Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security 2017
DOI: 10.1145/3082031.3083244
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 53 publications
(44 citation statements)
references
References 17 publications
0
44
0
Order By: Relevance
“…In [14] a feature space for morph detection is presented, based on the idea that the blending operation in morphing pipelines causes a reduction of face details, especially on images with a resolution with more than 2 megapixels. The reduction of face details is quantied by the number of keypoints and egdes in the face region.…”
Section: Keypoint Feature Space For Morph Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…In [14] a feature space for morph detection is presented, based on the idea that the blending operation in morphing pipelines causes a reduction of face details, especially on images with a resolution with more than 2 megapixels. The reduction of face details is quantied by the number of keypoints and egdes in the face region.…”
Section: Keypoint Feature Space For Morph Detectionmentioning
confidence: 99%
“…The authors use several keypoint and edge detectors, because they assume that the impact of blending operation is dierent for each detector, some of them will react more sensible than others. The following keypoint and edge detectors were used as features for the detector in [14]: SIFT [15], SURF [1], ORB [27], FAST [26], AGAST [17], CannyEdge [2], SobelX and SobelY [13]. These eight features were extracted with functions implemented in the OpenCV programming library version 3.0 with contributions (http://opencv.org).…”
Section: Keypoint Feature Space For Morph Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Further, Hildebrandt et al [12] suggest to employ generic image forgery detection techniques, in particular multi-compression anomaly detection, to reliably detect morphed facial images. Kraetzer et al [13] evaluate the feasibility of detecting facial morphs with keypoint descriptors and edge operators. However for the current state of the art detection accuracy is very limited and generalisation capabilities of detectors are yet unexplored.…”
Section: Introductionmentioning
confidence: 99%