The creation and detection of deepfakes: A survey

Y Mirsky, W Lee - ACM computing surveys (CSUR), 2021 - dl.acm.org
Generative deep learning algorithms have progressed to a point where it is difficult to tell the
difference between what is real and what is fake. In 2018, it was discovered how easy it is to …

A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities

JW Seow, MK Lim, RCW Phan, JK Liu - Neurocomputing, 2022 - Elsevier
When used maliciously, deepfake can pose detrimental implications to political and social
forces including reducing public trust in institutions, damaging the reputation of prominent …

Deepfakes: a new threat to face recognition? assessment and detection

P Korshunov, S Marcel - arXiv preprint arXiv:1812.08685, 2018 - arxiv.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Vulnerability assessment and detection of deepfake videos

P Korshunov, S Marcel - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
It is becoming increasingly easy to automatically replace a face of one person in a video with
the face of another person by using a pre-trained generative adversarial network (GAN) …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis

CZ Yang, J Ma, S Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent research has demonstrated that lip-based speaker authentication systems can not
only achieve good authentication performance but also guarantee liveness. However, with …

Detecting and mitigating adversarial perturbations for robust face recognition

G Goswami, A Agarwal, N Ratha, R Singh… - International Journal of …, 2019 - Springer
Deep neural network (DNN) architecture based models have high expressive power and
learning capacity. However, they are essentially a black box method since it is not easy to …

Deepfake detection: humans vs. machines

P Korshunov, S Marcel - arXiv preprint arXiv:2009.03155, 2020 - arxiv.org
Deepfake videos, where a person's face is automatically swapped with a face of someone
else, are becoming easier to generate with more realistic results. In response to the threat …