The creation and detection of deepfakes: A survey
Generative deep learning algorithms have progressed to a point where it is difficult to tell the
difference between what is real and what is fake. In 2018, it was discovered how easy it is to …
difference between what is real and what is fake. In 2018, it was discovered how easy it is to …
A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities
When used maliciously, deepfake can pose detrimental implications to political and social
forces including reducing public trust in institutions, damaging the reputation of prominent …
forces including reducing public trust in institutions, damaging the reputation of prominent …
Deepfakes: a new threat to face recognition? assessment and detection
P Korshunov, S Marcel - arXiv preprint arXiv:1812.08685, 2018 - arxiv.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …
the face of another person by using a pre-trained generative adversarial network (GAN) …
Face recognition systems under morphing attacks: A survey
U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
Vulnerability assessment and detection of deepfake videos
P Korshunov, S Marcel - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …
the face of another person by using a pre-trained generative adversarial network (GAN) …
Deep face representations for differential morphing attack detection
U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Detection of face morphing attacks based on PRNU analysis
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis
CZ Yang, J Ma, S Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent research has demonstrated that lip-based speaker authentication systems can not
only achieve good authentication performance but also guarantee liveness. However, with …
only achieve good authentication performance but also guarantee liveness. However, with …
Detecting and mitigating adversarial perturbations for robust face recognition
Deep neural network (DNN) architecture based models have high expressive power and
learning capacity. However, they are essentially a black box method since it is not easy to …
learning capacity. However, they are essentially a black box method since it is not easy to …
Deepfake detection: humans vs. machines
P Korshunov, S Marcel - arXiv preprint arXiv:2009.03155, 2020 - arxiv.org
Deepfake videos, where a person's face is automatically swapped with a face of someone
else, are becoming easier to generate with more realistic results. In response to the threat …
else, are becoming easier to generate with more realistic results. In response to the threat …