Loading [MathJax]/extensions/MathMenu.js

Showing 1-10 of 10 results

Filter Results

Show

Results

Many forensic investigations (e.g., the search for missing children or analysis of child pornographic data) require robust face recognition of children. However, face recognition systems are primarily designed for recognizing adults, and previous studies have already shown that they do not reliably recognize children. Moreover, the limited availability of public datasets and ethical as well as pri...Show More
Synthetically generated face images have shown to be indistinguishable from real images by humans and as such can lead to a lack of trust in digital content as they can, for instance, be used to spread misinformation. Therefore, the need to develop algorithms for detecting entirely synthetic face images is apparent. Of interest are images generated by state-of-the-art deep learning-based models, a...Show More
Face recognition systems are widely deployed in high-security applications such as for biometric verification at border controls. Despite their high accuracy on pristine data, it is well-known that digital manipulations, such as face morphing, pose a security threat to face recognition systems. Malicious actors can exploit the facilities offered by the identity document issuance process to obtain ...Show More
Face recognition systems are widely deployed for biometric authentication. Despite this, it is well-known that, without any safeguards, face recognition systems are highly vulnerable to presentation attacks. In response to this security issue, several promising methods for detecting presentation attacks have been proposed which show high performance on existing benchmarks. However, an ongoing chal...Show More
The accuracy of face recognition skyrocketed in past years and its robustness towards various covariates has been shown, such as variations in pose or age. In recent years, a considerable amount of research efforts has been devoted to cross-domain face recognition aiming at comparing facial images obtained from domains that are different in capture technologies, e.g. visible spectrum versus infrar...Show More
This paper proposes an explicit method for single face image morphing attack detection, using an RGB decomposition based on Principal Component Analysis from texture patterns. Handcrafted detection algorithms can be advantageous over deep learning-based methods as they constitute increased explainability, showcased in this work by visualizing relevant face areas for morphing attack detection. Such...Show More
This work investigates the impact of fun selfie filters, which are frequently used to modify selfies, on face recognition systems. Based on a qualitative assessment and classification of freely available mobile applications, ten relevant fun selfie filters are selected to create a database. To this end, the selected filters are automatically applied to face images of public face image databases. D...Show More
We investigate the potential of fusing human examiner decisions for the task of digital face manipulation detection. To this end, various decision fusion methods are proposed incorporating the examiners’ decision confidence, experience level, and their time to take a decision. Conducted experiments are based on a psychophysical evaluation of digital face image manipulation detection capabilities o...Show More
So-called master faces are faces for which the probability of achieving a false match when being compared against an unknown set of face images is significantly higher than that of a random impostor. In this work, we investigate whether average faces exhibit said property of master faces. In order to generate average faces for different demographic groups, face morphing is applied to images of pub...Show More
Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals. Despite recent advances, face recognition systems have shown to be particularly vulnerable to identity attacks (i.e., digital manipulations and attack presentations). Identity attacks pose a big security threat as they c...Show More