A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
Advances in Computer Vision and Pattern Recognition
AbstractIn this chapter, we present the various categories of Face Manipulation and their use within different remote operational systems. We then use the example of remote identity document onboarding systems to illustrate how each category can be used in practice to compromise such a system. After a definition of the different Face Manipulation categories and the common algorithms used to produce them, we go through the various manipulation detection algorithms and common image and videodoi:10.1007/978-3-030-87664-7_19 fatcat:nihnw7relzcyhakz7m5fhvgfxu