Computer Science ›› 2023, Vol. 50 ›› Issue (2): 221-230.doi: 10.11896/jsjkx.220800166

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Lightweight Face Generation Method Based on TransEditor and Its Application Specification

LIANG Weiliang1, LI Yue2, WANG Pengfei3   

  1. 1 Blockchain Research Institute,Renmin University of China,Beijing 100872,China
    2 School of Economics,Shenzhen Polytechnics,Shenzhen,Guangdong 518055,China
    3 Big Data Center,Ministry of Emergency Management of the people's Republic of China,Beijing 100013,China
  • Received:2022-08-16 Revised:2022-10-01 Online:2023-02-15 Published:2023-02-22
  • Supported by:
    Youth Foundation of Social Science and Humanity,China Ministry of Education(21YJC820023) and China Postdoctoral Science Foundation(2022M713439)

Abstract: Face generation can combine the style of the face and the pose of the head to synthesize fake face images,it is often used for vision tasks such as gender conversion and pose modification.GAN-based face generation methods can greatly improve the quality and editability of face generation.However,these generation methods have complex network structures and large computing resource requirements,and are difficult to directly apply to practical scenarios.To achieve efficient face generation,this paper proposes a lightweight face generation method based on TransEditor,and discusses the corresponding application specifications.At the technical level,firstly,based on the TransEditor face editing network model,we design a lightweight face generation network model with reference to the generator structure of lightweight network model such as StyleGAN2.Secondly,we analyze the loss function of the network model from the aspects of generation loss,confrontation loss,reconstruction loss,etc.,and propose to use the PReLU activation function instead of the Softplus activation function to improve the generation effect of the ge-nerator.Finally,through massive experiments,it is proved that the LPIPS of the proposed lightweight face generation method based on TransEditor only reduces by 0.0042,which greatly reduces the training time and parameter amount of the model,and improves the operation efficiency of the face generation model.At the level of application specifications,it is necessary to improve the existing regulatory measures and standardize the use of the proposed face generation method,so that technological progress can better serve social development.

Key words: Face generation, Generative adversarial network, Transformer network, Lightweight, Application specification

CLC Number: 

  • TP301.6
[1]KARRAS T,LAINE S,AITTALA M,et al.Analyzing and improving the image quality of stylegan[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8110-8119.
[2]KARRAS T,AITTALA M,LAINE S,et al.Alias-free generative adversarial networks[J].Advances in Neural Information Processing Systems,2021,34:852-863.
[3]BROCK A,DONAHUE J,SIMONYAN K.Large scale GANtraining for high fidelity natural image synthesis[J].arXiv:1809.11096,2018.
[4]KARRAS T,AILA T,LAINE S,et al.Progressive growing ofgans for improved quality,stability,and variation[J].arXiv:1710.10196,2017.
[5]KARRAS T,LAINE S,AILA T.A style-based generator architecture for generative adversarial networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:4401-4410.
[6]KIM H,CHOI Y,KIM J,et al.Exploiting spatial dimensions of latent in gan for real-time image editing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:852-861.
[7]XU Y,YIN Y,JIANG L,et al.TransEditor:Transformer-Based Dual-Space GAN for Highly Controllable Facial Editing[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:7683-7692.
[8]KWON G,YE J C.Diagonal attention and style-based gan forcontent-style disentanglement in image generation and translation[C]//Proceedings of the IEEE/CVF International Confe-rence on Computer Vision.2021:13980-13989.
[9]GOODFELLOW I,POUGET-ABADIE J,MIRZA M,et al.Ge-nerative adversarial networks[J].arXiv:1406,2661,2014.
[10]RADFORD A,METZ L,CHINTALA S.Unsupervised representation learning with deep convolutional generative adversarial networks[J].arXiv:1511.06434,2015.
[11]ISOLA P,ZHU J Y,ZHOU T,et al.Image-to-image translation with conditional adversarial networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:1125-1134.
[12]ARJOVSKY M,CHINTALA S,BOTTOU L.Wasserstein ge-nerative adversarial networks[C]//International Conference on Machine Learning.PMLR,2017:214-223.
[13]LEDIG C,THEIS L,HUSZÁR F,et al.Photo-realistic singleimagesuper-resolution using a generative adversarial network[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:4681-4690.
[14]DAI F Y,CHI J,REN M G,et al.Face Image Synthesis Driven by Geometric Feature and Attribute Label[J].Computer Science,2022,49(10):214-223.
[15]SHI D,LU T L,DU Y H,et al.Generation Model of Gender-forged Face Image Based on Improved CycleGAN[J].Computer Science,2022,49(2):31-39.
[16]TANG Y X,WANG B J.Research Progress of Face Editingbased on Deep Generative Model[J].Computer Science,2022,49(2):51-61.
[17]VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[J].arXiv:1706,03762,2017.
[18]DOSOVITSKIY A,BEYER L,KOLESNIKOV A,et al.Animage is worth 16x16 words:Transformers for image recognition at scale[J].arXiv:2010.11929,2020.
[19]ZHOU H,LIU Y,LIU Z,et al.Talking face generation by adversarially disentangled audio-visual representation[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2019,33(1):9299-9306.
[20]DING X,ZHANG X,MA N,et al.Repvgg:Making vgg-styleconvnets great again[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:13733-13742.
[21]WANG W,ZHANG K,REN H,et al.UULPN:An ultra-lightweight network for human pose estimation based on unbiased data processing[J].Neurocomputing,2022,480:220-233.
[22]HAN K,WANG Y,TIAN Q,et al.Ghostnet:More featuresfrom cheap operations[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:1580-1589.
[23]ZHANG Z,TANG J,WU G.Simple and lightweight humanpose estimation[J].arXiv:1911.10346,2019.
[24]YU C,XIAO B,GAO C,et al.Lite-hrnet:A lightweight high-resolution network[C]//Proceedings of the IEEE/CVF Confe-rence on Computer Vision and Pattern Recognition.2021:10440-10450.
[25]HOWARD A G,ZHU M,CHEN B,et al.Mobilenets:Efficient convolutional neural networks for mobile vision applications[J].arXiv:1704.04861,2017.
[26]SANDLER M,HOWARD A,ZHU M,et al.MobileNetV2:Inverted Residuals and Linear Bottlenecks[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).IEEE,2018.
[27]HOWARD A,SANDLER M,CHU G,et al.Searching for mobilenetv3[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2019:1314-1324.
[28]ZHANG X,ZHOU X,LIN M,et al.Shufflenet:An extremelyefficient convolutional neural network for mobile devices[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:6848-6856.
[29]MA N,ZHANG X,ZHENG H T,et al.Shufflenet v2:Practical guidelines for efficient cnn architecture design[C]//Proceedings of the European Conference on Computer Vision(ECCV).2018:116-131.
[30]JIAO Y L.Identification of Face-recognition's Tort Liability[J].Social Sciences in Chinese Higher Education Institutions,2022(2):117-128.
[31]XIONG B.The Risk and Limit of Expended Criminal Gover-nance of “Deepfake”[J].Journal of Anhui University:Philosophy and Social Science Edition,2020(6):106-113.
[32]JIA Z F.Legal Risks and Rules of Deepfake Technology[J].Journal of Northeast Agricultural University:Social Science Edition,2021(1):71-78.
[33]HUANG J X.Protection of Personal Privacy in “Deepfake”:Risks and Countermeasures [J].Journal of East China University of Science and Technology:Social Science Edition,2022(1):127-135.
[34]ZHOU K L,LI Y.Research on Legal Regulation of Face Data Application based on Responsive Theory[J].Southwest Finance,2019(12):78-87.
[35]YANG D.On the Reconstruction of Anti-monopoly Law:Re-sponding to the Challenge of the Digital Economy [J].China Legal Science,2020(3):206-222.
[36]WANG H M,CAI S L.Research on Legal risks of “Deep Forgery” Technology and its Collaborative Governance[J].Science and Technology Management Research,2021(11):156-163.
[1] LI Xiaoling, WU Haotian, ZHOU Tao, LU Hui. Password Guessing Model Based on Reinforcement Learning [J]. Computer Science, 2023, 50(1): 334-341.
[2] ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47.
[3] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[4] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[5] XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190.
[6] HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362.
[7] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[8] XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223.
[9] DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202.
[10] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[11] LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184.
[12] CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122.
[13] SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39.
[14] LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91.
[15] TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!