scispace - formally typeset
Proceedings ArticleDOI

SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern

Reads0
Chats0
TLDR
A novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos, which contains bonafide face videos and face swapped videos of multiple subjects is presented.
Abstract
Advancements in smartphone applications have empowered even non-technical users to perform sophisticated operations such as morphing in faces as few tap operations. While such enablements have positive effects, as a negative side, now anyone can digitally attack face (biometric) recognition systems. For example, face swapping application of Snapchat can easily create “swapped” identities and circumvent face recognition system. This research presents a novel database, termed as SWAPPED — Digital Attack Video Face Database, prepared using Snap chat's application which swaps/stitches two faces and creates videos. The database contains bonafide face videos and face swapped videos of multiple subjects. Baseline face recognition experiments using commercial system shows over 90% rank-1 accuracy when attack videos are used as probe. As a second contribution, this research also presents a novel Weighted Local Magnitude Pattern feature descriptor based presentation attack detection algorithm which outperforms several existing approaches.

read more

Citations
More filters
Posted Content

DeepFakes: a New Threat to Face Recognition? Assessment and Detection

TL;DR: This paper presents the first publicly available set of Deepfake videos generated from videos of VidTIMIT database, and demonstrates that GAN-generated Deep fake videos are challenging for both face recognition systems and existing detection methods.
Journal ArticleDOI

The Creation and Detection of Deepfakes: A Survey

TL;DR: This article explores the creation and detection of deepfakes and provides an in-depth view as to how these architectures work and the current trends and advancements in this domain.
Journal ArticleDOI

Face Recognition Systems Under Morphing Attacks: A Survey

TL;DR: A conceptual categorization and metrics for an evaluation of such methods are presented, followed by a comprehensive survey of relevant publications, and technical considerations and tradeoffs of the surveyed methods are discussed.
Journal ArticleDOI

The Creation and Detection of Deepfakes: A Survey

TL;DR: In 2018, it was discovered how easy it is to use this technology for unethical and malicious applications, such as the spread of misinformation, impersonation of political leaders, and the defamation of innocent individuals as discussed by the authors.
Journal ArticleDOI

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

TL;DR: This paper attempts to unravel three aspects related to the robustness of DNNs for face recognition in terms of vulnerabilities to attacks, detecting the singularities by characterizing abnormal filter response behavior in the hidden layers of deep networks; and making corrections to the processing pipeline to alleviate the problem.
References
More filters
Journal ArticleDOI

Digital image forensics: a booklet for beginners

TL;DR: This survey is designed for scholars and IT professionals approaching this field, reviewing existing tools and providing a view on the past, the present and the future of digital image forensics.
Proceedings ArticleDOI

Can face anti-spoofing countermeasures work in a real world scenario?

TL;DR: This article assesses how well existing face anti-spoofing countermeasures can work in a more realistic condition and introduces two strategies that show promising results.
Book ChapterDOI

LBP - TOP based countermeasure against face spoofing attacks

TL;DR: A countermeasure against spoofing attacks based on the LBP−TOP operator combining both space and time information into a single multiresolution texture descriptor is presented.
Proceedings ArticleDOI

The magic passport

TL;DR: Once upon a time there was a criminal; he was reading his e-mail when a banner caught his attention: low cost flights for the destination of his dreams, but he suddenly realized that, being wanted by the police, he could not use his passport without being arrested.
Journal ArticleDOI

Discriminative features for texture description

TL;DR: A feature extraction method for texture description is developed which can be integrated with existing LBP variants such as conventional LBP, rotation invariant patterns, local patterns with anisotropic structure, completed local binary pattern (CLBP) and local ternary pattern (LTP) to derive new image features for texture classification.