Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Synthetic data in human analysis: A survey
Deep neural networks have become prevalent in human analysis, boosting the performance
of applications, such as biometric recognition, action recognition, as well as person re …
of applications, such as biometric recognition, action recognition, as well as person re …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Deepfakeson-phys: Deepfakes detection based on heart rate estimation
This work introduces a novel DeepFake detection framework based on physiological
measurement. In particular, we consider information related to the heart rate using remote …
measurement. In particular, we consider information related to the heart rate using remote …
[HTML][HTML] DeepFakes detection across generations: Analysis of facial regions, fusion, and performance evaluation
R Tolosana, S Romero-Tapiador… - … Applications of Artificial …, 2022 - Elsevier
Media forensics has attracted a tremendous attention in the last years in part due to the
increasing concerns around DeepFakes. Since the release of the initial DeepFakes …
increasing concerns around DeepFakes. Since the release of the initial DeepFakes …
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …
learning make deepfakes highly believable, and very difficult to differentiate between what is …
A comprehensive review of face morph generation and detection of fraudulent identities
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …
authorized control access to lawful resources. Due to the availability of modern image …
Face morphing attack detection and localization based on feature-wise supervision
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …
countermeasures were proposed. However, in the existing face morphing attack detection …