the classifier accuracy drastically dropped (Second column of Table 1). The result shows that the training methodology and the complexity of architecture used for attribution are not sufficient to extract architecture-level features from -generated images. Subsequently, inspired by the work of [18, 8], we trained a denoising autoencoder on the dataset. Now we passed images generated from the two instances and of each architecture , () through denoising autoencoder and obtained their residuals (difference between input and output of denoising autoencoder). We used residuals from one instance () for training and the residuals from the second instance of the () for testing the multiclass classifier. We obtained slight improvement in test accuracy and macro score, but still, the model is incapable of extracting architecture-dependent traces.
|
|
|
|
|
|
|||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
96 | 97 | 96.5 | 100 | 100 | |||||||||||||||||
|
72 | 73.3 | 89 | 95.2 | 99.2 | |||||||||||||||||
|
0.68 | 0.73 | 0.88 | 0.95 | 0.99 |
To further improve our results on cross-seed data (training and testing data are generated from different instances of architectures), we took five instances of each architecture, where images from four out of the five instances along with real images are used for training, and the images from the fifth instances are used for testing. Residual images are generated from the test and training images using the denoising autoencoder as described above. The multi-class classifier is trained and tested with the residuals generated from the denoising autoencoder. Following this experimental setup gave us a significant improvement () in the test results compared to the previous experimental setup. The results of this setup motivated us to use data from multiple instances of architectures during training.
Subsequently, we incorporated a to build two variations of - which are Vanilla- (Fig 3) and Denoiser- (Fig 4). We trained both - variants using supervised contrastive loss. With the inclusion of , our model’s generalisation capability is increased, and it is perfectly attributing the cross-seed fake images and real images, as shown in the last two columns of Table 1. The results shows that Denoiser- is the most suitable setup for - and we finalysed Denoiser- variant as our final -. To observe the significance of data generated from multiple instances of architectures used in training, we trained our - with data generated from a single instance of architectures and tested with data generated from a new instance of architectures, we observed reduction in attribution performance. The comparative results are shown in Table 3 and the confusion matrices are shown in Fig 6.
4.2.1 Evaluation on cross-seed data:
We tested our - with cross-seed data (images generated from the fifth instance of architectures and unseen data). Our cross-seed data contains images generated fifth instance of all the architectures used in training the -. From the five instances of data, generated from different architectures, we took multiple combinations of instances to generate data for training and testing our -. We observed similar results on all these combinations. Authors of [15] performed testing only on cross-seed data of , while the training data for their model (-) is generated from , , , . To test the on cross-seed data of all the architectures used in training we trained the model using their experimental setup with our training and tested with our testing data. The test results are discussed in Section 4.3.
- |
|
|
||||
---|---|---|---|---|---|---|
DCGAN | 99.96 | 99.3 | ||||
SNGAN | 97.13 | 96.8 | ||||
WGAN | 99.55 | 98 |
- | Single-Seed | Multiple-Seed | ||
---|---|---|---|---|
|
100 | 100 | ||
|
77 | 99.2 | ||
|
0.76 | 0.99 |
4.2.2 Effect of fine-tuning
Whenever a architecture is fine-tuned for additional epochs, its generation capability will change, and the images generated by it for the same noise will be different. A robust attribution network should not be sensitive to fine-tuning models until the underlying architecture remains the same. To check whether this fine-tuning of the architectures affects the attribution capability of our attribution network (-), we did the following experiment. We fine-tuned architecture (, , ) instances with the training data for additional epochs and considered it as fine-tuned data. We tested our -, with the images generated from fine-tuned data and obtained satisfactory results as shown in Table 3. These results show the robustness of our - for fine-tuning architectures. We also tested the existing attribution methods with this fine-tuned data and the results are discussed in Section 4.3. Here, fine-tuning means taking a pre-trained model and resuming its training with the same training data, used in the initial training.
4.3 Comparision
We compared our - with existing deepfake attribution methods of [8], [26] and the method, - [25]. Except -, all other methods focused on attribution of seen models during training (both training and testing data generated from the same trained model). Authors of tested their model - with only cross-seed data of . To make a proper comparison, we trained the existing methods of , , and - with real images from dataset and fake images generated from , , , and following the same experimental setup used in these existing methods. The test results are shown in Table 4. From these results, it is clear that the existing attribution models performed well on closed-set data and gave satisfactory results on cross-seed data of and as shown in the second, third, and fifth columns of Table 4, respectively. Even though all the models perform satisfactorily on cross-seed data of and , a substantial drop in accuracy is observed for , , and - on the cross-seed data of and . We also tested the existing methods with the fine-tuned data. The accuracy of the existing methods dropped significantly (below %), as shown in the last column of Table 4. This implies that our method - outperforms the existing methods in architecture attribution under cross-seed as well as fine-tuning scenarios.
Method | Closed-Set |
|
|
|
|
|
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
LeveFreq | 99.50 | 83.50 | 15.78 | 38.56 | 76.45 | 33.38 | ||||||||||
AttNet | 98.88 | 89.44 | 17.83 | 14.69 | 92.46 | 47.50 | ||||||||||
DNA-Det | 100.00 | 95.05 | 05.26 | 69.14 | 94.12 | 78.01 | ||||||||||
- | 100.00 | 99.90 | 97.13 | 99.96 | 99.55 | 98.57 |
5 Conclusion
In this paper, we proposed a generalized deepfake attribution network (-) for attributing the generated images to its original architecture. The main goal of our method is to find the traces from the generated images that are architecture-specific. To achieve this goal, we have introduced a Feature extraction network that can extract architectural-level traces from the generated images using supervised contrastive learning. To further ensure that - focuses on the model architecture traces, we have added a denoising autoencoder such that will receive a feature map with the least content-dependent traces. To show the generalization of -, we have used four different s of , , and and show that our method can correctly attribute the generated images. We have also compared our method with the existing attribution networks to highlight the effectiveness of -.
References
- [1] Amezaga, N., Hajek, J.: Availability of voice deepfake technology and its impact for good and evil. In: Proceedings of the 23rd Annual Conference on Information Technology Education. pp. 23–28 (2022)
- [2] Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: International conference on machine learning. pp. 214–223. PMLR (2017)
- [3] Asnani, V., Yin, X., Hassner, T., Liu, X.: Reverse engineering of generative models: Inferring model hyperparameters from generated images. IEEE Transactions on Pattern Analysis and Machine Intelligence (2023)
- [4] Chai, L., Bau, D., Lim, S.N., Isola, P.: What makes fake images detectable? understanding properties that generalize. In: Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XXVI 16. pp. 103–120. Springer (2020)
- [5] Chauhan, A.: Deepfakes strike deep in gujarat too .. Times of India (2023), https://timesofindia.indiatimes.com/city/ahmedabad/deepfakes-strike-deep-in-gujarat-too/articleshow/105136316.cms
- [6] Ding, Y., Thakur, N., Li, B.: Does a gan leave distinct model-specific fingerprints. In: Proceedings of the BMVC (2021)
- [7] Durall, R., Keuper, M., Keuper, J.: Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. pp. 7890–7899 (2020)
- [8] Frank, J., Eisenhofer, T., Schönherr, L., Fischer, A., Kolossa, D., Holz, T.: Leveraging frequency analysis for deep fake image recognition. In: International conference on machine learning. pp. 3247–3258. PMLR (2020)
- [9] Fung, S., Lu, X., Zhang, C., Li, C.T.: Deepfakeucl: Deepfake detection via unsupervised contrastive learning. In: 2021 International Joint Conference on Neural Networks (IJCNN). pp. 1–8 (2021). https://doi.org/10.1109/IJCNN52387.2021.9534089
- [10] Guarnera, L., Giudice, O., Battiato, S.: Deepfake detection by analyzing convolutional traces. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops. pp. 666–667 (2020)
- [11] Jeon, H., Bang, Y., Kim, J., Woo, S.S.: T-gd: Transferable gan-generated images detection framework. arXiv preprint arXiv:2008.04115 (2020)
- [12] Joslin, M., Hao, S.: Attributing and detecting fake images generated by known gans. In: 2020 IEEE Security and Privacy Workshops (SPW). pp. 8–14. IEEE (2020)
- [13] Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)
- [14] Karras, T., Aittala, M., Laine, S., Härkönen, E., Hellsten, J., Lehtinen, J., Aila, T.: Alias-free generative adversarial networks. Advances in neural information processing systems 34, 852–863 (2021)
- [15] Khosla, P., Teterwak, P., Wang, C., Sarna, A., Tian, Y., Isola, P., Maschinot, A., Liu, C., Krishnan, D.: Supervised contrastive learning. Advances in neural information processing systems 33, 18661–18673 (2020)
- [16] Kim, C., Ren, Y., Yang, Y.: Decentralized attribution of generative models. arXiv preprint arXiv:2010.13974 (2020)
- [17] Liu, Z., Luo, P., Wang, X., Tang, X.: Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018), 11 (2018)
- [18] Marra, F., Gragnaniello, D., Verdoliva, L., Poggi, G.: Do gans leave artificial fingerprints? In: 2019 IEEE conference on multimedia information processing and retrieval (MIPR). pp. 506–511. IEEE (2019)
- [19] Mirsky, Y., Lee, W.: The creation and detection of deepfakes: A survey. ACM computing surveys (CSUR) 54(1), 1–41 (2021)
- [20] Miyato, T., Kataoka, T., Koyama, M., Yoshida, Y.: Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957 (2018)
- [21] Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)
- [22] Sjouwerman, S.: Deepfake phishing: The dangerous new face of cybercrime. Forbes (2024), https://www.forbes.com/sites/forbestechcouncil/2024/01/23/deepfake-phishing-the-dangerous-new-face-of-cybercrime/?sh=59f64e1f4aed
- [23] Wang, S.Y., Wang, O., Zhang, R., Owens, A., Efros, A.A.: Cnn-generated images are surprisingly easy to spot… for now. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. pp. 8695–8704 (2020)
- [24] Xuan, X., Peng, B., Wang, W., Dong, J.: Scalable fine-grained generated image classification based on deep metric learning. arXiv preprint arXiv:1912.11082 (2019)
- [25] Yang, T., Huang, Z., Cao, J., Li, L., Li, X.: Deepfake network architecture attribution. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol. 36, pp. 4662–4670 (2022)
- [26] Yu, N., Davis, L.S., Fritz, M.: Attributing fake images to gans: Learning and analyzing gan fingerprints. In: Proceedings of the IEEE/CVF international conference on computer vision. pp. 7556–7566 (2019)
- [27] Yu, N., Skripniuk, V., Abdelnabi, S., Fritz, M.: Artificial fingerprinting for generative models: Rooting deepfake attribution in training data. In: Proceedings of the IEEE/CVF International conference on computer vision. pp. 14448–14457 (2021)
- [28] Yu, N., Skripniuk, V., Chen, D., Davis, L., Fritz, M.: Responsible disclosure of generative models using scalable fingerprinting. arXiv preprint arXiv:2012.08726 (2020)
- [29] Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. pp. 2185–2194 (2021)