Face image quality assessment: A literature survey

T Schlett, C Rathgeb, O Henniger, J Galbally… - ACM Computing …, 2022 - dl.acm.org
The performance of face analysis and recognition systems depends on the quality of the
acquired face data, which is influenced by numerous factors. Automatically assessing the …

Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection

JC Neves, R Tolosana… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The availability of large-scale facial databases, together with the remarkable progresses of
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

ASVspoof: the automatic speaker verification spoofing and countermeasures challenge

Z Wu, J Yamagishi, T Kinnunen… - IEEE Journal of …, 2017 - ieeexplore.ieee.org
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

A comprehensive study on face recognition biases beyond demographics

P Terhörst, JN Kolf, M Huber… - … on Technology and …, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have a growing effect on critical decision-making processes.
Recent works have shown that FR solutions show strong performance differences based on …

Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems

M Baskar, R Renuka Devi, J Ramkumar… - Neural Processing …, 2023 - Springer
The problem of forgery detection has been well studied and the forged finger prints
produces highly impacting results in the biometric based security systems. There are many …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Face forgery detection by 3d decomposition

X Zhu, H Wang, H Fei, Z Lei… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Detecting digital face manipulation has attracted extensive attention due to the potential
harms of fake media to the public. However, recent advances have been able to reduce the …

Fooling end-to-end speaker verification with adversarial examples

F Kreuk, Y Adi, M Cisse, J Keshet - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Automatic speaker verification systems are increasingly used as the primary means to
authenticate costumers. Recently, it has been proposed to train speaker verification systems …