
Handbook of Digital Face Manipulation and Detection
From DeepFakes to Morphing Attacks
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Handbook of Digital Face Manipulation and Detection
From DeepFakes to Morphing Attacks
About this book
This open access book provides the first comprehensive collection ofstudiesdealing with the hot topic of digital face manipulationsuch as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of thestate-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved indigital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Front Matter
- Part I. Introduction
- Part II. Digital Face Manipulation and Security Implications
- Part III. Digital Face Manipulation Detection
- Part IV. Further Topics, Trends, and Challenges
- Correction to: Future Trends in Digital Face Manipulation and Detection
- Back Matter