Skip to main content

Showing 1–3 of 3 results for author: Batagelj, B

.
  1. arXiv:2306.05985  [pdf, ps, other

    cs.CV

    Beyond Detection: Visual Realism Assessment of Deepfakes

    Authors: Luka Dragar, Peter Peer, Vitomir Štruc, Borut Batagelj

    Abstract: In the era of rapid digitalization and artificial intelligence advancements, the development of DeepFake technology has posed significant security and privacy concerns. This paper presents an effective measure to assess the visual realism of DeepFake videos. We utilize an ensemble of two Convolutional Neural Network (CNN) models: Eva and ConvNext. These models have been trained on the DeepFake Gam… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

  2. arXiv:2208.07337  [pdf, other

    cs.CV

    SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Marco Huber, Fadi Boutros, Anh Thi Luu, Kiran Raja, Raghavendra Ramachandra, Naser Damer, Pedro C. Neto, Tiago Gonçalves, Ana F. Sequeira, Jaime S. Cardoso, João Tremoço, Miguel Lourenço, Sergio Serra, Eduardo Cermeño, Marija Ivanovska, Borut Batagelj, Andrej Kronovšek, Peter Peer, Vitomir Štruc

    Abstract: This paper presents a summary of the Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 International Joint Conference on Biometrics (IJCB 2022). The competition attracted a total of 12 participating teams, both from academia and industry and present in 11 different countries. In the end, seven valid submissions were submitted by… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted at International Joint Conference on Biometrics (IJCB) 2022

  3. arXiv:2207.00899  [pdf, other

    cs.CV

    Face Morphing Attack Detection Using Privacy-Aware Training Data

    Authors: Marija Ivanovska, Andrej Kronovšek, Peter Peer, Vitomir Štruc, Borut Batagelj

    Abstract: Images of morphed faces pose a serious threat to face recognition--based security systems, as they can be used to illegally verify the identity of multiple people with a single morphed image. Modern detection algorithms learn to identify such morphing attacks using authentic images of real individuals. This approach raises various privacy concerns and limits the amount of publicly available traini… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.