scispace - formally typeset
J

Joel Stehouwer

Researcher at Michigan State University

Publications -  9
Citations -  784

Joel Stehouwer is an academic researcher from Michigan State University. The author has contributed to research in topics: Replay attack & Face detection. The author has an hindex of 7, co-authored 9 publications receiving 299 citations.

Papers
More filters
Proceedings ArticleDOI

On the Detection of Digital Face Manipulation

TL;DR: Zhang et al. as mentioned in this paper proposed to utilize an attention mechanism to process and improve the feature maps for the classification task and showed that the learned attention maps highlight the informative regions to further improve the binary classification and visualize the manipulated regions.
Proceedings ArticleDOI

Deep Tree Learning for Zero-Shot Face Anti-Spoofing

TL;DR: Zhang et al. as mentioned in this paper proposed a novel Deep Tree Network (DTN) to tackle the zero-shot face anti-spoofing (ZSFA) problem by partitioning the spoof samples into semantic sub-groups in an unsupervised fashion.
Posted Content

On the Detection of Digital Face Manipulation

TL;DR: It is shown that the use of an attention mechanism improves facial forgery detection and manipulated region localization and also improves binary classification of genuine face v. fake face.
Book ChapterDOI

On Disentangling Spoof Trace for Generic Face Anti-spoofing.

TL;DR: Yao et al. as mentioned in this paper proposed an adversarial learning framework to disentangle the spoof traces from input faces as a hierarchical combination of patterns, and synthesize realistic new spoof faces after a proper geometric correction.
Posted Content

On Disentangling Spoof Trace for Generic Face Anti-Spoofing

TL;DR: This work designs a novel adversarial learning framework to disentangle the spoof traces from input faces as a hierarchical combination of patterns at multiple scales, which demonstrates superior spoof detection performance on both seen and unseen spoof scenarios while providing visually convincing estimation of spoof traces.