2024
DOI: 10.1109/mce.2023.3256640
|View full text |Cite
|
Sign up to set email alerts
|

Toward Higher Levels of Assurance in Remote Identity Proofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Recent significant advancements in computer vision and image generation using generative adversarial networks and diffusion models combined with their malicious use for manipulating faces in images, spreading fake news, and hacking remote identity-proofing systems that rely on a user's face for proofing have created an urgent need for methods that can reliably detect face manipulation [3]. To address this need, many efforts have been devoted to creating face forgery detection datasets to train deep learning models [7].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Recent significant advancements in computer vision and image generation using generative adversarial networks and diffusion models combined with their malicious use for manipulating faces in images, spreading fake news, and hacking remote identity-proofing systems that rely on a user's face for proofing have created an urgent need for methods that can reliably detect face manipulation [3]. To address this need, many efforts have been devoted to creating face forgery detection datasets to train deep learning models [7].…”
Section: Related Workmentioning
confidence: 99%
“…purposes. Attackers can use several methods to compromise eKYC systems by exploiting identity documents 3 .…”
Section: Spoofing Ekyc With Deepfakesmentioning
confidence: 99%
See 3 more Smart Citations