In this chapter, we present the various categories of Face Manipulation and their use within different remote operational systems. We then use the example of remote identity document onboarding systems to illustrate how each category can be used in practice to compromise such a system. After a definition of the different Face Manipulation categories and the common algorithms used to produce them, we go through the various manipulation detection algorithms and common image and video forgery datasets. We then introduce some known counter-forensics methods that can be used by an attacker to avoid detection. Knowing the detection methods and the counter-forensic, we present how we can build up a safer system by using the correct methods at the correct time. But also how knowledge about the tampering process could be used to design the user experience to make the systems harder to compromise. We complete this review by the standardisation effort and legal aspect on the matter. And we conclude by discussing the remaining challenges and perspectives for better use of nowadays detection methods in practical usage.
Face manipulation detection in remote operational systems
Book chapter N°19 of "Handbook of Digital Face Manipulation and Detection", January 2022, ISBN: 978-3-030-87663-0
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in Book chapter N°19 of "Handbook of Digital Face Manipulation and Detection", January 2022, ISBN: 978-3-030-87663-0 and is available at : https://doi.org/10.1007/978-3-030-87664-7_19
PERMALINK : https://www.eurecom.fr/publication/6815