Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessCommunity Without Tokens: What AI Dev Tools Can Learn from Crypto's Community PlaybookDev.to AIGarry Tan's gstack: Install This 56k-Star 'Virtual Team' for Claude CodeDev.to AIA Step-by-Step Guide to K-Nearest Neighbors (KNN) in Machine LearningDev.to AIOil prices extend gains after record monthly rally as Iran war fuels supply worriesCNBC TechnologyWhy Your "AI Assistant" is Obsolete: Welcoming the Era of Agentic Workflows & MCPDev.to AIBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AIHow to Create Viral Videos with AI in 2026Dev.to AIEmbers of Autoregression: Understanding Large Language Models Through theProblem They are Trained to SolveDev.to AIBuilding the Payment Gateway for AI Agents: A Technical Deep DiveDev.to AIOpenClaw is incredible until you deploy it wrongDev.to AIWhy Most Frontend Apps Are Smarter Than Their Engineers RealizeDev.to AIThis Isn’t Another ‘AI Productivity Hack’ ArticleMedium AIBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessCommunity Without Tokens: What AI Dev Tools Can Learn from Crypto's Community PlaybookDev.to AIGarry Tan's gstack: Install This 56k-Star 'Virtual Team' for Claude CodeDev.to AIA Step-by-Step Guide to K-Nearest Neighbors (KNN) in Machine LearningDev.to AIOil prices extend gains after record monthly rally as Iran war fuels supply worriesCNBC TechnologyWhy Your "AI Assistant" is Obsolete: Welcoming the Era of Agentic Workflows & MCPDev.to AIBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AIHow to Create Viral Videos with AI in 2026Dev.to AIEmbers of Autoregression: Understanding Large Language Models Through theProblem They are Trained to SolveDev.to AIBuilding the Payment Gateway for AI Agents: A Technical Deep DiveDev.to AIOpenClaw is incredible until you deploy it wrongDev.to AIWhy Most Frontend Apps Are Smarter Than Their Engineers RealizeDev.to AIThis Isn’t Another ‘AI Productivity Hack’ ArticleMedium AI

Face2Parts: Exploring Coarse-to-Fine Inter-Regional Facial Dependencies for Generalized Deepfake Detection

arXivMarch 30, 202610 min read0 views
Source Quiz

arXiv:2603.26036v1 Announce Type: new Abstract: Multimedia data, particularly images and videos, is integral to various applications, including surveillance, visual interaction, biometrics, evidence gathering, and advertising. However, amateur or skilled counterfeiters can simulate them to create deepfakes, often for slanderous motives. To address this challenge, several forensic methods have been developed to ensure the authenticity of the content. The effectiveness of these methods depends on their focus, with challenges arising from the diverse nature of manipulations. In this article, we a — Kutub Uddin, Nusrat Tasnim, Byung Tae Oh

View PDF HTML (experimental)

Abstract:Multimedia data, particularly images and videos, is integral to various applications, including surveillance, visual interaction, biometrics, evidence gathering, and advertising. However, amateur or skilled counterfeiters can simulate them to create deepfakes, often for slanderous motives. To address this challenge, several forensic methods have been developed to ensure the authenticity of the content. The effectiveness of these methods depends on their focus, with challenges arising from the diverse nature of manipulations. In this article, we analyze existing forensic methods and observe that each method has unique strengths in detecting deepfake traces by focusing on specific facial regions, such as the frame, face, lips, eyes, or nose. Considering these insights, we propose a novel hybrid approach called Face2Parts based on hierarchical feature representation ($HFR$) that takes advantage of coarse-to-fine information to improve deepfake detection. The proposed method involves extracting features from the frame, face, and key facial regions (i.e., lips, eyes, and nose) separately to explore the coarse-to-fine relationships. This approach enables us to capture inter-dependencies among facial regions using a channel-attention mechanism and deep triplet learning. We evaluated the proposed method on benchmark deepfake datasets in both intra-, inter-dataset, and inter-manipulation settings. The proposed method achieves an average AUC of 98.42% on FF++, 79.80% on CDF1, 85.34% on CDF2, 89.41% on DFD, 84.07% on DFDC, 95.62% on DTIM, 80.76% on PDD, and 100% on WLDR, respectively. The results demonstrate that our approach generalizes effectively and achieves promising performance to outperform the existing methods.

Subjects:

Computer Vision and Pattern Recognition (cs.CV)

Cite as: arXiv:2603.26036 [cs.CV]

(or arXiv:2603.26036v1 [cs.CV] for this version)

https://doi.org/10.48550/arXiv.2603.26036

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Kutub Uddin [view email] [v1] Fri, 27 Mar 2026 03:12:24 UTC (18,162 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Face2Parts:…researchpaperarxivcomputer-vi…image-recog…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 95 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers