Synthetic data for face recognition: Current state and future prospects
Over the past years, deep learning capabilities and the availability of large-scale training
datasets advanced rapidly, leading to breakthroughs in face recognition accuracy. However …
datasets advanced rapidly, leading to breakthroughs in face recognition accuracy. However …
Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Synthetic data in human analysis: A survey
Deep neural networks have become prevalent in human analysis, boosting the performance
of applications, such as biometric recognition, action recognition, as well as person re …
of applications, such as biometric recognition, action recognition, as well as person re …
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …
learning make deepfakes highly believable, and very difficult to differentiate between what is …
Generation and detection of manipulated multimodal audiovisual content: Advances, trends and open challenges
Generative deep learning techniques have invaded the public discourse recently. Despite
the advantages, the applications to disinformation are concerning as the counter-measures …
the advantages, the applications to disinformation are concerning as the counter-measures …
Are GAN-based morphs threatening face recognition?
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …
identity document can be altered. This form of attack presents an important issue in …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders
Investigating new methods of creating face morphing attacks is essential to foresee novel
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …