
formance, whether in typical scenarios or in situations
involving imbalanced datasets.
The deepfake detection results were shown in Fig.
1, Fig. 2, and Fig. 3 (best viewed in a color display),
where the blue and orange bars indicate the results
obtained from MADD and our method (MADD+hash
loss), respectively. It can be observed that the orange
bars are generally higher than blue bars, indicating
that the proposed hashing is efficient in improving
the generalization capability of MADD not only in
resisting content-preserving manipulations, including
JPEG and OSN attacks, but also in dealing with cross-
dataset detection. In particular, the performance gap
between the original MADD and MADD+our hashing
is large remarkably in several cases. Although it is not
shown here, we have also observed similar results for
SLADD trained on FF++.
5 CONCLUSIONS
In this paper, we have presented a perceptual image
hashing method that can be plugged into the existing
deepfake detection models to boost their performance
in resisting content-preserving image manipulations
in that the fake clues can be properly reserved under
JPEG compression and online social network process-
ing. The preliminary experimental results demonstrate
the effectiveness of proposed perceptual hashing. In
the future, we will further study and apply the idea of
perceptual hashing in other deepfake detection models.
ACKNOWLEDGEMENT
This work was supported by the National Science and
Technology Council (NSTC), Taiwan, ROC, under
Grants NSTC 112-2221-E-001-011-MY2 and 112-
2634-F-001-002-MBK. We also thank Taiwan Cloud
Computing (TWCC) for providing computational and
storage resources.
REFERENCES
Bayar, B. and Stamm, M. C. (2018). Constrained convo-
lutional neural networks: A new approach towards
general purpose image manipulation detection. IEEE
Transactions on Information Forensics and Security.
Chen, L., Zhang, Y., Song, Y., Liu, L., and Wang, J. (2022).
Self-supervised learning of adversarial example: To-
wards good generalizations for deepfake detection. In
CVPR.
Chen, X., Dong, C., Ji, J., Cao, J., and Li, X. (2021). Im-
age manipulation detection by multi-view multi-scale
supervision. In ICCV.
Cozzolino, D. and Verdoliva, L. (2020). Noiseprint: A
cnn-based camera model fingerprint. IEEE Trans. on
Information Forensics and Security, 20.
Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R.,
Wang, M., and Ferrer, C. C. (2020). The deep-
fake detection challenge dataset. In arXiv preprint
arXiv:2006.07397.
Fridrich, J. and Kodovsky, J. (2012). Rich models for ste-
ganalysis of digital images. IEEE Transactions on
information Forensics and Security.
Hu, J., Liao, X., Liang, J., Zhou, W., and Qin, Z. (2022).
Finfer: Frame inference-based deepfake detection for
high-visual-quality videos. In AAAI.
Kwon, M.-J., Yu, I.-J., Nam, S.-H., and Lee, H.-K. (2021).
Cat-net: Compression artifact tracing network for de-
tection and localization of image splicing. In WACV.
Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020). Celeb-df:
A large-scale challenging dataset for deepfake foren-
sics. In CVPR.
Lu, C.-S. and Hsu, C.-Y. (2005). Geometric distortion-
resilient image hashing scheme and its applications
on copy detection and authentication. ACM Multime-
dia Systems Journal, special issue on Multimedia and
Security, 11(2).
Luo, Y., Zhang, Y., Yan, J., and Liu, W. (2021). Generalizing
face forgery detection with high-frequency features. In
CVPR.
Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies,
J., and Nießner, M. (2019). Faceforensics++: Learning
to detect manipulated facial images. In ICCV.
Sun, K., Liu, H., Ye, Q., Gao, Y., Liu, J., Shao, L., and Ji,
R. (2021). Domain general face forgery detection by
learning to weight. In AAAI.
Sun, K., Yao, T., Chen, S., Ding, S., Li, J., and Ji, R. (2022).
Dual contrastive learning for general face forgery de-
tection. In AAAI.
Swaminathan, A., Mao, Y., and Wu, M. (2006). Robust
and secure image hashing. IEEE Trans. Information
Forensics and Security, 1(2).
Wu, H., Zhou, J., Tian, J., and Liu, J. (2022). Robust image
forgery detection over online social network shared
images. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition (CVPR).
Xia, H., Jing, T., Chen, C., and Ding, Z. (2021). Semi-
supervised domain adaptive retrieval via discriminative
hashing learning. In Proceedings of ACM Multimedia.
Yan, Z., Zhang, Y., Fan, Y., and Wu, B. (2023). Ucf: Un-
covering common features for generalizable deepfake
detection. In ICCV.
Yang, C., Li, H., Lin, F., Jiang, B., and Zhao, H. (2020). Con-
strained r-cnn: A general image manipulation detection
model. In ICME.
Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., and Yu,
N. (2021). Multi-attentional deepfake detection. In
CVPR.
Zhou, P., Han, X., Morariu, V. I., and Davis, L. S. (2018).
Learning rich features for image manipulation detec-
tion. In Proceedings of the IEEE Conference on Com-
puter Vision and Pattern Recognition (CVPR).
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
378