Synthetic data in human analysis: A survey

I Joshi, M Grimmer, C Rathgeb, C Busch… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
Deep neural networks have become prevalent in human analysis, boosting the performance
of applications, such as biometric recognition, action recognition, as well as person re …

Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Pw-mad: Pixel-wise supervision for generalized face morphing attack detection

N Damer, N Spiller, M Fang, F Boutros… - Advances in Visual …, 2021 - Springer
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …

[HTML][HTML] Towards generalized morphing attack detection by learning residuals

K Raja, G Gupta, S Venkatesh, R Ramachandra… - Image and Vision …, 2022 - Elsevier
Face recognition systems (FRS) are vulnerable to different kinds of attacks. Morphing attack
combines multiple face images to obtain a single face image that can verify equally against …

Face morphing attack detection and localization based on feature-wise supervision

L Qin, F Peng, M Long - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …

Morphganformer: Transformer-based face morphing and de-morphing

N Zhang, X Liu, X Li, GJ Qi - arXiv preprint arXiv:2302.09404, 2023 - arxiv.org
Semantic face image manipulation has received increasing attention in recent years.
StyleGAN-based approaches to face morphing are among the leading techniques; however …

[PDF][PDF] Adversarial attacks on face recognition systems

Y Xu, K Raja, R Ramachandra… - Handbook of Digital Face …, 2022 - library.oapen.org
Face recognition has been widely used for identity verification both in supervised and
unsupervised access control applications. The advancement in deep neural networks has …

[PDF][PDF] An introduction to digital face manipulation

R Tolosana, R Vera-Rodriguez, J Fierrez… - Handbook of Digital …, 2022 - library.oapen.org
Digital manipulation has become a thriving topic in the last few years, especially after the
popularity of the term DeepFakes. This chapter introduces the prominent digital …

Analyzing human observer ability in morphing attack detection—Where do we stand?

SR Godage, F Løvåsdal, S Venkatesh… - … on Technology and …, 2022 - ieeexplore.ieee.org
Morphing attacks are based on the technique of digitally fusing two (or more) face images
into one, with the final visage resembling the contributing faces. Morphed images not only …