2019
DOI: 10.2139/ssrn.3419272
|View full text |Cite
|
Sign up to set email alerts
|

Face Authenticity: An Overview of Face Manipulation Generation, Detection and Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…At the time of authentication, a probe sample is captured, processed in the same way, and the resulting probe template is compared against a reference template of a claimed identity (verification) or up to all stored reference templates (identification). 2 As a result, a (set of) biometric comparison score(s) is compared against a pre-defined threshold yielding acceptance or rejection decision. These processes are illustrated in Fig.…”
Section: Processesmentioning
confidence: 99%
“…At the time of authentication, a probe sample is captured, processed in the same way, and the resulting probe template is compared against a reference template of a claimed identity (verification) or up to all stored reference templates (identification). 2 As a result, a (set of) biometric comparison score(s) is compared against a pre-defined threshold yielding acceptance or rejection decision. These processes are illustrated in Fig.…”
Section: Processesmentioning
confidence: 99%
“…Overall, existing works have demonstrated, beyond doubt, that “morphing” is a threat for face recognition systems. Several survey papers have also highlighted the vulnerability of face recognition algorithm against digital manipulation and limitations of existing detection algorithms ( Akhtar et al, 2019 ; Scherhag et al, 2019 ; Singh et al, 2020 ; Tolosana et al, 2020 ; Venkatesh et al, 2020 ). The survey papers bring out the boundaries of existing detection algorithms such as non-generalizability against manipulation types and image resolution and computationally inefficiency.…”
Section: Related Workmentioning
confidence: 99%
“…The first group needs to have original face images manipulated without losing important attributes like identity, while algorithms in the second group synthesize face images using semantic domains. [33] Manipulating face's attributes is more challenging than other image generation problems due to the fact that some image's features have to be modified while others need to remain unchanged. [34] Since the invention of GANs, many GAN-based methods have been designed for manipulating face images.…”
Section: Face Manipulationmentioning
confidence: 99%