Digital Face Manipulation in Biometric Systems
نویسندگان
چکیده
Abstract Biometric technologies, in particular facerecognition, are employed many personal, commercial, and governmental identity management systems around the world. The processing of digitally manipulated face images within a recognition system may lead to false decisions thus decrease reliability decision system. This necessitates development manipulation detection modules which can be seamlessly integrated into chain systems. chapter discusses impact image on technologies. To this end, basic processes key components biometric briefly introduced with emphasis facial recognition. Additionally, scenarios concepts how integrate methods discussed. In an experimental evaluation, it is shown that different types manipulation, i.e. retouching, morphing, swapping, significantly affect performance hence impair their security. Eventually, provides outlook issues challenges poses
منابع مشابه
Biometric Systems: A Face Recognition Approach
In this paper we propose a biometric face recognition system based on local features. Informative feature locations in the face image are located by Gabor filters, which gives us an automatic system that is not dependent on accurate detection of facial features. The feature locations are typically located at positions with high information content (such as facial features), and at each of these...
متن کاملEntropy-based template analysis in face biometric identification systems
The accuracy of a biometric matching algorithm relies on its ability to better separate score distributions for genuine and impostor subjects. However, capture conditions (e.g. illumination or acquisition devices) as well as factors related to the subject at hand (e.g. pose or occlusions) may even take a generally accurate algorithm to provide incorrect answers. Techniques for face classificati...
متن کاملA Study of Liveness Detection in Face Biometric Systems
“Biometrics” refers to the technologies that measure and analyze human body characteristics for security purposes. The need of privacy and security in our daily life leads to this new area. Biometric systems have more accuracy when compared to traditional methods (password, key etc). It identifies and verifies the identity of a person based on one or more physiological and behavioral characteri...
متن کاملmanipulation in dubbing and subtitling
پژوهش حاضر در چارچوب مکتب دستکاری قرار گرفت و با استفاده از تقسیم بندی دوکات (2007) از شیوه های دستکاری، به دنبال یافتن پاسخ برای پرسش های زیر بود: 1-رایج ترین شیوه دستکاری در دوبله فیلم ها کدام است؟ 2-رایج ترین شیوه دستکاری در زیرنویس فیلم ها کدام است؟ 3-دستکاری در دوبله فیلم ها رایج تر است یا در زیرنویس آن ها؟ این پژوهش از نوع تحقیقات توصیفی- مقایسه ای و پیکره ای می باشد. پیکره تحقیق شا...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in computer vision and pattern recognition
سال: 2022
ISSN: ['2191-6594', '2191-6586']
DOI: https://doi.org/10.1007/978-3-030-87664-7_2