scispace - formally typeset
Proceedings ArticleDOI

SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern

Reads0
Chats0
TLDR
A novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos, which contains bonafide face videos and face swapped videos of multiple subjects is presented.
Abstract
Advancements in smartphone applications have empowered even non-technical users to perform sophisticated operations such as morphing in faces as few tap operations. While such enablements have positive effects, as a negative side, now anyone can digitally attack face (biometric) recognition systems. For example, face swapping application of Snapchat can easily create “swapped” identities and circumvent face recognition system. This research presents a novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos. The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90% rank-1 accuracy when attack videos are used as probe. As a second contribution, this research also presents a novel Weighted Local Magnitude Pattern feature descriptor based presentation attack detection algorithm which outperforms several existing approaches.

read more

Citations
More filters
Posted Content

DeepFakes: a New Threat to Face Recognition? Assessment and Detection

TL;DR: This paper presents the first publicly available set of Deepfake videos generated from videos of VidTIMIT database, and demonstrates that GAN-generated Deep fake videos are challenging for both face recognition systems and existing detection methods.
Journal ArticleDOI

The Creation and Detection of Deepfakes: A Survey

TL;DR: This article explores the creation and detection of deepfakes and provides an in-depth view as to how these architectures work and the current trends and advancements in this domain.
Journal ArticleDOI

Face Recognition Systems Under Morphing Attacks: A Survey

TL;DR: A conceptual categorization and metrics for an evaluation of such methods are presented, followed by a comprehensive survey of relevant publications, and technical considerations and tradeoffs of the surveyed methods are discussed.
Journal ArticleDOI

The Creation and Detection of Deepfakes: A Survey

TL;DR: In 2018, it was discovered how easy it is to use this technology for unethical and malicious applications, such as the spread of misinformation, impersonation of political leaders, and the defamation of innocent individuals as discussed by the authors.
Journal ArticleDOI

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

TL;DR: This paper attempts to unravel three aspects related to the robustness of DNNs for face recognition in terms of vulnerabilities to attacks, detecting the singularities by characterizing abnormal filter response behavior in the hidden layers of deep networks; and making corrections to the processing pipeline to alleviate the problem.
References
More filters
Proceedings Article

BSIF: Binarized statistical image features

TL;DR: The proposed approach is based on statistics of natural images and this improves its modeling capacity, and the experimental results show that the method improves accuracy in texture recognition tasks compared to the state-of-the-art.
Journal ArticleDOI

Exposing Digital Forgeries From JPEG Ghosts

TL;DR: A technique to detect whether the part of an image was initially compressed at a lower quality than the rest of the image is described, applicable to images of high and low quality as well as resolution.
Journal ArticleDOI

Biometric Antispoofing Methods: A Survey in Face Recognition

TL;DR: The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality.
Journal ArticleDOI

The redundant discrete wavelet transform and additive noise

TL;DR: In this letter, a precise relationship between RDWT-domain and original-signal-domain distortion for additive white noise in the RDWT domain is derived.
Proceedings ArticleDOI

Counter-measures to photo attacks in face recognition: A public database and a baseline

TL;DR: This work introduces the publicly available PRINT-ATTACK database and exemplifies how to use its companion protocol with a motion-based algorithm that detects correlations between the person's head movements and the scene context to compare to other counter-measure techniques.