Analysis survey on deepfake detection and recognition with convolutional neural networks

SR Ahmed, E Sonuç, MR Ahmed… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Deep Learning (DL) is the most efficient technique to handle a wide range of challenging
problems such as data analytics, diagnosing diseases, detecting anomalies, etc. The …

Deepfakes generation and detection: a short survey

Z Akhtar - Journal of Imaging, 2023 - mdpi.com
Advancements in deep learning techniques and the availability of free, large databases
have made it possible, even for non-technical people, to either manipulate or generate …

Deep learning for deepfakes creation and detection: A survey

TT Nguyen, QVH Nguyen, DT Nguyen… - Computer Vision and …, 2022 - Elsevier
Deep learning has been successfully applied to solve various complex problems ranging
from big data analytics to computer vision and human-level control. Deep learning advances …

DeepFake detection for human face images and videos: A survey

A Malik, M Kuribayashi, SM Abdullahi, AN Khan - Ieee Access, 2022 - ieeexplore.ieee.org
Techniques for creating and manipulating multimedia information have progressed to the
point where they can now ensure a high degree of realism. DeepFake is a generative deep …

Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

[Retracted] Comparative Analysis of Deepfake Image Detection Method Using Convolutional Neural Network

HS Shad, MM Rizvee, NT Roza… - Computational …, 2021 - Wiley Online Library
Generation Z is a data‐driven generation. Everyone has the entirety of humanity's
knowledge in their hands. The technological possibilities are endless. However, we use and …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …