{"title":"A Survey on Proactive Deepfake Defense: Disruption and Watermarking","authors":"Hong-Hanh Nguyen-Le, Van-Tuan Tran, Thuc Nguyen, Nhien-An Le-Khac","doi":"10.1145/3771296","DOIUrl":null,"url":null,"abstract":"The rapid proliferation of generative AI has led to led to unprecedented capabilities in synthesizing realistic deepfakes (DFs) across multiple modalities. This raises significant concerns regarding privacy, security, and copyright protection. Unlike passive detection approaches that operate after DFs have been created and distributed, proactive defense mechanisms aim to prevent the generation of malicious synthetic content at its source. This paper provides a comprehensive survey of current proactive DF defense strategies, including Disruption and Watermarking. Disruption approaches protect individuals’ data by introducing imperceptible perturbations that prevent unauthorized exploitation by generative models, while watermarking approaches embed verifiable messages into data or models to enable content authentication and attribution. We also analyze proactive approaches across various evaluation metrics (imperceptibility, protectability/detectability, transferability, traceability, and robustness), and examine their effectiveness in real-world settings. Furthermore, we review the evolution of DF generation techniques, highlighting their rapid developments. Finally, we identify key challenges and promising future research directions to enhance proactive defense mechanisms.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":28.0000,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Computing Surveys","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3771296","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid proliferation of generative AI has led to led to unprecedented capabilities in synthesizing realistic deepfakes (DFs) across multiple modalities. This raises significant concerns regarding privacy, security, and copyright protection. Unlike passive detection approaches that operate after DFs have been created and distributed, proactive defense mechanisms aim to prevent the generation of malicious synthetic content at its source. This paper provides a comprehensive survey of current proactive DF defense strategies, including Disruption and Watermarking. Disruption approaches protect individuals’ data by introducing imperceptible perturbations that prevent unauthorized exploitation by generative models, while watermarking approaches embed verifiable messages into data or models to enable content authentication and attribution. We also analyze proactive approaches across various evaluation metrics (imperceptibility, protectability/detectability, transferability, traceability, and robustness), and examine their effectiveness in real-world settings. Furthermore, we review the evolution of DF generation techniques, highlighting their rapid developments. Finally, we identify key challenges and promising future research directions to enhance proactive defense mechanisms.
期刊介绍:
ACM Computing Surveys is an academic journal that focuses on publishing surveys and tutorials on various areas of computing research and practice. The journal aims to provide comprehensive and easily understandable articles that guide readers through the literature and help them understand topics outside their specialties. In terms of impact, CSUR has a high reputation with a 2022 Impact Factor of 16.6. It is ranked 3rd out of 111 journals in the field of Computer Science Theory & Methods.
ACM Computing Surveys is indexed and abstracted in various services, including AI2 Semantic Scholar, Baidu, Clarivate/ISI: JCR, CNKI, DeepDyve, DTU, EBSCO: EDS/HOST, and IET Inspec, among others.