{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:08:28Z","timestamp":1776780508482,"version":"3.51.2"},"reference-count":52,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871283"],"award-info":[{"award-number":["61871283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the era of rapid development of the Internet of things, deep learning, and communication technologies, social media has become an indispensable element. However, while enjoying the convenience brought by technological innovation, people are also facing the negative impact brought by them. Taking the users\u2019 portraits of multimedia systems as examples, with the maturity of deep facial forgery technologies, personal portraits are facing malicious tampering and forgery, which pose a potential threat to personal privacy security and social impact. At present, the deep forgery detection methods are learning-based methods, which depend on the data to a certain extent. Enriching facial anti-spoofing datasets is an effective method to solve the above problem. Therefore, we propose an effective face swapping framework based on StyleGAN. We utilize the feature pyramid network to extract facial features and map them to the latent space of StyleGAN. In order to realize the transformation of identity, we explore the representation of identity information and propose an adaptive identity editing module. We design a simple and effective post-processing process to improve the authenticity of the images. Experiments show that our proposed method can effectively complete face swapping and provide high-quality data for deep forgery detection to ensure the security of multimedia systems.<\/jats:p>","DOI":"10.3390\/s22134697","type":"journal-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T04:12:01Z","timestamp":1655871121000},"page":"4697","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Enriching Facial Anti-Spoofing Datasets via an Effective Face Swapping Framework"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2558-552X","authenticated-orcid":false,"given":"Jiachen","family":"Yang","sequence":"first","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7321-7460","authenticated-orcid":false,"given":"Guipeng","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]},{"given":"Shuai","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4268-4004","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]},{"given":"Jiabao","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9806-1965","authenticated-orcid":false,"given":"Yong","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/TDSC.2020.2979183","article-title":"Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope","volume":"19","author":"Torabi","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1016\/j.future.2017.12.012","article-title":"Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city","volume":"108","author":"Yang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_3","unstructured":"Goodfellow, I., Pougetabadie, J., Mirza, M., Xu, B., Wardefarley, D., Ozair, S., Courville, A., and Bengio, Y. (2014, January 8\u201313). Generative Adversarial Nets. Proceedings of the 28th Annual Conference on Neural Information Processing Systems, Montreal, QC, Canada."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"Lecun","year":"2015","journal-title":"Nature"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"108569","DOI":"10.1016\/j.knosys.2022.108569","article-title":"Harmful algal bloom warning based on machine learning in maritime site monitoring","volume":"245","author":"Wen","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1109\/TII.2021.3116132","article-title":"Blockchain-Empowered Decentralized Horizontal Federated Learning for 5G-Enabled UAVs","volume":"18","author":"Feng","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1109\/TMTT.2021.3122533","article-title":"Millimeter-Wave Frequency Reconfigurable Dual-Band CMOS Power Amplifier for 5G Communication Radios","volume":"70","author":"Lee","year":"2022","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TKDE.2015.2468714","article-title":"A Novel Pipeline Approach for Efficient Big Data Broadcasting","volume":"28","author":"Wu","year":"2016","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TTS.2020.3001312","article-title":"Artificial Intelligence in Digital Media: The Era of Deepfakes","volume":"1","author":"Karnouskos","year":"2020","journal-title":"IEEE Trans. Technol. Soc."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"818895","DOI":"10.3389\/fpls.2021.818895","article-title":"Distance-Entropy: An effective indicator for selecting informative data","volume":"12","author":"Li","year":"2021","journal-title":"Front. Plant Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, Y., Chao, X., and Ercisli, S. Disturbed-Entropy: A simple data quality assessment approach. ICT Express, 2022. in press.","DOI":"10.1016\/j.icte.2022.01.006"},{"key":"ref_12","unstructured":"Yang, J., Zhang, Z., Gong, Y., Ma, S., Guo, X., Yang, Y., Xiao, S., Wen, J., Li, Y., and Gao, X. (2022). Do Deep Neural Networks Always Perform Better When Eating More Data?. arXiv."},{"key":"ref_13","unstructured":"Li, Y., Yang, J., and Wen, J. Entropy-Based redundancy analysis and information screening. Digit. Commun. Netw., 2021. in press."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13007-021-00770-1","article-title":"Semi-supervised few-shot learning approach for plant diseases recognition","volume":"17","author":"Li","year":"2021","journal-title":"Plant Methods"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., and Aila, T. (2020, January 14\u201319). Analyzing and Improving the Image Quality of StyleGAN. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nfeld, E., Schiele, B., and Khoreva, A. (2020, January 14\u201319). A U-Net Based Discriminator for Generative Adversarial Networks. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00823"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"811241","DOI":"10.3389\/fpls.2021.811241","article-title":"Toward sustainability: Trade-off between data quality and quantity in crop pest recognition","volume":"12","author":"Li","year":"2021","journal-title":"Front. Plant Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Keller, Y., and Hassner, T. (November, January 27). FSGAN: Subject Agnostic Face Swapping and Reenactment. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Korea.","DOI":"10.1109\/ICCV.2019.00728"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., and Wen, F. (2020, January 14\u201319). Advancing High Fidelity Identity Swapping for Forgery Detection. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yang, J., Xiao, S., Li, A., Lu, W., Gao, X., and Li, Y. (2021). MSTA-Net: Forgery Detection by Generating Manipulation Trace Based on Multi-scale Self-texture Attention. IEEE Transactions on Circuits and Systems for Video Technology, IEEE.","DOI":"10.1109\/TCSVT.2021.3133859"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4234","DOI":"10.1109\/TIFS.2021.3102487","article-title":"MTD-Net: Learning to Detect Deepfakes Images by Multi-Scale Texture Difference","volume":"16","author":"Yang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Huang, X., and Belongie, S. (2017, January 22\u201329). Arbitrary Style Transfer in Real-Time with Adaptive Instance Normalization. Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhu, J.Y., Park, T., Isola, P., and Efros, A.A. (2017, January 22\u201329). Unpaired image-to-image translation using cycle-consistent adversarial networks. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref_24","unstructured":"Mogren, O. (2016). C-RNN-GAN: Continuous recurrent neural networks with adversarial training. arXiv."},{"key":"ref_25","unstructured":"Antoniou, A., Storkey, A., and Edwards, H. (2017). Data augmentation generative adversarial networks. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Tariq, S., Lee, S., Kim, H., Shin, Y., and Woo, S.S. (2019, January 8\u201312). Gan is a friend or foe? a framework to detect various fake face images. Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, Limassol, Cyprus.","DOI":"10.1145\/3297280.3297410"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.future.2021.06.043","article-title":"Detecting fake images by identifying potential texture difference","volume":"125","author":"Yang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yu, N., Davis, L., and Fritz, M. (November, January 27). Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Korea.","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., and Shao, J. (2020, January 23\u201328). Thinking in frequency: Face forgery detection by mining frequency-aware clues. Proceedings of the European Conference on Computer Vision, Glasgow, UK.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020, January 14\u201319). Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Jiang, L., Li, R., Wu, W., Qian, C., and Loy, C.C. (2020, January 14\u201319). Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref_32","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., and Ferrer, C.C. (2020). The deepfake detection challenge (dfdc) dataset. arXiv."},{"key":"ref_33","first-page":"9841","article-title":"Ganspace: Discovering interpretable gan controls","volume":"33","author":"Hertzmann","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1109\/TPAMI.2020.3034267","article-title":"InterFaceGAN: Interpreting the Disentangled Face Representation Learned by GANs","volume":"44","author":"Shen","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_35","unstructured":"Denton, E., Hutchinson, B., Mitchell, M., and Gebru, T. (2022, June 03). Detecting Bias with Generative Counterfactual Face Attribute Augmentation. Available online: https:\/\/www.arxiv-vanity.com\/papers\/1906.06439\/."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Patashnik, O., Wu, Z., Shechtman, E., Cohen-Or, D., and Lischinski, D. (2021, January 11\u201317). StyleCLIP: Text-Driven Manipulation of StyleGAN Imagery. Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, BC, Canada.","DOI":"10.1109\/ICCV48922.2021.00209"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TBIOM.2021.3049576","article-title":"Head2Head++: Deep Facial Attributes Re-Targeting","volume":"3","author":"Doukas","year":"2021","journal-title":"IEEE Trans. Biom. Behav. Identity Sci."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wiles, O., Koepke, A., and Zisserman, A. (2018, January 8\u201314). X2face: A network for controlling face generation using images, audio, and pose codes. Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany.","DOI":"10.1007\/978-3-030-01261-8_41"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.W., Kim, S., and Choo, J. (2018, January 18\u201323). Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., and Delp, E.J. (2018, January 27\u201330). Deepfake Video Detection Using Recurrent Neural Networks. Proceedings of the 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Natsume, R., Yatagawa, T., and Morishima, S. (2018). Rsgan: Face swapping and editing using face and hair representation in latent spaces. arXiv.","DOI":"10.1145\/3230744.3230818"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Hassner, T., and Keller, Y. (2022). FSGANv2: Better Subject Agnostic Face Swapping and Reenactment. IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE.","DOI":"10.1109\/TPAMI.2022.3155571"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Li, Q., Wang, J., Xu, C., and Sun, Z. (2021, January 19\u201325). One Shot Face Swapping on Megapixels. Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Doll\u00e1r, P., Girshick, R., He, K., Hariharan, B., and Belongie, S. (2017, January 21\u201326). Feature pyramid networks for object detection. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., and Zafeiriou, S. (2019, January 15\u201320). ArcFace: Additive Angular Margin Loss for Deep Face Recognition. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref_47","unstructured":"Simonyan, K., and Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv."},{"key":"ref_48","unstructured":"Karras, T., Aila, T., Laine, S., and Lehtinen, J. (2017). Progressive growing of gans for improved quality, stability, and variation. arXiv."},{"key":"ref_49","first-page":"11","article-title":"Large-scale celebfaces attributes (celeba) dataset","volume":"15","author":"Liu","year":"2018","journal-title":"Retrieved August"},{"key":"ref_50","unstructured":"Kingma, D.P., and Ba, J.L. (2014). Adam: A method for stochastic optimization. arXiv."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kangjin, W., Yong, Y., Ying, L., Hanmei, L., and Lin, M. (2017, January 18\u201322). FID: A Faster Image Distribution System for Docker Platform. Proceedings of the 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W), Tucson, AZ, USA.","DOI":"10.1109\/FAS-W.2017.147"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., and Ge, Y. (2020, January 12\u201316). SimSwap: An Efficient Framework for High Fidelity Face Swapping. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413630"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4697\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:37:12Z","timestamp":1760139432000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":52,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["s22134697"],"URL":"https:\/\/doi.org\/10.3390\/s22134697","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,22]]}}}