Security and Communication Networks

Data-Driven Face Forensics and Security


Publishing date
01 Nov 2021
Status
Closed
Submission deadline
18 Jun 2021

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2University of Oulu, Oulu, Finland

3Shenzhen University, Shenzhen, China

4INSERM, Brest, France

This issue is now closed for submissions.

Data-Driven Face Forensics and Security

This issue is now closed for submissions.

Description

In daily life, unique biological information is often used in identity authentication, such as facial images, fingerprints, iris, and voiceprints, etc. Compared with other biological information, facial images have the following advantages: lower acquisition cost, more information, and no physical contact. Therefore, facial images have been extensively utilized in identification and authentication services. New applications, such as face payment, face retrieval, and face check-in have emerged, entering daily life in an all-round way; the "face brushing era" has arrived.

However, the security of these applications is threatened with the rapid development of digital image editing technology and software. There is not only traditional software like Photoshop, but also some emerging software such as Face2Face, FaceSwap, DeepFake, and so on, which can create realistic faces or modify facial details. Then, even a non-professional person can easily generate high-quality facial images to carry out various attacks, such as presentation attack, morphing attack, adversarial attack, and so on. The research on facial image forensics is of great significance for fighting against illegal and criminal activities.

This Special Issue will provide a significant collective contribution to the field of face image forensics and security and focuses on data-driven approaches using machine learning. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • GAN-generated face detection
  • Generation of face adversarial examples
  • Face adversarial example recovery
  • Digital face manipulation detection and localization
  • Facial identity swap forensics
  • Facial synthesis forensics
  • Facial attribute manipulation forensics
  • Facial expression swap forensics
  • Facial morphing attack forensics
  • Face liveness detection

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 1325573
  • - Research Article

Multiplicative Watermarking Method with the Visual Saliency Model Using Contourlet Transform

Jinhua Liu | Jiawen Huang | Yuanyuan Huang
  • Special Issue
  • - Volume 2021
  • - Article ID 8661083
  • - Research Article

Dual-Tree Complex Wavelet Transform-Based Direction Correlation for Face Forgery Detection

Shichao Gao | Ming Xia | Gaobo Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 1627486
  • - Research Article

F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network

Chuanpeng Guo | Wei Yang | ... | Liusheng Huang
  • Special Issue
  • - Volume 2021
  • - Article ID 5524930
  • - Research Article

Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics

Yujiang Lu | Yaju Liu | ... | Zhihua Xia
  • Special Issue
  • - Volume 2021
  • - Article ID 6854586
  • - Research Article

A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification

Zelin Deng | Qiran Zhu | ... | Yuansheng Luo
  • Special Issue
  • - Volume 2021
  • - Article ID 5511435
  • - Research Article

Detection of GAN-Synthesized Image Based on Discrete Wavelet Transform

Guihua Tang | Lei Sun | ... | Xiaoqin Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 5383573
  • - Research Article

Driver Fatigue Detection Based on Facial Key Points and LSTM

Long Chen | Guojiang Xin | ... | Junwei Huang
  • Special Issue
  • - Volume 2021
  • - Article ID 9987792
  • - Research Article

Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network

Yining Hu | Zhe Wang | ... | Zheng Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9942754
  • - Research Article

FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection

Baoying Chen | Shunquan Tan
  • Special Issue
  • - Volume 2021
  • - Article ID 9939232
  • - Research Article

Face Antispoofing Method Using Color Texture Segmentation on FPGA

Youngjun Moon | Intae Ryoo | Seokhoon Kim
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.