Security and Communication Networks

Data-Driven Face Forensics and Security 2021


Publishing date
01 Oct 2022
Status
Published
Submission deadline
27 May 2022

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Wuhan University, Wuhan, China

3Shanghai Jiaotong University, Shanghai, China

4INSERM, Brest, France


Data-Driven Face Forensics and Security 2021

Description

In daily life, unique biological information is often used in identity authentication, such as facial images, fingerprints, iris, and voiceprints, etc. Compared with other biological information, facial images have the following advantages: lower acquisition cost, more information, and no physical contact. Therefore, facial images have been extensively utilized in identification and authentication services. New applications, such as face payment, face retrieval, and face check-in have emerged, entering daily life in an all-round way; the "face brushing era" has arrived.

However, the security of these applications is threatened with the rapid development of digital image editing technology and software. There is not only traditional software like Photoshop, but also some emerging software such as Face2Face, FaceSwap, DeepFake, and so on, which can create realistic faces or modify facial details. Then, even a non-professional person can easily generate high-quality facial images to carry out various attacks, such as presentation attacks, morphing attacks, adversarial attacks, and so on. The research on facial image forensics is of great significance for fighting against illegal and criminal activities.

This Special Issue will provide a significant collective contribution to the field of face image forensics and security and focuses on data-driven approaches using machine learning. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • GAN-generated face detection
  • Generation of face adversarial examples
  • Face adversarial example recovery
  • Digital face manipulation detection and localization
  • Facial identity swap forensics
  • Facial synthesis forensics
  • Facial attribute manipulation forensics
  • Facial expression swap forensics
  • Facial morphing attack forensics
  • Face liveness detection
  • Face watermarking

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 1648912
  • - Research Article

Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification

Qingtong Liu | Ziyu Xue
  • Special Issue
  • - Volume 2022
  • - Article ID 8609661
  • - Research Article

Manipulated Faces Detection with Adaptive Filter

Chaoyang Peng | Tanfeng Sun | ... | Lihong Yao
  • Special Issue
  • - Volume 2022
  • - Article ID 4976848
  • - Research Article

Multisemantic Path Neural Network for Deepfake Detection

Nan Wu | Xin Jin | ... | Wei Zhou
  • Special Issue
  • - Volume 2022
  • - Article ID 2546466
  • - Research Article

DRT-Unet: A Segmentation Network for Aiding Brain Tumor Diagnosis

Shujing Li | Linguo Li
  • Special Issue
  • - Volume 2022
  • - Article ID 7259469
  • - Research Article

Embedding Guided End-to-End Framework for Robust Image Watermarking

Beibei Zhang | Yunqing Wu | Beijing Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 9755509
  • - Research Article

Semantic Modeling and Pixel Discrimination for Image Manipulation Detection

Ziyu Xue | Xiuhua Jiang | Qingtong Liu
  • Special Issue
  • - Volume 2022
  • - Article ID 5094801
  • - Research Article

Integrating Temporal and Spatial Attention for Video Action Recognition

Yuanding Zhou | Baopu Li | ... | Haojie Li
  • Special Issue
  • - Volume 2022
  • - Article ID 4466426
  • - Research Article

Domain Transferred Image Recognition via Generative Adversarial Network

Haoqi Hu | Sheng Li | ... | Xinpeng Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 1227926
  • - Research Article

Separable Reversible Data Hiding in Encrypted VQ-Encoded Images

Fang Cao | Yujie Fu | ... | Chuan Qin
  • Special Issue
  • - Volume 2022
  • - Article ID 3493336
  • - Research Article

An Improved Self-Training Model with Fine-Tuning Teacher/Student Exchange Strategy to Detect Computer-Generated Images

Ye Yao | Shuhui Liu | ... | Xuan Ni
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.