Visual Feature Space Analyses of Face Morphing Detectors
暂无分享,去创建一个
Jana Dittmann | Andrey Makrushin | Anna Hilsmann | Peter Eisert | Christian Kraetzer | Clemens Seibold | Tom Neubert | J. Dittmann | P. Eisert | Clemens Seibold | A. Hilsmann | T. Neubert | Christian Kraetzer | A. Makrushin
[1] Christoph Busch,et al. PRNU-based detection of morphed face images , 2018, 2018 International Workshop on Biometrics and Forensics (IWBF).
[2] Jana Dittmann,et al. Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control , 2019, VISIGRAPP.
[3] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[4] Adam Schmidt,et al. The put face database , 2008 .
[5] Alexandru Telea,et al. Visual Analytics of Multidimensional Projections for Constructing Classifier Decision Boundary Maps , 2019, VISIGRAPP.
[6] Jana Dittmann,et al. A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD , 2019, IH&MMSec.
[7] David J Robertson,et al. Detecting morphed passport photos: a training and individual differences approach , 2018, Cognitive research: principles and implications.
[8] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[9] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[10] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[11] Mislav Grgic,et al. SCface – surveillance cameras face database , 2011, Multimedia Tools and Applications.
[12] Anna Hilsmann,et al. Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.
[13] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..
[14] Kiran B. Raja,et al. Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[15] Robin S S Kramer,et al. Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.
[16] Jana Dittmann,et al. Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[17] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[18] Lijun Yin,et al. A high-resolution 3D dynamic facial expression database , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.
[19] Joshua Correll,et al. The Chicago face database: A free stimulus set of faces and norming data , 2015, Behavior research methods.
[20] Leland McInnes,et al. UMAP: Uniform Manifold Approximation and Projection , 2018, J. Open Source Softw..
[21] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[22] Kiran B. Raja,et al. On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[23] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[24] Anna Hilsmann,et al. Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.
[25] Anna Hilsmann,et al. Reflection Analysis for Face Morphing Attack Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[26] Jana Dittmann,et al. Generalized Benford's Law for Blind Detection of Morphed Face Images , 2018, IH&MMSec.
[27] Jana Dittmann,et al. Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.
[28] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[29] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[30] Jana Dittmann,et al. Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.
[31] Davide Maltoni,et al. Face Demorphing , 2018, IEEE Transactions on Information Forensics and Security.