论文标题

真实或虚拟:视频会议背景操纵检测系统

Real or Virtual: A Video Conferencing Background Manipulation-Detection System

论文作者

Nowroozi, Ehsan, Mekdad, Yassine, Conti, Mauro, Milani, Simone, Uluagac, Selcuk, Yanikoglu, Berrin

论文摘要

最近,最后一代视频会议技术的受欢迎程度和广泛使用创造了其市场规模的指数增长。这样的技术使不同地理区域的参与者可以进行虚拟面对面的会议。此外,由于隐私问题或减少干扰,尤其是在专业环境中,它使用户能够采用虚拟背景来隐藏自己的环境。然而,在用户不应该隐藏其实际位置的情况下,他们可能会通过声称自己的虚拟背景为真实背景来误导其他参与者。因此,开发工具和策略以检测被考虑的虚拟背景的真实性至关重要。在本文中,我们提出了一种检测策略,以区分真实和虚拟视频会议的用户背景。我们证明我们的探测器在两种攻击方案上都很强大。第一种情况考虑了检测器对攻击和旅馆的第二种情况的情况,我们使探测器意识到对抗性攻击,我们指的是对抗性的多媒体取证(即,训练集中包含了法式编辑的框架)。鉴于缺乏用于视频会议的虚拟和真实背景的公开可用数据集,我们创建了自己的数据集并使其公开可用[1]。然后,我们证明了检测器对对手认为的不同对抗攻击的鲁棒性。最终,我们的探测器的性能与CRSPAM1372 [2]功能以及后处理操作(例如具有攻击者可能会选择的不同质量因素的几何变换)具有重要意义。此外,我们的性能结果表明,我们可以从虚拟背景中完美地识别出99.80%的真实背景。

Recently, the popularity and wide use of the last-generation video conferencing technologies created an exponential growth in its market size. Such technology allows participants in different geographic regions to have a virtual face-to-face meeting. Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, particularly in professional settings. Nevertheless, in scenarios where the users should not hide their actual locations, they may mislead other participants by claiming their virtual background as a real one. Therefore, it is crucial to develop tools and strategies to detect the authenticity of the considered virtual background. In this paper, we present a detection strategy to distinguish between real and virtual video conferencing user backgrounds. We demonstrate that our detector is robust against two attack scenarios. The first scenario considers the case where the detector is unaware about the attacks and inn the second scenario, we make the detector aware of the adversarial attacks, which we refer to Adversarial Multimedia Forensics (i.e, the forensically-edited frames are included in the training set). Given the lack of publicly available dataset of virtual and real backgrounds for video conferencing, we created our own dataset and made them publicly available [1]. Then, we demonstrate the robustness of our detector against different adversarial attacks that the adversary considers. Ultimately, our detector's performance is significant against the CRSPAM1372 [2] features, and post-processing operations such as geometric transformations with different quality factors that the attacker may choose. Moreover, our performance results shows that we can perfectly identify a real from a virtual background with an accuracy of 99.80%.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源