Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

[HTML][HTML] Video and audio deepfake datasets and open issues in deepfake technology: being ahead of the curve

Z Akhtar, TL Pendyala, VS Athmakuri - Forensic Sciences, 2024 - mdpi.com
The revolutionary breakthroughs in Machine Learning (ML) and Artificial Intelligence (AI) are
extensively being harnessed across a diverse range of domains, eg, forensic science …

Multi-attention-based approach for deepfake face and expression swap detection and localization

S Waseem, SARS Abu-Bakar, Z Omar… - EURASIP Journal on …, 2023 - Springer
Advancements in facial manipulation technology have resulted in highly realistic and
indistinguishable face and expression swap videos. However, this has also raised concerns …

Virtual human: A comprehensive survey on academic and applications

L Cui, J Liu - IEEE Access, 2023 - ieeexplore.ieee.org
As a creative method for virtual human individuals based on multiple fusion technologies
such as artificial intelligence, computer graphics, and speech synthesis, virtual human …

INDIFACE: Illuminating India's Deepfake Landscape with a Comprehensive Synthetic Dataset

K Kuckreja, X Hoque, N Poddar… - 2024 IEEE 18th …, 2024 - ieeexplore.ieee.org
Due to the recent progress in Deepfake generation, several datasets and manipulation
techniques have been proposed in the recent literature with various effective face-swap and …

Making social media applications inclusive for deaf end-users with access to sign language

A Yeratziotis, A Achilleos, S Koumou, G Zampas… - Multimedia Tools and …, 2023 - Springer
Social media apps such as WhatsApp, Messenger, Telegram and Viber are primary
communication channels for most people today. Even within these Mainstream Social Media …

Kandinsky 3: Text-to-image synthesis for multifunctional generative framework

V Arkhipkin, V Vasilev, A Filatov, I Pavlov… - arXiv preprint arXiv …, 2024 - arxiv.org
Text-to-image (T2I) diffusion models are popular for introducing image manipulation
methods, such as editing, image fusion, inpainting, etc. At the same time, image-to-video …

Ximswap: Many-to-many face swapping for tinyml

A Ancilotto, F Paissan, E Farella - ACM Transactions on Embedded …, 2024 - dl.acm.org
The unprecedented development of deep learning approaches for video processing has
caused growing privacy concerns. To ensure data analysis while maintaining privacy, it is …

Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection

D Liu, T Chen, C Peng, N Wang, R Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Due to the successful development of deep image generation technology, visual data
forgery detection would play a more important role in social and economic security. Existing …

A deep dive into enhancing sharing of naturalistic driving data through face deidentification

S Thapa, A Sarkar - The Visual Computer, 2024 - Springer
Human factors research in transportation relies on naturalistic driving studies (NDS) which
collect real-world data from drivers on actual roads. NDS data offer valuable insights into …