Face Manipulation Detection in Remote Operational Systems [chapter]

Marc Michel Pic, Gaël Mahfoudi, Anis Trabelsi, Jean-Luc Dugelay
2022 Advances in Computer Vision and Pattern Recognition  
AbstractIn this chapter, we present the various categories of Face Manipulation and their use within different remote operational systems. We then use the example of remote identity document onboarding systems to illustrate how each category can be used in practice to compromise such a system. After a definition of the different Face Manipulation categories and the common algorithms used to produce them, we go through the various manipulation detection algorithms and common image and video
more » ... ry datasets. We then introduce some known counter-forensics methods that can be used by an attacker to avoid detection. Knowing the detection methods and the counter-forensic, we present how we can build up a safer system by using the correct methods at the correct time. But also how knowledge about the tampering process could be used to design the user experience to make the systems harder to compromise. We complete this review by the standardisation effort and legal aspect on the matter. And we conclude by discussing the remaining challenges and perspectives for better use of nowadays detection methods in practical usage.
doi:10.1007/978-3-030-87664-7_19 fatcat:nihnw7relzcyhakz7m5fhvgfxu