Handbook of Digital Face Manipulation and Detection : : From DeepFakes to Morphing Attacks.
Saved in:
Superior document: | Advances in Computer Vision and Pattern Recognition Series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing AG,, 2022. ©2022. |
Year of Publication: | 2022 |
Edition: | 1st ed. |
Language: | English |
Series: | Advances in Computer Vision and Pattern Recognition Series
|
Online Access: | |
Physical Description: | 1 online resource (483 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 11285nam a22004933i 4500 | ||
---|---|---|---|
001 | 5006878098 | ||
003 | MiAaPQ | ||
005 | 20240229073845.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240229s2022 xx o ||||0 eng d | ||
020 | |a 9783030876647 |q (electronic bk.) | ||
020 | |z 9783030876630 | ||
035 | |a (MiAaPQ)5006878098 | ||
035 | |a (Au-PeEL)EBL6878098 | ||
035 | |a (OCoLC)1295276366 | ||
040 | |a MiAaPQ |b eng |e rda |e pn |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a TK7882.B56 | |
100 | 1 | |a Rathgeb, Christian. | |
245 | 1 | 0 | |a Handbook of Digital Face Manipulation and Detection : |b From DeepFakes to Morphing Attacks. |
250 | |a 1st ed. | ||
264 | 1 | |a Cham : |b Springer International Publishing AG, |c 2022. | |
264 | 4 | |c ©2022. | |
300 | |a 1 online resource (483 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Computer Vision and Pattern Recognition Series | |
505 | 0 | |a Intro -- Preface -- Contents -- Part I Introduction -- 1 An Introduction to Digital Face Manipulation -- 1.1 Introduction -- 1.2 Types of Digital Face Manipulations -- 1.2.1 Entire Face Synthesis -- 1.2.2 Identity Swap -- 1.2.3 Face Morphing -- 1.2.4 Attribute Manipulation -- 1.2.5 Expression Swap -- 1.2.6 Audio-to-Video and Text-to-Video -- 1.3 Conclusions -- References -- 2 Digital Face Manipulation in Biometric Systems -- 2.1 Introduction -- 2.2 Biometric Systems -- 2.2.1 Processes -- 2.2.2 Face Recognition -- 2.3 Digital Face Manipulation in Biometric Systems -- 2.3.1 Impact on Biometric Performance -- 2.3.2 Manipulation Detection Scenarios -- 2.4 Experiments -- 2.4.1 Experimental Setup -- 2.4.2 Performance Evaluation -- 2.5 Summary and Outlook -- References -- 3 Multimedia Forensics Before the Deep Learning Era -- 3.1 Introduction -- 3.2 PRNU-Based Approach -- 3.2.1 PRNU Estimation -- 3.2.2 Noise Residual Computation -- 3.2.3 Forgery Detection Test -- 3.2.4 Estimation Through Guided Filtering -- 3.3 Blind Methods -- 3.3.1 Noise Patterns -- 3.3.2 Compression Artifacts -- 3.3.3 Editing Artifacts -- 3.4 Learning-Based Methods with Handcrafted Features -- 3.5 Conclusions -- References -- Part II Digital Face Manipulation and Security Implications -- 4 Toward the Creation and Obstruction of DeepFakes -- 4.1 Introduction -- 4.2 Backgrounds -- 4.2.1 DeepFake Video Generation -- 4.2.2 DeepFake Detection Methods -- 4.2.3 Existing DeepFake Datasets -- 4.3 Celeb-DF: the Creation of DeepFakes -- 4.3.1 Synthesis Method -- 4.3.2 Visual Quality -- 4.3.3 Evaluations -- 4.4 Landmark Breaker: the Obstruction of DeepFakes -- 4.4.1 Facial Landmark Extractors -- 4.4.2 Adversarial Perturbations -- 4.4.3 Notation and Formulation -- 4.4.4 Optimization -- 4.4.5 Experimental Settings -- 4.4.6 Results -- 4.4.7 Robustness Analysis -- 4.4.8 Ablation Study. | |
505 | 8 | |a 4.5 Conclusion -- References -- 5 The Threat of Deepfakes to Computer and Human Visions -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Databases and Methods -- 5.3.1 DeepfakeTIMIT -- 5.3.2 DF-Mobio -- 5.3.3 Google and Jigsaw -- 5.3.4 Facebook -- 5.3.5 Celeb-DF -- 5.4 Evaluation Protocols -- 5.4.1 Measuring Vulnerability -- 5.4.2 Measuring Detection -- 5.5 Vulnerability of Face Recognition -- 5.6 Subjective Assessment of Human Vision -- 5.6.1 Subjective Evaluation Results -- 5.7 Evaluation of Deepfake Detection Algorithms -- 5.8 Conclusion -- References -- 6 Morph Creation and Vulnerability of Face Recognition Systems to Morphing -- 6.1 Introduction -- 6.2 Face Morphing Generation -- 6.2.1 Landmark Based Morphing -- 6.2.2 Deep Learning-Based Face Morph Generation -- 6.3 Vulnerability of Face Recognition Systems to Face Morphing -- 6.3.1 Data Sets -- 6.3.2 Results -- 6.3.3 Deep Learning-Based Morphing Results -- 6.4 Conclusions -- References -- 7 Adversarial Attacks on Face Recognition Systems -- 7.1 Introduction -- 7.2 Taxonomy of Attacks on FRS -- 7.2.1 Threat Model -- 7.3 Poisoning Attacks on FRS -- 7.3.1 Fast Gradient Sign Method -- 7.3.2 Projected Gradient Descent -- 7.4 Carlini and Wagner (CW) Attacks -- 7.5 ArcFace FRS Model -- 7.6 Experiments and Analysis -- 7.6.1 Clean Dataset -- 7.6.2 Attack Dataset -- 7.6.3 FRS Model for Baseline Verification -- 7.6.4 FRS Baseline Performance Evaluation -- 7.6.5 FRS Performance on Probe Data Poisoning -- 7.6.6 FRS Performance on Enrolment Data Poisoning -- 7.7 Impact of Adversarial Training with FGSM Attacks -- 7.8 Discussion -- 7.9 Conclusions and Future Directions -- References -- 8 Talking Faces: Audio-to-Video Face Generation -- 8.1 Introduction -- 8.2 Related Work -- 8.2.1 Audio Representation -- 8.2.2 Face Modeling -- 8.2.3 Audio-to-Face Animation -- 8.2.4 Post-processing -- 8.3 Datasets and Metrics. | |
505 | 8 | |a 8.3.1 Dataset -- 8.3.2 Metrics -- 8.4 Discussion -- 8.4.1 Fine-Grained Facial Control -- 8.4.2 Generalization -- 8.5 Conclusion -- 8.6 Further Reading -- References -- Part III Digital Face Manipulation Detection -- 9 Detection of AI-Generated Synthetic Faces -- 9.1 Introduction -- 9.2 AI Face Generation -- 9.3 GAN Fingerprints -- 9.4 Detection Methods in the Spatial Domain -- 9.4.1 Handcrafted Features -- 9.4.2 Data-Driven Features -- 9.5 Detection Methods in the Frequency Domain -- 9.6 Learning Features that Generalize -- 9.7 Generalization Analysis -- 9.8 Robustness Analysis -- 9.9 Further Analyses on GAN Detection -- 9.10 Open Challenges -- References -- 10 3D CNN Architectures and Attention Mechanisms for Deepfake Detection -- 10.1 Introduction -- 10.2 Related Work -- 10.2.1 Deepfake Detection -- 10.2.2 Attention Mechanisms -- 10.3 Dataset -- 10.4 Algorithms -- 10.5 Experiments -- 10.5.1 All Manipulation Techniques -- 10.5.2 Single Manipulation Techniques -- 10.5.3 Cross-Manipulation Techniques -- 10.5.4 Effect of Attention in 3D ResNets -- 10.5.5 Visualization of Pertinent Features in Deepfake Detection -- 10.6 Conclusions -- References -- 11 Deepfake Detection Using Multiple Data Modalities -- 11.1 Introduction -- 11.2 Deepfake Detection via Video Spatiotemporal Features -- 11.2.1 Overview -- 11.2.2 Model Component -- 11.2.3 Training Details -- 11.2.4 Boosting Network -- 11.2.5 Test Time Augmentation -- 11.2.6 Result Analysis -- 11.3 Deepfake Detection via Audio Spectrogram Analysis -- 11.3.1 Overview -- 11.3.2 Dataset -- 11.3.3 Spectrogram Generation -- 11.3.4 Convolutional Neural Network (CNN) -- 11.3.5 Experimental Results -- 11.4 Deepfake Detection via Audio-Video Inconsistency Analysis -- 11.4.1 Finding Audio-Video Inconsistency via Phoneme-Viseme Mismatching -- 11.4.2 Deepfake Detection Using Affective Cues -- 11.5 Conclusion. | |
505 | 8 | |a References -- 12 DeepFakes Detection Based on Heart Rate Estimation: Single- and Multi-frame -- 12.1 Introduction -- 12.2 Related Works -- 12.3 DeepFakesON-Phys -- 12.4 Databases -- 12.4.1 Celeb-DF v2 Database -- 12.4.2 DFDC Preview -- 12.5 Experimental Protocol -- 12.6 Fake Detection Results: DeepFakesON-Phys -- 12.6.1 DeepFakes Detection at Frame Level -- 12.6.2 DeepFakes Detection at Short-Term Video Level -- 12.7 Conclusions -- References -- 13 Capsule-Forensics Networks for Deepfake Detection -- 13.1 Introduction -- 13.2 Related Work -- 13.2.1 Deepfake Generation -- 13.2.2 Deepfake Detection -- 13.2.3 Challenges in Deepfake Detection -- 13.2.4 Capsule Networks -- 13.3 Capsule-Forensics -- 13.3.1 Why Capsule-Forensics? -- 13.3.2 Overview -- 13.3.3 Architecture -- 13.3.4 Dynamic Routing Algorithm -- 13.3.5 Visualization -- 13.4 Evaluation -- 13.4.1 Datasets -- 13.4.2 Metrics -- 13.4.3 Effect of Improvements -- 13.4.4 Feature Extractor Comparison -- 13.4.5 Effect of Statistical Pooling Layers -- 13.4.6 Capsule-Forensics Network Versus CNNs: Seen Attacks -- 13.4.7 Capsule-Forensics Network Versus CNNs: Unseen Attacks -- 13.5 Conclusion and Future Work -- 13.6 Appendix -- References -- 14 DeepFakes Detection: the DeeperForensics Dataset and Challenge -- 14.1 Introduction -- 14.2 Related Work -- 14.2.1 DeepFakes Generation Methods -- 14.2.2 DeepFakes Detection Methods -- 14.2.3 DeepFakes Detection Datasets -- 14.2.4 DeepFakes Detection Benchmarks -- 14.3 DeeperForensics-1.0 Dataset -- 14.3.1 Data Collection -- 14.3.2 DeepFake Variational Auto-Encoder -- 14.3.3 Scale and Diversity -- 14.3.4 Hidden Test Set -- 14.4 DeeperForensics Challenge 2020 -- 14.4.1 Platform -- 14.4.2 Challenge Dataset -- 14.4.3 Evaluation Metric -- 14.4.4 Timeline -- 14.4.5 Results and Solutions -- 14.5 Discussion -- 14.6 Further Reading -- References. | |
505 | 8 | |a 15 Face Morphing Attack Detection Methods -- 15.1 Introduction -- 15.2 Related Works -- 15.3 Morphing Attack Detection Pipeline -- 15.3.1 Data Preparation and Feature Extraction -- 15.3.2 Feature Preparation and Classifier Training -- 15.4 Database -- 15.4.1 Image Morphing -- 15.4.2 Image Post-Processing -- 15.5 Morphing Attack Detection Methods -- 15.5.1 Pre-Processing -- 15.5.2 Feature Extraction -- 15.5.3 Classification -- 15.6 Experiments -- 15.6.1 Generalisability -- 15.6.2 Detection Performance -- 15.6.3 Post-Processing -- 15.7 Summary -- References -- 16 Practical Evaluation of Face Morphing Attack Detection Methods -- 16.1 Introduction -- 16.2 Related Work -- 16.3 Creation of Morphing Datasets -- 16.3.1 Creating Morphs -- 16.3.2 Datasets -- 16.4 Texture-Based Face Morphing Attack Detection -- 16.5 Morphing Disguising -- 16.6 Experiments and Results -- 16.6.1 Within Dataset Performance -- 16.6.2 Cross Dataset Performance -- 16.6.3 Mixed Dataset Performance -- 16.6.4 Robustness Against Additive Gaussian Noise -- 16.6.5 Robustness Against Scaling -- 16.6.6 Selection of Similar Subjects -- 16.7 The SOTAMD Benchmark -- 16.8 Conclusion -- References -- 17 Facial Retouching and Alteration Detection -- 17.1 Introduction -- 17.2 Retouching and Alteration Detection-Review -- 17.2.1 Digital Retouching Detection -- 17.2.2 Digital Alteration Detection -- 17.2.3 Publicly Available Databases -- 17.3 Experimental Evaluation and Observations -- 17.3.1 Cross-Domain Alteration Detection -- 17.3.2 Cross Manipulation Alteration Detection -- 17.3.3 Cross Ethnicity Alteration Detection -- 17.4 Open Challenges -- 17.5 Conclusion -- References -- Part IV Further Topics, Trends, and Challenges -- 18 Detecting Soft-Biometric Privacy Enhancement -- 18.1 Introduction -- 18.2 Background and Related Work -- 18.2.1 Problem Formulation and Existing Solutions. | |
505 | 8 | |a 18.2.2 Soft-Biometric Privacy Models. | |
588 | |a Description based on publisher supplied metadata and other sources. | ||
590 | |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Tolosana, Ruben. | |
700 | 1 | |a Vera-Rodriguez, Ruben. | |
700 | 1 | |a Busch, Christoph. | |
776 | 0 | 8 | |i Print version: |a Rathgeb, Christian |t Handbook of Digital Face Manipulation and Detection |d Cham : Springer International Publishing AG,c2022 |z 9783030876630 |
797 | 2 | |a ProQuest (Firm) | |
830 | 0 | |a Advances in Computer Vision and Pattern Recognition Series | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6878098 |z Click to View |