Face recognition: Past, present and future (a review)

M Taskiran, N Kahraman, CE Erdem - Digital Signal Processing, 2020 - Elsevier
Biometric systems have the goal of measuring and analyzing the unique physical or
behavioral characteristics of an individual. The main feature of biometric systems is the use …

Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

DeepFake detection for human face images and videos: A survey

A Malik, M Kuribayashi, SM Abdullahi, AN Khan - Ieee Access, 2022 - ieeexplore.ieee.org
Techniques for creating and manipulating multimedia information have progressed to the
point where they can now ensure a high degree of realism. DeepFake is a generative deep …

Variational model inversion attacks

KC Wang, Y Fu, K Li, A Khisti… - Advances in Neural …, 2021 - proceedings.neurips.cc
Given the ubiquity of deep neural networks, it is important that these models do not reveal
information about sensitive data that they have been trained on. In model inversion attacks …

OULU-NPU: A mobile face presentation attack database with real-world variations

Z Boulkenafet, J Komulainen, L Li… - 2017 12th IEEE …, 2017 - ieeexplore.ieee.org
The vulnerabilities of face-based biometric systems to presentation attacks have been finally
recognized but yet we lack generalized software-based face presentation attack detection …

Face spoofing detection using colour texture analysis

Z Boulkenafet, J Komulainen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Research on non-intrusive software-based face spoofing detection schemes has been
mainly focused on the analysis of the luminance information of the face images, hence …

Secure face unlock: Spoof detection on smartphones

K Patel, H Han, AK Jain - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …

Identification of deep network generated images using disparities in color components

H Li, B Li, S Tan, J Huang - Signal Processing, 2020 - Elsevier
With the powerful deep network architectures, such as generative adversarial networks, one
can easily generate photorealistic images. Although the generated images are not …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …