Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Synthetic data in human analysis: A survey

I Joshi, M Grimmer, C Rathgeb, C Busch… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
Deep neural networks have become prevalent in human analysis, boosting the performance
of applications, such as biometric recognition, action recognition, as well as person re …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Deepfakeson-phys: Deepfakes detection based on heart rate estimation

J Hernandez-Ortega, R Tolosana, J Fierrez… - arXiv preprint arXiv …, 2020 - arxiv.org
This work introduces a novel DeepFake detection framework based on physiological
measurement. In particular, we consider information related to the heart rate using remote …

[HTML][HTML] DeepFakes detection across generations: Analysis of facial regions, fusion, and performance evaluation

R Tolosana, S Romero-Tapiador… - … Applications of Artificial …, 2022 - Elsevier
Media forensics has attracted a tremendous attention in the last years in part due to the
increasing concerns around DeepFakes. Since the release of the initial DeepFakes …

Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

A comprehensive review of face morph generation and detection of fraudulent identities

M Hamza, S Tehsin, M Humayun, MF Almufareh… - Applied Sciences, 2022 - mdpi.com
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …

Face morphing attack detection and localization based on feature-wise supervision

L Qin, F Peng, M Long - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …