Computer Science ›› 2026, Vol. 53 ›› Issue (4): 445-453.doi: 10.11896/jsjkx.250700070

• Information Security • Previous Articles     Next Articles

Deepfake Detection Method Based on Positional Enhancement and Frequency Domain ComponentInteraction

MENG Siyu, NIU Chunxiang, TAN Quange, WANG Rong   

  1. College of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China
  • Received:2025-07-14 Revised:2025-09-04 Online:2026-04-15 Published:2026-04-08
  • About author:MENG Siyu,born in 2001,postgra-duate,is a member of CCF(No.A00849G).Her main research interests include deepfake detection and computervision.
    WANG Rong,born in 1971,professor,Ph.D supervisor,is a member of CCF(No.C4366M).Her main research interests include pattern recognition and computer vision.
  • Supported by:
    Discipline Innovation and Talent Introduction Base Program for Institutions of Higher Education(B20087).

Abstract: With the rapid development of Deepfake technology,forged facial images and videos generated by such techniques have become increasingly prevalent on social media platforms.However,these technologies are also being maliciously exploited,posing serious threats to social security.Although existing detection methods perform well in detecting Deepfake faces on in-domain datasets,their performance significantly degrades when applied to unseen datasets.To address this issue,a Deepfake detection method based on positional enhancement and frequency domain component interaction is proposed,aiming to improve the robustness and generalization of facial forgery detection.Firstly,vision Transformer is employed as the backbone network to capture forgery traces from a global perspective.Secondly,the dynamic local feature extraction module is designed,utilizing channel-wise and point-wise convolutional operations for local feature extraction.This module dynamically weights features based on pixel-level importance in feature representation,thereby refining local features and enhancing the ability to perceive local features.Concurrently,the multi-scale feature extraction and positional enhancement module is constructed,which acquires multi-scale features through multi-dilated convolutions and introduces a positional enhancement mechanism to strengthen positional correlations between pixels,effectively extracting multi-scale information from different regions.Then,the global-local frequency domain component interaction module is developed,implementing information exchange between different frequency components through the frequency domain decomposition attention mechanism.This captures dependencies between global and local features to identify artifacts that disappear in RGB space when fake facial image quality degrades.Finally,the pixel relationship similarity loss function is designed to calculate positional relationship losses between pixels and is combined with cross-entropy loss to construct the joint loss function to improve detection accuracy.Experimental results demonstrate that the proposed method achieves AUC scores of 99.29% and 78.62% on FF++ and Celeb-DF datasets respectively,proving its effectiveness in enhancing the robustness and generalization of facial forgery detection.

Key words: Feature extraction, Positional enhancement, Frequency domain component interaction, Joint loss, Deepfake detection

CLC Number: 

  • TP391.41
[1]THIES J,ZOLLHÖFER M,NIESSNER M.Deferred neuralrendering:image synthesis using neural textures[J].ACM Transactions on Graphics,2019,38(4):66.
[2]THIES J,ZOLLHÖFER M,STAMMINGER M,et al.Face2-Face:Real-Time Face Capture and Reenactment of RGB Videos[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition.2016:2387-2395.
[3]ZHAO H,WEI T,ZHOU W,et al.Multi-attentional deepfake detection[C]//2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:2185-2194.
[4]ZHANG D,CHEN J,LIAO X,et al.Face Forgery Detection via Multi-Feature Fusion and Local Enhancement[J].IEEE Transa-ctions on Circuits and Systems for Video Technology,2024,34(9):8972-8977.
[5]GUO Z,WANG L,YANG W,et al.LDFnet:Lightweight Dynamic Fusion Network for Face Forgery Detection by Integrating Local Artifacts and Global Texture Information[J].IEEE Transactions on Circuits and Systems for Video Technology,2024,34(2):1255-1265.
[6]ZHANG K,FAN Z X.Improved Face Forgery Detection MethodBased on Adversarial Training[J].Journal of Chongqing Technology and Business University(Na-tural Science Edition),2025,42(4):88-94.
[7]WANG Y M,HU J,WU X S,et al.Compressed deepfake video detection method based on inconsistent facial motion[J].Journal of Chongqing University of Posts and Telecommunications(Na-tural Science Edition),2025,37(3):445-452.
[8]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010.
[9]DOSOVITSKIY A,BEYER L,KOLESNIKOV A,et al.Animage is worth 16x16 words:transformers for image recognition at scale[C]//Proceedings of the International Conference on Learning Representations.2021.
[10]ZHOU J,ZHAO X,XU Q,et al.MDCF-Net:Multi-Scale Dual-Branch Network for Compressed Face Forgery Detection[J].IEEE Access,2024,12:58740-58749.
[11]KHORMALI A,YUAN J S.Self-Supervised Graph Transformerfor Deepfake Detection[J].IEEE Access,2024,12:58114-58127.
[12]ZHOU K,SUN G,WANG J,et al.MH-FFNet:Leveraging Mid-High Frequency Information for Robust Fine-Grained Face Forgery Detection[J].Expert Systems with Applications,2025,276(C).
[13]LAI Z M,ZHANG Y,LI D,et al.Leveraging high-frequency diversified augmentation for general deepfake detection[J].Journal of Information Security and Applications,2025,89:103994.
[14]ZHANG D Y,QI F F,CHEN J H,et al.Fake face detection based on fusion of spatial texture and high-frequency noise[J].Chinese Journal Of Electronics,2025,34(1):212-221.
[15]HUANG J S,YANG G M.Face Forgery Detection MethodBased on Manipulation Trace Fusion[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2025,42(4):80-87.
[16]MIAO C,CHU Q,LI W,et al.Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature[C]//2021 International Conference on Visual Communications and Image Processing.2021:1-5.
[17]RÖSSLER A,COZZOLINO D,VERDOLIVA L,et al.Facefo-rensics++:Learning to detect manipulated facial images[C]//IEEE/CVF International Conference on Computer Vision(ICCV 2019).2019:1-11.
[18]WANG J,WU Z,OUYANG W,et al.M2TR:Multi-modalMulti-scale Transformers for Deepfake Detection[C]//Procee-dings of the 2022 International Conference on Multimedia Retrieval.2022:615-623.
[19]LI Y,YANG X,SUN P,et al.Celeb-df:A large-scale challenging dataset for Deepfake forensics[C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR 2020).2020:3204-3213.
[20]DOLHANSKY B,HOWES R,PFLAUM B,et al.The Deepfake detection challenge(DFDC) preview dataset[J].arXiv:1910.08854,2019.
[21]ZI B,CHANG M,CHEN J,et al.WildDeepfake:A challenging real-world dataset for Deepfake detection[C]//Proceedings of the 28th ACM International Conference on Multimedia.2020:2382-2390.
[22]YANG X,LI Y,LYU S.Exposing deep fakes using inconsistent head poses[C]//2019 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP 2019).2019:8261-8265.
[23]DENG J,GUO J,VERVERAS E,et al.Retinaface:Single-shot multi-level face localisation in the wild[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2020:5202-5211.
[24]LIU H,LI X,ZHOU W,et al.Spatial-phase shallow learning:Rethinking face forgery detection in frequency domain[C]//2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR).2021:772-781.
[25]BADR N E A,NEBEL J C,GREENHILL D,et al.WaViT-CDC:Wavelet Vision Transformer With Central Difference Convolutions for Spatial-Frequency Deepfake Detection[J].IEEE Open Journal of Signal Processing,2025,6:621-630.
[26]MIAO C,TAN Z,CHU Q,et al.Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection[J].IEEE Transactions on Information Forensics and Security,2022,17:3008-3021.
[27]WANG J,SUN Y,TANG J.Lisiam:Localization invariance Siamese network for Deepfake detection[J].IEEE Transactions on Information Forensics and Security,2022,17:2425-2436.
[28]MIAO C,TAN Z,CHU Q,et al.F2Trans:High-FrequencyFine-Grained Transformer for Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2023,18:1039-1051.
[29]ZHUANG W,CHU Q,TAN Z,et al.UIA-ViT:Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection[C]//Computer Vision-ECCV 2022.2022:391-407.
[30]GAO J,MICHELETTO M,ORRÙ G,et al.Texture and Artifact Decomposition for Improving Generalization in Deep-Lear-ning-Based Deepfake Detection[J].Engineering Applications of Artificial Intelligence,2024,133(C):108450.
[31]GONG R,HE R,ZHANG D,et al.Robust face forgery detection integrating local texture and global texture information[J].EURASIP Journal on Information Security,2025,2025(3):1-14.
[32]ZHAO Y,JIN X,GAO S,et al.TAN-GFD:generalizing face forgery detection based on textureinformation and adaptive noise mining[J].Applied Intelligence,2023,53:19007-19027.
[33]JIANG Q,LIU S,MIAO S,et al.Robust manipulated media localization and detection based on high frequency and texture features[J].Discover Computing,2025,28(1):1-17.
[34]TIAN J H,CHEN P,YU C,et al.Learning to Discover Forgery Cues for Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2024,19:3814-3828.
[35]ZHENG J S,ZHOU Y C,ZHANG N,et al.A Spatio-Frequency Cross Fusion Model for Deepfake Detection and Segmentation[J].Neurocomputing,2025,628:129683.
[36]LUO A,KONG C,HUANG J,et al.Beyond the Prior Forgery Knowledge:Mining Critical Clues for General Face Forgery Detection[J].IEEE Transactions on Information Forensics and Security,2024,19:1168-1182.
[37]DONG F,ZOU X,WANG J,et al.Contrastive Learning-Based General Deepfake Detection with Multi-Scale RGB Frequency Clues[J].Journal of King Saud University-Computer and Information Sciences,2023,35(4):90-99.
[38]SELVARAJU R,COGSWELL M,DAS A,et al.Grad-CAM:Visual Explanations from Deep Networks via Gradient-Based Localization[C]//2017 IEEE International Conference on Computer Vision(ICCV).2017:618-626.
[1] ZHAO Binbei, ZHU Li, ZHAO Hongli, LI Yutong. Computer Vision Applications in Rail Transit Systems [J]. Computer Science, 2026, 53(3): 214-224.
[2] GUO Xingxing, XIAO Yannan, WEN Peizhi, XU Zhi, HUANG Wenming. Attention-based Audio-driven Digital Face Video Generation Method [J]. Computer Science, 2026, 53(2): 245-252.
[3] LI Mengxi, GAO Xindan, LI Xue. Two-way Feature Augmentation Graph Convolution Networks Algorithm [J]. Computer Science, 2025, 52(7): 127-134.
[4] LIU Yuanhong, WU Yubin. Local Linear Embedding Algorithm Based on Probability Model and Information Entropy [J]. Computer Science, 2025, 52(6A): 240500021-8.
[5] WU Zhihua, CHENG Jianghua, LIU Tong, CAI Yahui, CHENG Bang, PAN Lehao. Human Target Detection Algorithm for Low-quality Laser Through-window Imaging [J]. Computer Science, 2025, 52(6A): 240600069-6.
[6] MIAO Zhuang, CUI Haoran, ZHANG Qiyang, WANG Jiabao, LI Yang. Restoration of Atmospheric Turbulence-degraded Images Based on Contrastive Learning [J]. Computer Science, 2025, 52(5): 171-178.
[7] KONG Yu, XIONG Fengguang, ZHANG Zhiqiang, SHEN Chaofan, HU Mingyue. Low Overlap Point Cloud Registration Method Based on Deep Position-aware Transformer [J]. Computer Science, 2025, 52(5): 199-211.
[8] LI Xiaolan, MA Yong. Study on Lightweight Flame Detection Algorithm with Progressive Adaptive Feature Fusion [J]. Computer Science, 2025, 52(4): 64-73.
[9] WANG Mengwei, YANG Zhe. Speaker Verification Method Based on Sub-band Front-end Model and Inverse Feature Fusion [J]. Computer Science, 2025, 52(3): 214-221.
[10] ZUO Xuhong, WANG Yongquan, QIU Geping. Study on Integrated Model of Securities Illegal Margin Trading Accounts Identification Based on Trading Behavior Characteristics [J]. Computer Science, 2025, 52(2): 125-133.
[11] WANG Kangyue, CHENG Ming, XIE Yixiang, ZOU Xiaobing, LI Ming. Role-aware Speaker Diarization in Autism Interview Scenarios [J]. Computer Science, 2025, 52(2): 231-241.
[12] MIAO Lin, SHEN Hongjing, WANG Li, CAO Yiwen, LU Chongyu. Design of Centralized Management and Control Platform for Multi-system HeterogeneousAerospace TT&C and Data Transmission Resources [J]. Computer Science, 2025, 52(11A): 250200110-6.
[13] ZHU Sifan, ZHU Guosheng. Retinal Vessel Segmentation Based on Multi-scale Attention [J]. Computer Science, 2025, 52(11A): 241200112-10.
[14] YUE Qianwen, WANG Dongqiang, ZHANG Qiang. Point Cloud Registration Network Integrating Adaptive Optimization and Multi-dimensional Focusing [J]. Computer Science, 2025, 52(11A): 250100019-7.
[15] ZHANG Wei, CAI Yufan, YE Lintao, LIU Dazhi. Real-time Transformer Small Target Detection Model Based on Feature Extraction Enhancement and Pyramid Structure [J]. Computer Science, 2025, 52(11A): 250100139-11.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!