Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
暂无分享,去创建一个
Christoph Busch | Christian Rathgeb | Benjamin Tams | Aleksandar Mitkovski | Johannes Merkle | Kevin Bernardo | Nathania E. Haryanto
[1] Robin S S Kramer,et al. Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.
[2] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Alan C. Bovik,et al. No-Reference Image Quality Assessment in the Spatial Domain , 2012, IEEE Transactions on Image Processing.
[4] 拓海 杉山,et al. “Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks”の学習報告 , 2017 .
[5] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[6] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[7] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[8] Christoph Busch,et al. Face Recognition Systems Under Morphing Attacks: A Survey , 2019, IEEE Access.
[9] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[10] Javier Hernandez-Ortega,et al. FaceQnet: Quality Assessment for Face Recognition based on Deep Learning , 2019, 2019 International Conference on Biometrics (ICB).
[11] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[12] Patrick J. Grother,et al. Face Recognition Vendor Test (FRVT) part 4:: MORPH - performance of automated face morph detection , 2020 .
[13] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[14] Luuk J. Spreeuwers,et al. Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking , 2020, IEEE Transactions on Information Forensics and Security.
[15] Johannes E. Schindelin,et al. Fiji: an open-source platform for biological-image analysis , 2012, Nature Methods.
[16] Christoph Busch,et al. Impact and Detection of Facial Beautification in Face Recognition: An Overview , 2019, IEEE Access.
[17] Shih-Fu Chang,et al. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .
[18] Harry Wechsler,et al. The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..
[19] B. S. Manjunath,et al. Modeling the print-scan process for resilient data hiding , 2005, IS&T/SPIE Electronic Imaging.
[20] Mohamed N. Ahmed,et al. Characterization of Electrophotographic Print Artifacts: Banding, Jitter, and Ghosting , 2011, IEEE Transactions on Image Processing.
[21] Davide Maltoni,et al. Face morphing detection in the presence of printing/scanning and heterogeneous image sources , 2019, IET Biom..