深度换脸:伪造及检测方法综述

Deepfake:A Comprehensive Survey of Generation and Detection Methods

在生成对抗网络 (GANs) 和扩散模型 (Diffusion Models) 等生成式模型的推动下, 人脸深度伪造 (Deepfake) 技术取得了显著进展。其中, 深度换脸作为Deepfake中应用最为普遍且最具影响的研究方向之一, 引起了人们的广泛关注。一方面, 该技术在日常娱乐、电影制作等多元领域中催生了新的创新可能性, 推动了相关行业的发展。另一方面, 其快速的技术演进也对个人隐私保护、社会稳定乃至国家安全构成了日益严峻的挑战。在此背景下, 研发高效且可靠的人脸深度伪造检测技术成为了应对这一复杂威胁的关键策略。首先, 文章综述了基于深度学习的换脸方法, 从生成方式和引导方式两个角度对换脸方法进行了归类分析总结。其次, 文章从图像空域和图像频域两个关键角度系统地概述了面向人脸图像的深度伪造检测技术。进一步地, 文章从帧内图像伪造特征、帧间时空特征融合和多模态信息融合等角度对面向视频的人脸深度伪造检测技术进行了分类整理。最后, 文章总结了深度换脸和检测算法在应对技术问题和隐私安全等方面的一系列挑战, 同时对未来的发展方向进行了探讨。

Under the impetus of generative models such as Generative Adversarial Networks (GANs) and Diffusion Models, facial deepfake technology has made significant progress. Among these, deep face swapping, as one of the most widespread and impactful research directions in the realm of Deepfake, has captured widespread attention. With its application in diverse areas such as daily entertainment and film production, this technology has catalyzed new innovative possibilities, thereby propelling the advancement of related industries. On the other hand, its rapid evolution poses an increasingly formidable challenge to personal privacy protection, societal stability, and even national security. Against this backdrop, the development of efficient and reliable facial deepfake detection technology has become a critical strategy to counteract this complex threat. Firstly, this article provides an overview of face-swapping methods based on deep learning, categorizing and summarizing them from the perspectives of generation and guidance. Subsequently, the article systematically outlines facial deepfake detection techniques focusing on image spatial and frequency domains. Furthermore, it categorizes and organizes video-oriented facial deepfake detection technology from the perspectives of intra-frame. image forgery features, inter-frame. spatiotemporal feature fusion, and multimodal information fusion. In conclusion, the article summarizes the array of challenges faced by deep face swapping and detection algorithms in addressing technological issues and privacy security. Simultaneously, it delves into the exploration of future directions for development.