2022 International Conference on Information Technology Systems and Innovation (ICITSI) 2022
DOI: 10.1109/icitsi56531.2022.9970797
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Face Image Authentication and Suggested Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
0
0
Order By: Relevance
“…These techniques can successfully detect specific types of manipulation under specific conditions, but they suffer from some limitations and may face several limitations. Some recently published review papers have been presented to illustrate the types of FIMD, their limitations, and challenges [19]- [23]. The review paper in [23] highlighted some of the challenges that can face FIMD techniques, such as: (a) the rapid development of face image processing applications, (b) the requirement of large and high-quality datasets for training, (c) the need for knowing the type of manipulation applied in order to choose the suitable detection technique, (d) the lack of generalization, (e) the lack of standard metrics, (f) the high complexity and time-consuming process required for training networks, (g) the generation of high-quality fake face images which are difficult to be detected by the trained network, in addition to other challenges.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These techniques can successfully detect specific types of manipulation under specific conditions, but they suffer from some limitations and may face several limitations. Some recently published review papers have been presented to illustrate the types of FIMD, their limitations, and challenges [19]- [23]. The review paper in [23] highlighted some of the challenges that can face FIMD techniques, such as: (a) the rapid development of face image processing applications, (b) the requirement of large and high-quality datasets for training, (c) the need for knowing the type of manipulation applied in order to choose the suitable detection technique, (d) the lack of generalization, (e) the lack of standard metrics, (f) the high complexity and time-consuming process required for training networks, (g) the generation of high-quality fake face images which are difficult to be detected by the trained network, in addition to other challenges.…”
Section: Introductionmentioning
confidence: 99%
“…The review paper in [23] highlighted some of the challenges that can face FIMD techniques, such as: (a) the rapid development of face image processing applications, (b) the requirement of large and high-quality datasets for training, (c) the need for knowing the type of manipulation applied in order to choose the suitable detection technique, (d) the lack of generalization, (e) the lack of standard metrics, (f) the high complexity and time-consuming process required for training networks, (g) the generation of high-quality fake face images which are difficult to be detected by the trained network, in addition to other challenges. Some solutions have been suggested to overcome the limitations and challenges [23]. One suggested strategy is to implement a face image authentication technique based on image watermarking.…”
Section: Introductionmentioning
confidence: 99%