Proceedings ArticleDOI
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern
Reads0
Chats0
TLDR
A novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos, which contains bonafide face videos and face swapped videos of multiple subjects is presented.Abstract:
Advancements in smartphone applications have empowered even non-technical users to perform sophisticated operations such as morphing in faces as few tap operations. While such enablements have positive effects, as a negative side, now anyone can digitally attack face (biometric) recognition systems. For example, face swapping application of Snapchat can easily create “swapped” identities and circumvent face recognition system. This research presents a novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos. The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90% rank-1 accuracy when attack videos are used as probe. As a second contribution, this research also presents a novel Weighted Local Magnitude Pattern feature descriptor based presentation attack detection algorithm which outperforms several existing approaches.read more
Citations
More filters
Posted Content
DeepFakes: a New Threat to Face Recognition? Assessment and Detection
Pavel Korshunov,Sébastien Marcel +1 more
TL;DR: This paper presents the first publicly available set of Deepfake videos generated from videos of VidTIMIT database, and demonstrates that GAN-generated Deep fake videos are challenging for both face recognition systems and existing detection methods.
Journal ArticleDOI
The Creation and Detection of Deepfakes: A Survey
Yisroel Mirsky,Wenke Lee +1 more
TL;DR: This article explores the creation and detection of deepfakes and provides an in-depth view as to how these architectures work and the current trends and advancements in this domain.
Journal ArticleDOI
Face Recognition Systems Under Morphing Attacks: A Survey
TL;DR: A conceptual categorization and metrics for an evaluation of such methods are presented, followed by a comprehensive survey of relevant publications, and technical considerations and tradeoffs of the surveyed methods are discussed.
Journal ArticleDOI
The Creation and Detection of Deepfakes: A Survey
Yisroel Mirsky,Wenke Lee +1 more
TL;DR: In 2018, it was discovered how easy it is to use this technology for unethical and malicious applications, such as the spread of misinformation, impersonation of political leaders, and the defamation of innocent individuals as discussed by the authors.
Journal ArticleDOI
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition
TL;DR: This paper attempts to unravel three aspects related to the robustness of DNNs for face recognition in terms of vulnerabilities to attacks, detecting the singularities by characterizing abnormal filter response behavior in the hidden layers of deep networks; and making corrections to the processing pipeline to alleviate the problem.
References
More filters
Journal ArticleDOI
Digital image forensics: a booklet for beginners
TL;DR: This survey is designed for scholars and IT professionals approaching this field, reviewing existing tools and providing a view on the past, the present and the future of digital image forensics.
Proceedings ArticleDOI
Can face anti-spoofing countermeasures work in a real world scenario?
TL;DR: This article assesses how well existing face anti-spoofing countermeasures can work in a more realistic condition and introduces two strategies that show promising results.
Book ChapterDOI
LBP - TOP based countermeasure against face spoofing attacks
TL;DR: A countermeasure against spoofing attacks based on the LBP−TOP operator combining both space and time information into a single multiresolution texture descriptor is presented.
Proceedings ArticleDOI
The magic passport
TL;DR: Once upon a time there was a criminal; he was reading his e-mail when a banner caught his attention: low cost flights for the destination of his dreams, but he suddenly realized that, being wanted by the police, he could not use his passport without being arrested.
Journal ArticleDOI
Discriminative features for texture description
TL;DR: A feature extraction method for texture description is developed which can be integrated with existing LBP variants such as conventional LBP, rotation invariant patterns, local patterns with anisotropic structure, completed local binary pattern (CLBP) and local ternary pattern (LTP) to derive new image features for texture classification.