Synthetic data in human analysis: A survey
Deep neural networks have become prevalent in human analysis, boosting the performance
of applications, such as biometric recognition, action recognition, as well as person re …
of applications, such as biometric recognition, action recognition, as well as person re …
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …
learning make deepfakes highly believable, and very difficult to differentiate between what is …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
[HTML][HTML] Towards generalized morphing attack detection by learning residuals
Face recognition systems (FRS) are vulnerable to different kinds of attacks. Morphing attack
combines multiple face images to obtain a single face image that can verify equally against …
combines multiple face images to obtain a single face image that can verify equally against …
Face morphing attack detection and localization based on feature-wise supervision
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …
countermeasures were proposed. However, in the existing face morphing attack detection …
Morphganformer: Transformer-based face morphing and de-morphing
Semantic face image manipulation has received increasing attention in recent years.
StyleGAN-based approaches to face morphing are among the leading techniques; however …
StyleGAN-based approaches to face morphing are among the leading techniques; however …
[PDF][PDF] Adversarial attacks on face recognition systems
Face recognition has been widely used for identity verification both in supervised and
unsupervised access control applications. The advancement in deep neural networks has …
unsupervised access control applications. The advancement in deep neural networks has …
[PDF][PDF] An introduction to digital face manipulation
Digital manipulation has become a thriving topic in the last few years, especially after the
popularity of the term DeepFakes. This chapter introduces the prominent digital …
popularity of the term DeepFakes. This chapter introduces the prominent digital …
Analyzing human observer ability in morphing attack detection—Where do we stand?
SR Godage, F Løvåsdal, S Venkatesh… - … on Technology and …, 2022 - ieeexplore.ieee.org
Morphing attacks are based on the technique of digitally fusing two (or more) face images
into one, with the final visage resembling the contributing faces. Morphed images not only …
into one, with the final visage resembling the contributing faces. Morphed images not only …