SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
Citations
369 citations
Cites background or methods from "SWAPPED! Digital face presentation ..."
...We also applied several baseline methods from presentation attack detection domain, by treating Deepfake videos as digital presentation attacks [8], including simple principal component analysis (PCA) and linear discriminant analysis...
[...]
...com/news/technology-42912529 responding to the public demand to detect face swapping technology, researchers are starting to work on databases and detection methods, including image and video data [6] generated with an older face swapping approach Face2Face [7] or videos collected using Snapchat3 application [8]....
[...]
...[8] and evaluated on the videos collected by the authors with Snapchat3 phone application....
[...]
211 citations
Cites background from "SWAPPED! Digital face presentation ..."
...Models which identify blurred content [94] are affected by noise and sharpening GANs [63, 71], and models which search for the boundary where the face was blended in [4, 8, 38, 81, 94, 163] do not work on deepfakes passed through refiner networks or those which output full frames (e....
[...]
...The authors of [4, 8, 38, 94, 163] used edge detectors, quality measures, and frequency analysis to detect artifacts in the pasted content and borders....
[...]
191 citations
Cites methods from "SWAPPED! Digital face presentation ..."
...[74] propose to train an SVM with Weighted Local Magnitude Pattern....
[...]
163 citations
98 citations
Cites background from "SWAPPED! Digital face presentation ..."
...However, Raghavendra et al. (2017) and Agarwal et al. (2017b) have prepared a database for multispectral spoofing and reported that even such systems are not immune to presentation attacks....
[...]
References
40,147 citations
"SWAPPED! Digital face presentation ..." refers methods in this paper
...• Figure 7 shows the SVM score distribution of bonafide and attack videos pertaining to the proposed feature, LBP, and LPQ. LBP histogram feature provides the second lowest ACER value both for video and frame based detection....
[...]
...The extracted feature vectors from training data are provided to the supervised Support Vector Machine (SVM) [26] classifier to learn the presentation attack detection model....
[...]
20,442 citations
"SWAPPED! Digital face presentation ..." refers background in this paper
...• It is interesting to observe that the combination of Haralick+RDWT, which yields lowest EER on physical spoofing database, provides the highest EER value of 25.6% in video based attack detection....
[...]
...Therefore, we have compared the performance of the proposed algorithm with seven different textural feature based algorithms: LBP* [18], Rotation Invariant Uniform LBP (RIULBP)* [20], Complete LBP (CLBP)* [14], Uniform LBP (ULBP)*, LPQ [21], BSIF [17], and Combination of Redundant Discrete Wavelet Transform (RDWT) [11] with Haralick [15] proposed in [1]....
[...]
...(CLBP)* [14], Uniform LBP (ULBP)*, LPQ [21], BSIF [17], and Combination of Redundant Discrete Wavelet Transform (RDWT) [11] with Haralick [15] proposed in [1]....
[...]
14,245 citations
"SWAPPED! Digital face presentation ..." refers background or methods in this paper
...[20] have reported that sometimes more than 90% of the texture surfaces are uniform....
[...]
...Therefore, we have compared the performance of the proposed algorithm with seven different textural feature based algorithms: LBP* [18], Rotation Invariant Uniform LBP (RIULBP)* [20], Complete LBP...
[...]
13,037 citations
7,969 citations
"SWAPPED! Digital face presentation ..." refers methods in this paper
...To make the change more accurate and precise, key point location of the facial features such as eye, mouth, and face boundary are detected using Active Shape Model (ASM) [5]....
[...]