Analysis survey on deepfake detection and recognition with convolutional neural networks
Deep Learning (DL) is the most efficient technique to handle a wide range of challenging
problems such as data analytics, diagnosing diseases, detecting anomalies, etc. The …
problems such as data analytics, diagnosing diseases, detecting anomalies, etc. The …
Deepfakes generation and detection: a short survey
Z Akhtar - Journal of Imaging, 2023 - mdpi.com
Advancements in deep learning techniques and the availability of free, large databases
have made it possible, even for non-technical people, to either manipulate or generate …
have made it possible, even for non-technical people, to either manipulate or generate …
Deep learning for deepfakes creation and detection: A survey
Deep learning has been successfully applied to solve various complex problems ranging
from big data analytics to computer vision and human-level control. Deep learning advances …
from big data analytics to computer vision and human-level control. Deep learning advances …
DeepFake detection for human face images and videos: A survey
Techniques for creating and manipulating multimedia information have progressed to the
point where they can now ensure a high degree of realism. DeepFake is a generative deep …
point where they can now ensure a high degree of realism. DeepFake is a generative deep …
Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
[Retracted] Comparative Analysis of Deepfake Image Detection Method Using Convolutional Neural Network
HS Shad, MM Rizvee, NT Roza… - Computational …, 2021 - Wiley Online Library
Generation Z is a data‐driven generation. Everyone has the entirety of humanity's
knowledge in their hands. The technological possibilities are endless. However, we use and …
knowledge in their hands. The technological possibilities are endless. However, we use and …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Deep face representations for differential morphing attack detection
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …