Unified detection of digital and physical face attacks

D Deb, X Liu, AK Jain - 2023 IEEE 17th International …, 2023 - ieeexplore.ieee.org
State-of-the-art defense mechanisms against face attacks achieve near perfect accuracies
within one of three attack categories, namely adversarial, digital manipulation, or physical …

Unsupervised face morphing attack detection via self-paced anomaly detection

M Fang, F Boutros, N Damer - 2022 IEEE International Joint …, 2022 - ieeexplore.ieee.org
The supervised-learning-based morphing attack detection (MAD) solutions achieve
outstanding success in dealing with attacks from known morphing techniques and known …

Face Morphing Attack Detection with Denoising Diffusion Probabilistic Models

M Ivanovska, V Štruc - 2023 11th International Workshop on …, 2023 - ieeexplore.ieee.org
Morphed face images have recently become a growing concern for existing face verification
systems, as they are relatively easy to generate and can be used to impersonate someone's …

Conditional face image manipulation detection: combining algorithm and human examiner decisions

M Ibsen, R Nichols, C Rathgeb, DJ Robertson… - Proceedings of the …, 2024 - dl.acm.org
It has been shown that digitally manipulated face images can pose a security threat to
automated authentication systems (eg, when such systems are used for border control). In …

Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection

M Ibsen, C Rathgeb, F Brechtel, R Klepp… - IEEE …, 2023 - ieeexplore.ieee.org
Face recognition systems are widely deployed for biometric authentication. Despite this, it is
well-known that, without any safeguards, face recognition systems are highly vulnerable to …

TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks

M Ibsen, LJ González-Soler, C Rathgeb… - arXiv preprint arXiv …, 2024 - arxiv.org
Face recognition systems are widely deployed in high-security applications such as for
biometric verification at border controls. Despite their high accuracy on pristine data, it is well …

Reliable detection of doppelgängers based on deep face representations

C Rathgeb, D Fischer, P Drozdowski, C Busch - IET Biometrics, 2022 - Wiley Online Library
Doppelgängers (or lookalikes) usually yield an increased probability of false matches in a
facial recognition system, as opposed to random face image pairs selected for non‐mated …

Evaluation Techniques to Detect Face Morphing Vulnerabilities for Differential Images

GR Chalini, KV Kanimozhi - 2024 5th International Conference …, 2024 - ieeexplore.ieee.org
Real-time facial recognition has been effectively implemented in a variety of secure
applications, including border control. The biometric community has expressed a significant …

Secure Face Recognition Against Digital And Physical Manipulations

M Ibsen - 2024 - opus4.kobv.de
Biometric systems, particularly face recognition (FR) systems, have become ubiquitous and
are used in many real-world authentication scenarios, ranging from unlocking smartphone …

[PDF][PDF] Maschinelles Lernen in der digitalen Forensik

NM Mühlberger - 2024 - pub.fh-campuswien.ac.at
Da Cyberkriminalität immer mehr zunimmt und es immer einfacher wird Malware und
Ransomware zu erwerben und zu verwenden, selbst wenn man keine oder fast keine …