Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

A comprehensive survey on methods for image integrity

P Capasso, G Cattaneo, M De Marsico - ACM Transactions on …, 2024 - dl.acm.org
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Benford's law applied to digital forensic analysis

P Fernandes, M Antunes - Forensic Science International: Digital …, 2023 - Elsevier
Tampered digital multimedia content has been increasingly used in a wide set of
cyberattacks, challenging criminal investigations and law enforcement authorities. The …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Adversarial attacks against face recognition: A comprehensive study

F Vakhshiteh, A Nickabadi, R Ramachandra - IEEE Access, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …

Learning to discover forgery cues for face forgery detection

J Tian, P Chen, C Yu, X Fu, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Locating manipulation maps, ie, pixel-level annotation of forgery cues, is crucial for
providing interpretable detection results in face forgery detection. Related learning objects …

FD-GAN: Face de-morphing generative adversarial network for restoring accomplice's facial image

F Peng, LB Zhang, M Long - IEEE Access, 2019 - ieeexplore.ieee.org
Face morphing attack is proved to be a serious threat to the existing face recognition
systems. Although a few face morphing detection methods have been put forward, the face …

Border control morphing attack detection with a convolutional neural network de-morphing approach

D Ortega-Delcampo, C Conde… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the use of biometric identification, automated or semiautomated, is a reality. For
this reason, the number of attacks has increased in such systems. One of the most common …