SSFlow: Style-guided Neural Spline Flows for Face Image Manipulation

2021 ◽  
Author(s):  
Hanbang Liang ◽  
Xianxu Hou ◽  
Linlin Shen
Author(s):  
Le Qin ◽  
Fei Peng ◽  
Sushma Venkatesh ◽  
Raghavendra Ramachandra ◽  
Min Long ◽  
...  

Computers ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 117
Author(s):  
Clemens Seibold ◽  
Anna Hilsmann ◽  
Peter Eisert

Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, but without further investigations their decision-making process is not transparent. In contrast to approaches based on hand-crafted features, DNNs have to be analyzed in complex experiments to know which characteristics or structures are generally used to distinguish between morphed and genuine face images or considered for an individual morphed face image. In this paper, we present Feature Focus, a new transparent face morphing detector based on a modified VGG-A architecture and an additional feature shaping loss function, as well as Focused Layer-wise Relevance Propagation (FLRP), an extension of LRP. FLRP in combination with the Feature Focus detector forms a reliable and accurate explainability component. We study the advantages of the new detector compared to other DNN-based approaches and evaluate LRP and FLRP regarding their suitability for highlighting traces of image manipulation from face morphing. To this end, we use partial morphs which contain morphing artifacts in predefined areas only and analyze how much of the overall relevance each method assigns to these areas.


2019 ◽  
Vol 129 ◽  
pp. 156-168 ◽  
Author(s):  
L. Minh Dang ◽  
Syed Ibrahim Hassan ◽  
Suhyeon Im ◽  
Hyeonjoon Moon

2021 ◽  
Author(s):  
Christian Rathgeb ◽  
Kevin Bernardo ◽  
Nathania E. Haryanto ◽  
Christoph Busch

2009 ◽  
Author(s):  
F. Jacob Seagull ◽  
Peter Miller ◽  
Ivan George ◽  
Paul Mlyniec ◽  
Adrian Park
Keyword(s):  
3D Image ◽  

2017 ◽  
Vol 2017 (7) ◽  
pp. 113-120 ◽  
Author(s):  
Sujoy Chakraborty ◽  
Matthias Kirchner

2007 ◽  
Vol 1 (4) ◽  
pp. 62-69
Author(s):  
Milhled Alfaouri ◽  
◽  
Nada N. Al-Ramahi ◽  

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Sign in / Sign up

Export Citation Format

Share Document