Generative adversarial networks: A survey toward private and secure applications

Z Cai, Z **ong, H Xu, P Wang, W Li, Y Pan - ACM Computing Surveys …, 2021 - dl.acm.org
Generative Adversarial Networks (GANs) have promoted a variety of applications in
computer vision and natural language processing, among others, due to its generative …

Synthetic data for face recognition: Current state and future prospects

F Boutros, V Struc, J Fierrez, N Damer - Image and Vision Computing, 2023 - Elsevier
Over the past years, deep learning capabilities and the availability of large-scale training
datasets advanced rapidly, leading to breakthroughs in face recognition accuracy. However …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

[HTML][HTML] Warning: Humans cannot reliably detect speech deepfakes

KT Mai, S Bray, T Davies, LD Griffin - Plos one, 2023 - journals.plos.org
Speech deepfakes are artificial voices generated by machine learning models. Previous
literature has highlighted deepfakes as one of the biggest security threats arising from …

Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection

S Venkatesh, H Zhang, R Ramachandra… - … on Biometrics and …, 2020 - ieeexplore.ieee.org
The primary objective of face morphing is to com-bine face images of different data subjects
(eg an malicious actor and an accomplice) to generate a face image that can be equally …