You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi @heejkoo , i think we can include diffusion models from the image forensic perspective, which states how to distinguish image generated by diffusion model from real images. This is a meaningful research direction and has many practical needs in the security system, as well as helps people use diffusion model to generate more "real" images. This image forensic has many topics, such as localization, detection, and attribution. Please consider taking a look on these following works:
Hi @heejkoo , i think we can include diffusion models from the image forensic perspective, which states how to distinguish image generated by diffusion model from real images. This is a meaningful research direction and has many practical needs in the security system, as well as helps people use diffusion model to generate more "real" images. This image forensic has many topics, such as localization, detection, and attribution. Please consider taking a look on these following works:
Towards the Detection of Diffusion Model Deepfakes (https://arxiv.org/pdf/2210.14571.pdf)
Hierarchical Fine-Grained Image Forgery Detection and Localization (CVPR2023) (https://arxiv.org/pdf/2303.17111.pdf)
AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics (https://arxiv.org/pdf/2304.06870.pdf)
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models (https://arxiv.org/pdf/2210.06998.pdf)
The text was updated successfully, but these errors were encountered: