2
Most read
3
Most read
6
Most read
DeepFake Detection: The Importance of Training Data
Preprocessing and Practical Considerations
Dr. Symeon (Akis) Papadopoulos – @sympap
MeVer Team @ Information Technologies Institute (ITI) /
Centre for Research & Technology Hellas (CERTH)
Joint work with Polychronis Charitidis, George Kordopatis-Zilos and
Yiannis Kompatsiaris
AI4Media Workshop on GANs for Media Content Generation, Oct 1, 2020
Media Verification
(MeVer)
DeepFakes
• Content, generated by AI, that seems
authentic to human eye
• Most common form: generation and
manipulation of human face
Source: https://en.wikipedia.org/wiki/Deepfake
Source: https://www.youtube.com/watch?v=iHv6Q9ychnA
Source: Media Forensics and DeepFakes: an overview
Manipulation types
Facial manipulations can
be categorised in four
main different groups:
• Entire face synthesis
• Attribute manipulation
• Identity swap
• Expression swap
Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake
Detection (Tolosana et al., 2020)
Tolosana, R., et al. (2020). Deepfakes and beyond:
A survey of face manipulation and fake
detection. arXiv preprint arXiv:2001.00179.
Verdoliva, L. (2020). Media forensics and deepfakes:
an overview. arXiv preprint arXiv:2001.06564.
Mirsky, Y., & Lee, W. (2020). The Creation and
Detection of Deepfakes: A Survey. arXiv preprint
arXiv:2004.11138.
WeVerify Project
• WeVerify aims at detecting disinformation in social media and expose
misleading and fabricated content
• Partners: Univ. Sheffield, OntoText, ATC, DW, AFP, EU DisinfoLab, CERTH
• A key outcome is a platform for collaborative content verification,
tracking, and debunking
• Currently, we are developing a deepfake detection service for the
WeVerify platform
• Participation in DeepFake Detection Challenge
https://weverify.eu/
DeepFake Detection Challenge
• Goal: detect videos with facial or voice manipulations
• 2,114 teams participated in the challenge
• Log Loss error evaluation on public and private validation sets
• Public evaluation contained videos with similar transformations as the
training set
• Private evaluation contained organic videos and videos with unknown
transformations from the Internet
• Our final standings:
• public leaderboard: 49 (top 3%) with 0.295 Log Loss error
• private leaderboard: 115 (top 5%) with 0.515 Log Loss error
Source: https://www.kaggle.com/c/deepfake-detection-challenge
DeepFake Detection Challenge - dataset
• Dataset of more than 110k videos
• Approx. 20k REAL and the rest are FAKE
• FAKE videos generated from the REAL
• Models used:
• DeepFake AutoEncoder (DFAE)
• Morphable Mask faceswap (MM/NN)
• Neural Talking Heads (NTH)
• FSGAN
• StyleGAN
Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang,
M., & Ferrer, C. C. (2020). The DeepFake Detection Challenge
Dataset. arXiv preprint arXiv:2006.07397.
Dataset preprocessing - Issues
• Face dataset quality depends on face extraction accuracy (Dlib,
mtcnn, facenet-pytorch, Blazeface)
• Generally all face extraction libraries generate a number of false
positive detections
• Manual tuning can improve the quality of the generated dataset
Deep learning
model
Face
extraction
Frame
extraction
Video
corpus
Noisy data creeping in the training set
• Extracting faces with 1 fps from Kaggle DeepFake Detection Challenge dataset
videos using pytorch implementation of MTCNN face detection
• Observation: False detections are less compared to true detections in a video
Our “noise” filtering approach
• Compute face embeddings for each detected face in video
• Similarity calculation between all face embeddings in a video → similarity graph construction
• Nodes represent faces and two faces are connected if their similarities are greater than 0.8 (solid lines)
• Drop components smaller than N/2 (e.g. component 2)
• N is the number of frames that contain face detections (true or false).
Advantages
• Simple and fast procedure
• No need for manual tuning of the face extraction settings
• Clusters of distinct faces in cases of multiple persons in the video
• This information can be utilized in various ways (e.g. predictions per face)
Faces extracted from multiple video frames
Component 1
Component 2
Experiments
• We trained multiple DeepFake detection models on the DFDC dataset
with and without (baseline) our proposed approach
• Three datasets: a) Celeb-DF, b) FaceForensics++, c) DFDC subset
• For evaluation we examined two aggregation approaches
• avg: prediction is the average of all face predictions
• face: prediction is the max prediction among different avg face predictions
• Results for the EfficientNet-B4 model in terms of Log loss error:
Pre-
processing
CelebDF FaceForensics++ DFDC
avg face avg face avg face
baseline 0,510 0,511 0,563 0,563 0,213 0,198
proposed 0,458 0,456 0,497 0,496 0,195 0,173
Our DFDC Approach - details
• Applied proposed preprocessing approach to clean the generated face dataset
• Face augmentation:
• Horizontal & vertical flip, random crop, rotation, image compression, Gaussian & motion
blurring, brightness, saturation & contrast transformation
• Trained three different models: a) EfficientNet-B3, b) EfficientNet-B4, c) I3D*
• Models trained on face level:
• I3d trained with 10 consecutive face images exploiting temporal information.
• EfficientNet models trained on single face images
• Per model:
• Added two dense layers with dropout after the backbone architecture with 256 and 1 units
• Used the sigmoid activation for the last layer
* ignoring the optical flow stream
Our DFDC approach – inference
pre-processing model inference post-processing
Lessons from other DFDC teams
• Most approaches ensemble multiple EfficientNet architectures (B3-B7) and
some of them were trained on different seeds
• ResNeXT was another architecture used by a top-performing solutions
combined with 3D architectures such as I3D, 3D ResNet34, MC3 & R2+1D
• Several approaches increased the margin of the detected facial bounding
box to further improve results.
• We used an additional margin of 20% but other works proposed a higher proportion.
• To improve generalization:
• Domain-specific augmentations: a) half face removal horizontally or vertically, b)
landmark (eyes, nose, or mouth) removal
• Mixup augmentations
Practical challenges
• Limited generalization
• This observation applies to most submissions. The winning team scored
0.20336 in public validation and only 0.42798 in the private (Log Loss)
• Overfitting
• The best submission in the public leaderboard scored 0.19207 but in the
private evaluation the error was 0.57468, leading to the 904-th position!
• Broad problem scope
• The term DeepFake may refer to every possible manipulation and generation
• Constantly increasing manipulation and generation techniques
• A detector is only trained with a subset of these manipulations
DeepFake Detection in the Wild
• Videos in the wild usually contain multiple scenes
• Only a subset of these scenes may contain DeepFakes
• Detection process might be slow for multi-shot videos (even short ones)
• Low quality videos
• Low quality faces tend to fool classifiers
• Small detected and fast-moving faces
• Usually lead to noisy predictions
• Changes in the environment
• Moving obstacles in front of the faces
• Changes in lighting
DeepFake Detection Service @ WeVerify
https://www.youtube.com/watch?v=cVljNV
V5VPw&ab_channel=TheFakening
More details at TTO 2020
Charitidis, P., Kordopatis-Zilos, G., Papadopoulos, S., & Kompatsiaris, Y.
(2020). Investigating the impact of preprocessing and prediction
aggregation on the DeepFake detection task. Proceedings of the
Conference for Truth and Trust Online (TTO) [to appear],
https://arxiv.org/abs/2006.07084
https://truthandtrustonline.com/
Thank you!
Dr. Symeon Papadopoulos
papadop@iti.gr
@sympap
Media Verification (MeVer)
https://mever.iti.gr/
@meverteam https://ai4media.eu/
https://weverify.eu/

More Related Content

PPTX
Deepfake.pptx
PPTX
Deepfakes: Trick or Treat?
PDF
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
PPTX
DeepFake: Trick or Treat
PPTX
Common health problems in winters
PPTX
MINI PROJECT 2023 deepfake detection.pptx
PDF
Deepfakes - How they work and what it means for the future
PPT
Deepfake - Do Our Eyes Deceive Us
Deepfake.pptx
Deepfakes: Trick or Treat?
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake: Trick or Treat
Common health problems in winters
MINI PROJECT 2023 deepfake detection.pptx
Deepfakes - How they work and what it means for the future
Deepfake - Do Our Eyes Deceive Us

What's hot (20)

PDF
Deepfakes: An Emerging Internet Threat and their Detection
PDF
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
PPTX
Deep fakes and beyond
PPT
Face Detection and Recognition System
PDF
EMOTION DETECTION USING AI
PPSX
Face recognition technology - BEST PPT
PPTX
Deep Fakes Artificial Intelligence.pptx
PPTX
Deep fake
PDF
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
PPTX
Face recognisation system
PPTX
DeepFake_Seminar.pptx
PPTX
Deep fake
PPT
Face recognition ppt
PPTX
Face recognition
PPTX
Deep Learning Explained
PPTX
Face recognigion system ppt
PPTX
What is Deep Learning?
PPTX
Detection and recognition of face using neural network
PPTX
Deep learning
PPTX
Face recognition using artificial neural network
Deepfakes: An Emerging Internet Threat and their Detection
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
Deep fakes and beyond
Face Detection and Recognition System
EMOTION DETECTION USING AI
Face recognition technology - BEST PPT
Deep Fakes Artificial Intelligence.pptx
Deep fake
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
Face recognisation system
DeepFake_Seminar.pptx
Deep fake
Face recognition ppt
Face recognition
Deep Learning Explained
Face recognigion system ppt
What is Deep Learning?
Detection and recognition of face using neural network
Deep learning
Face recognition using artificial neural network
Ad

Similar to Deepfake detection (20)

PPTX
t.pptx is a ppt for DDS and software applications
PPTX
Face Recognition System for Door Unlocking
PPTX
vignesh ppt-1 is a ppt for DDS hardware and software
PPTX
Face detection and recognition
PPTX
presentation.pptxpresentation.pptxpresentation.pptx
PPTX
Biometric Recognition using Deep Learning
PPTX
VOGIN-IP-lezing-Zeno_ geradts
PDF
A guide to Face Detection in Python.pdf
PPTX
Deepfake-Detection-Using-Deep-Learning.pptx
DOCX
DEEP FAKE IMAGES AND VIDEOS DETECTION USING DEEP LEARNING TECHNIQUES.docx
PPTX
SYNOPSIS on face recognition attendance system software
PPTX
Automated_attendance_system_project.pptx
PPTX
Deep learning on face recognition (use case, development and risk)
PPTX
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
PDF
Technical Workshop - Win32/Georbot Analysis
PDF
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
PDF
Attendance System using Facial Recognition
DOCX
Human Face Identification
PDF
Presentation of the InVID verification technologies at IPTC 2018
PDF
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
t.pptx is a ppt for DDS and software applications
Face Recognition System for Door Unlocking
vignesh ppt-1 is a ppt for DDS hardware and software
Face detection and recognition
presentation.pptxpresentation.pptxpresentation.pptx
Biometric Recognition using Deep Learning
VOGIN-IP-lezing-Zeno_ geradts
A guide to Face Detection in Python.pdf
Deepfake-Detection-Using-Deep-Learning.pptx
DEEP FAKE IMAGES AND VIDEOS DETECTION USING DEEP LEARNING TECHNIQUES.docx
SYNOPSIS on face recognition attendance system software
Automated_attendance_system_project.pptx
Deep learning on face recognition (use case, development and risk)
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
Technical Workshop - Win32/Georbot Analysis
"Deep Learning Beyond Cats and Cars: Developing a Real-life DNN-based Embedde...
Attendance System using Facial Recognition
Human Face Identification
Presentation of the InVID verification technologies at IPTC 2018
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Ad

More from Weverify (20)

PDF
Operation wise attention network for tampering localization fusion
PDF
MeVer tools for disinformation detection
PDF
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
PPTX
MeVer tools for disinformation detection
PPTX
Operation-wise Attention Network for Tampering Localization Fusion.
PDF
L tvs disinfo - 24 nov 2020
PDF
RDSM workshop 13 dec2020
PDF
We verify balkan disinformation panel
PDF
Text analysis for disinformation detection 17 dec 2020
PDF
20200112 EUDL training for adult learners
PDF
#Semiform2020 02 11 2020
PDF
2nd workshop em data science 08 02 2021
PDF
Stance classification. Presentation at QMUL 11 Nov 2020
PDF
Stance classification. Uni Cambridge 22 Jan 2021
PDF
EDMO workshop 17 Feb 2021
PDF
Edmo research + platforms panel
PDF
Qurator keynote berlin 2101 2020
PDF
Aacl / SoBigData 2020 06 12 2020
PDF
TTO Keynote 08 10 2021
PDF
We verify @ meta forum 2020 - Dec 2 2020
Operation wise attention network for tampering localization fusion
MeVer tools for disinformation detection
TTO2021: Cross-Lingual Rumour Stance Classification: a First Study with BERT...
MeVer tools for disinformation detection
Operation-wise Attention Network for Tampering Localization Fusion.
L tvs disinfo - 24 nov 2020
RDSM workshop 13 dec2020
We verify balkan disinformation panel
Text analysis for disinformation detection 17 dec 2020
20200112 EUDL training for adult learners
#Semiform2020 02 11 2020
2nd workshop em data science 08 02 2021
Stance classification. Presentation at QMUL 11 Nov 2020
Stance classification. Uni Cambridge 22 Jan 2021
EDMO workshop 17 Feb 2021
Edmo research + platforms panel
Qurator keynote berlin 2101 2020
Aacl / SoBigData 2020 06 12 2020
TTO Keynote 08 10 2021
We verify @ meta forum 2020 - Dec 2 2020

Recently uploaded (20)

PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PPTX
Trending Python Topics for Data Visualization in 2025
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PPTX
Download Adobe Photoshop Crack 2025 Free
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PPTX
Computer Software - Technology and Livelihood Education
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
PPTX
Introduction to Windows Operating System
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PPTX
most interesting chapter in the world ppt
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
Guide to Food Delivery App Development.pdf
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Full-Stack Developer Courses That Actually Land You Jobs
Trending Python Topics for Data Visualization in 2025
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Download Adobe Photoshop Crack 2025 Free
BoxLang Dynamic AWS Lambda - Japan Edition
Computer Software - Technology and Livelihood Education
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Topaz Photo AI Crack New Download (Latest 2025)
iTop VPN Crack Latest Version Full Key 2025
Tech Workshop Escape Room Tech Workshop
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
Introduction to Windows Operating System
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
most interesting chapter in the world ppt
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Guide to Food Delivery App Development.pdf
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev

Deepfake detection

  • 1. DeepFake Detection: The Importance of Training Data Preprocessing and Practical Considerations Dr. Symeon (Akis) Papadopoulos – @sympap MeVer Team @ Information Technologies Institute (ITI) / Centre for Research & Technology Hellas (CERTH) Joint work with Polychronis Charitidis, George Kordopatis-Zilos and Yiannis Kompatsiaris AI4Media Workshop on GANs for Media Content Generation, Oct 1, 2020 Media Verification (MeVer)
  • 2. DeepFakes • Content, generated by AI, that seems authentic to human eye • Most common form: generation and manipulation of human face Source: https://en.wikipedia.org/wiki/Deepfake Source: https://www.youtube.com/watch?v=iHv6Q9ychnA Source: Media Forensics and DeepFakes: an overview
  • 3. Manipulation types Facial manipulations can be categorised in four main different groups: • Entire face synthesis • Attribute manipulation • Identity swap • Expression swap Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection (Tolosana et al., 2020) Tolosana, R., et al. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. arXiv preprint arXiv:2001.00179. Verdoliva, L. (2020). Media forensics and deepfakes: an overview. arXiv preprint arXiv:2001.06564. Mirsky, Y., & Lee, W. (2020). The Creation and Detection of Deepfakes: A Survey. arXiv preprint arXiv:2004.11138.
  • 4. WeVerify Project • WeVerify aims at detecting disinformation in social media and expose misleading and fabricated content • Partners: Univ. Sheffield, OntoText, ATC, DW, AFP, EU DisinfoLab, CERTH • A key outcome is a platform for collaborative content verification, tracking, and debunking • Currently, we are developing a deepfake detection service for the WeVerify platform • Participation in DeepFake Detection Challenge https://weverify.eu/
  • 5. DeepFake Detection Challenge • Goal: detect videos with facial or voice manipulations • 2,114 teams participated in the challenge • Log Loss error evaluation on public and private validation sets • Public evaluation contained videos with similar transformations as the training set • Private evaluation contained organic videos and videos with unknown transformations from the Internet • Our final standings: • public leaderboard: 49 (top 3%) with 0.295 Log Loss error • private leaderboard: 115 (top 5%) with 0.515 Log Loss error Source: https://www.kaggle.com/c/deepfake-detection-challenge
  • 6. DeepFake Detection Challenge - dataset • Dataset of more than 110k videos • Approx. 20k REAL and the rest are FAKE • FAKE videos generated from the REAL • Models used: • DeepFake AutoEncoder (DFAE) • Morphable Mask faceswap (MM/NN) • Neural Talking Heads (NTH) • FSGAN • StyleGAN Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., & Ferrer, C. C. (2020). The DeepFake Detection Challenge Dataset. arXiv preprint arXiv:2006.07397.
  • 7. Dataset preprocessing - Issues • Face dataset quality depends on face extraction accuracy (Dlib, mtcnn, facenet-pytorch, Blazeface) • Generally all face extraction libraries generate a number of false positive detections • Manual tuning can improve the quality of the generated dataset Deep learning model Face extraction Frame extraction Video corpus
  • 8. Noisy data creeping in the training set • Extracting faces with 1 fps from Kaggle DeepFake Detection Challenge dataset videos using pytorch implementation of MTCNN face detection • Observation: False detections are less compared to true detections in a video
  • 9. Our “noise” filtering approach • Compute face embeddings for each detected face in video • Similarity calculation between all face embeddings in a video → similarity graph construction • Nodes represent faces and two faces are connected if their similarities are greater than 0.8 (solid lines) • Drop components smaller than N/2 (e.g. component 2) • N is the number of frames that contain face detections (true or false).
  • 10. Advantages • Simple and fast procedure • No need for manual tuning of the face extraction settings • Clusters of distinct faces in cases of multiple persons in the video • This information can be utilized in various ways (e.g. predictions per face) Faces extracted from multiple video frames Component 1 Component 2
  • 11. Experiments • We trained multiple DeepFake detection models on the DFDC dataset with and without (baseline) our proposed approach • Three datasets: a) Celeb-DF, b) FaceForensics++, c) DFDC subset • For evaluation we examined two aggregation approaches • avg: prediction is the average of all face predictions • face: prediction is the max prediction among different avg face predictions • Results for the EfficientNet-B4 model in terms of Log loss error: Pre- processing CelebDF FaceForensics++ DFDC avg face avg face avg face baseline 0,510 0,511 0,563 0,563 0,213 0,198 proposed 0,458 0,456 0,497 0,496 0,195 0,173
  • 12. Our DFDC Approach - details • Applied proposed preprocessing approach to clean the generated face dataset • Face augmentation: • Horizontal & vertical flip, random crop, rotation, image compression, Gaussian & motion blurring, brightness, saturation & contrast transformation • Trained three different models: a) EfficientNet-B3, b) EfficientNet-B4, c) I3D* • Models trained on face level: • I3d trained with 10 consecutive face images exploiting temporal information. • EfficientNet models trained on single face images • Per model: • Added two dense layers with dropout after the backbone architecture with 256 and 1 units • Used the sigmoid activation for the last layer * ignoring the optical flow stream
  • 13. Our DFDC approach – inference pre-processing model inference post-processing
  • 14. Lessons from other DFDC teams • Most approaches ensemble multiple EfficientNet architectures (B3-B7) and some of them were trained on different seeds • ResNeXT was another architecture used by a top-performing solutions combined with 3D architectures such as I3D, 3D ResNet34, MC3 & R2+1D • Several approaches increased the margin of the detected facial bounding box to further improve results. • We used an additional margin of 20% but other works proposed a higher proportion. • To improve generalization: • Domain-specific augmentations: a) half face removal horizontally or vertically, b) landmark (eyes, nose, or mouth) removal • Mixup augmentations
  • 15. Practical challenges • Limited generalization • This observation applies to most submissions. The winning team scored 0.20336 in public validation and only 0.42798 in the private (Log Loss) • Overfitting • The best submission in the public leaderboard scored 0.19207 but in the private evaluation the error was 0.57468, leading to the 904-th position! • Broad problem scope • The term DeepFake may refer to every possible manipulation and generation • Constantly increasing manipulation and generation techniques • A detector is only trained with a subset of these manipulations
  • 16. DeepFake Detection in the Wild • Videos in the wild usually contain multiple scenes • Only a subset of these scenes may contain DeepFakes • Detection process might be slow for multi-shot videos (even short ones) • Low quality videos • Low quality faces tend to fool classifiers • Small detected and fast-moving faces • Usually lead to noisy predictions • Changes in the environment • Moving obstacles in front of the faces • Changes in lighting
  • 17. DeepFake Detection Service @ WeVerify https://www.youtube.com/watch?v=cVljNV V5VPw&ab_channel=TheFakening
  • 18. More details at TTO 2020 Charitidis, P., Kordopatis-Zilos, G., Papadopoulos, S., & Kompatsiaris, Y. (2020). Investigating the impact of preprocessing and prediction aggregation on the DeepFake detection task. Proceedings of the Conference for Truth and Trust Online (TTO) [to appear], https://arxiv.org/abs/2006.07084 https://truthandtrustonline.com/
  • 19. Thank you! Dr. Symeon Papadopoulos papadop@iti.gr @sympap Media Verification (MeVer) https://mever.iti.gr/ @meverteam https://ai4media.eu/ https://weverify.eu/