Face image quality assessment: A literature survey
The performance of face analysis and recognition systems depends on the quality of the
acquired face data, which is influenced by numerous factors. Automatically assessing the …
acquired face data, which is influenced by numerous factors. Automatically assessing the …
Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection
The availability of large-scale facial databases, together with the remarkable progresses of
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
ASVspoof: the automatic speaker verification spoofing and countermeasures challenge
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
Biometric face presentation attack detection with multi-channel convolutional neural network
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
A comprehensive study on face recognition biases beyond demographics
Face recognition (FR) systems have a growing effect on critical decision-making processes.
Recent works have shown that FR solutions show strong performance differences based on …
Recent works have shown that FR solutions show strong performance differences based on …
Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems
The problem of forgery detection has been well studied and the forged finger prints
produces highly impacting results in the biometric based security systems. There are many …
produces highly impacting results in the biometric based security systems. There are many …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Face forgery detection by 3d decomposition
Detecting digital face manipulation has attracted extensive attention due to the potential
harms of fake media to the public. However, recent advances have been able to reduce the …
harms of fake media to the public. However, recent advances have been able to reduce the …
Fooling end-to-end speaker verification with adversarial examples
Automatic speaker verification systems are increasingly used as the primary means to
authenticate costumers. Recently, it has been proposed to train speaker verification systems …
authenticate costumers. Recently, it has been proposed to train speaker verification systems …