2022
DOI: 10.1007/978-3-030-87664-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Digital Face Manipulation in Biometric Systems

Abstract: Biometric technologies, in particular facerecognition, are employed in many personal, commercial, and governmental identity management systems around the world. The processing of digitally manipulated face images within a face recognition system may lead to false decisions and thus decrease the reliability of the decision system. This necessitates the development of manipulation detection modules which can be seamlessly integrated into the processing chain of face recognition systems. This chapter discusses th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…F ACIAL recognition technology has been successfully applied in numerous real-world applications, such as mobile payments, automated teller machines (ATMs), automatic border control, and surveillance. However, there are various physical and digital attacks, such as face manipulation attacks (e.g., deepfake, face swap) [1], face morphing [2], face adversarial attacks [3], and face spoofing (i.e., presentation attacks) [4], that can be utilized to spoof the biometric systems. Thus, designing reliable approaches for presentation attack detection (PAD) is vital to enhance the security of face recognition systems.…”
Section: Introductionmentioning
confidence: 99%
“…F ACIAL recognition technology has been successfully applied in numerous real-world applications, such as mobile payments, automated teller machines (ATMs), automatic border control, and surveillance. However, there are various physical and digital attacks, such as face manipulation attacks (e.g., deepfake, face swap) [1], face morphing [2], face adversarial attacks [3], and face spoofing (i.e., presentation attacks) [4], that can be utilized to spoof the biometric systems. Thus, designing reliable approaches for presentation attack detection (PAD) is vital to enhance the security of face recognition systems.…”
Section: Introductionmentioning
confidence: 99%
“…They described the work in this field as "a cat and mouse game"; whereas the detection techniques are improved, the manipulation methods are improved. Many researches have been introduced tackling the manipulation detection issue; however, to the current date, there is no global reliable face manipulation detection technique, which means this field is still nascent [48][49][50]. One of the limitations that have been mentioned in [48] is the low detection accuracy in the GAN-based methods [51][52][53][54] when bad-quality input images are tested such as images in bad lighting conditions, noisy, blurry, and other low-resolution images.…”
Section: Introductionmentioning
confidence: 99%
“…The shared face images can increase the speed of various processes and documentation, facilitate working with different systems, overcome distance restrictions, share memories and personal information, access online applications, and many others. The shared face images can easily be manipulated using digital image processing applications, and the manipulations can be harmful or harmless based on the intentions of the manipulator [1]. The recent interest of the research community has been directed towards a type of manipulation called DeepFakes which utilizes deep-learning or machinelearning-based algorithms to create fake face images or videos that are hard to be recognized as fake information [2]- [6].…”
Section: Introductionmentioning
confidence: 99%