ディープフェイク検出技術の脆弱性を発見(Deepfake detection methods vulnerable to attack)

2026-03-25 エディンバラ大学

University of Edinburghの研究によると、現在のディープフェイク検出技術は攻撃に対して脆弱であることが明らかになった。研究では、検出AIに対してわずかな画像改変(敵対的攻撃)を加えるだけで、高精度とされる検出モデルでも誤判定が発生することを実証。特に人間にはほぼ認識できない微小なノイズが、検出精度を大きく低下させる要因となる。これは、AIモデルが特定の特徴に過度依存していることに起因する。結果として、現行のディープフェイク対策の信頼性には課題があり、より堅牢で耐攻撃性の高い検出手法の開発が必要とされる。本研究は、情報セキュリティやメディア信頼性の観点から重要な示唆を与える。

ディープフェイク検出技術の脆弱性を発見(Deepfake detection methods vulnerable to attack)
Image credit: Getty Images / SmileStudioAP

<関連情報>

指紋のにじみ:AI画像指紋の堅牢性に関する体系的な評価 Smudged Fingerprints: A Systematic Evaluation of the Robustness of AI Image Fingerprints

Kai Yao, Marc Juarez
arXiv  last revised 21 Jan 2026 (this version, v2)
DOI:https://doi.org/10.48550/arXiv.2512.11771

Abstract

Model fingerprint detection has shown promise to trace the provenance of AI-generated images in forensic applications. However, despite the inherent adversarial nature of these applications, existing evaluations rarely consider adversarial settings. We present the first systematic security evaluation of these techniques, formalizing threat models that encompass both white- and black-box access and two attack goals: fingerprint removal, which erases identifying traces to evade attribution, and fingerprint forgery, which seeks to cause misattribution to a target model. We implement five attack strategies and evaluate 14 representative fingerprinting methods across RGB, frequency, and learned-feature domains on 12 state-of-the-art image generators. Our experiments reveal a pronounced gap between clean and adversarial performance. Removal attacks are highly effective, often achieving success rates above 80% in white-box settings and over 50% under black-box access. While forgery is more challenging than removal, its success varies significantly across targeted models. We also observe a utility-robustness trade-off: accurate attribution methods are often vulnerable to attacks and, although some techniques are robust in specific settings, none achieves robustness and accuracy across all evaluated threat models. These findings highlight the need for techniques that balance robustness and accuracy, and we identify the most promising approaches toward this goal. Code available at: this https URL.

1603情報システム・データ工学
ad
ad
Follow
ad
タイトルとURLをコピーしました