{"id":"https://openalex.org/W4362564475","doi":"https://doi.org/10.1145/3577164.3577170","title":"Recapture Detection to Fight Deep Identity Theft","display_name":"Recapture Detection to Fight Deep Identity Theft","publication_year":2022,"publication_date":"2022-11-25","ids":{"openalex":"https://openalex.org/W4362564475","doi":"https://doi.org/10.1145/3577164.3577170"},"language":"en","primary_location":{"id":"doi:10.1145/3577164.3577170","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577164.3577170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 4th International Conference on Video, Signal and Image Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002677247","display_name":"Anis Trabelsi","orcid":"https://orcid.org/0000-0002-0187-3343"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Anis Trabelsi","raw_affiliation_strings":["Digital Security Department, EURECOM, France"],"affiliations":[{"raw_affiliation_string":"Digital Security Department, EURECOM, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022289505","display_name":"Marc Pic","orcid":"https://orcid.org/0000-0003-2535-1483"},"institutions":[{"id":"https://openalex.org/I4210151989","display_name":"Surys (France)","ror":"https://ror.org/05cnwh310","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210151989"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Marc Pic","raw_affiliation_strings":["Digital Labs, SURYS, France"],"affiliations":[{"raw_affiliation_string":"Digital Labs, SURYS, France","institution_ids":["https://openalex.org/I4210151989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055361726","display_name":"Jean\u2010Luc Dugelay","orcid":"https://orcid.org/0000-0003-3151-4330"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Luc Dugelay","raw_affiliation_strings":["Digital Security Department, EURECOM, France"],"affiliations":[{"raw_affiliation_string":"Digital Security Department, EURECOM, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002677247"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1656013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8098379373550415},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7456474900245667},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.7121426463127136},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.7077018618583679},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6772714257240295},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.594462513923645},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5914303660392761},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5649232864379883},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5600764155387878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.52604079246521},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.514628529548645},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4877251088619232},{"id":"https://openalex.org/keywords/face-detection","display_name":"Face detection","score":0.41713306307792664},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3978504538536072},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3652937114238739},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.24200809001922607}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8098379373550415},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7456474900245667},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.7121426463127136},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.7077018618583679},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6772714257240295},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.594462513923645},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5914303660392761},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5649232864379883},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5600764155387878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52604079246521},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.514628529548645},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4877251088619232},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.41713306307792664},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3978504538536072},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3652937114238739},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.24200809001922607},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3577164.3577170","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577164.3577170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 4th International Conference on Video, Signal and Image Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1977674021","https://openalex.org/W2002433241","https://openalex.org/W2072273451","https://openalex.org/W2081083689","https://openalex.org/W2111440402","https://openalex.org/W2145287260","https://openalex.org/W2166472141","https://openalex.org/W2428696894","https://openalex.org/W2588403050","https://openalex.org/W2889138239","https://openalex.org/W2890577321","https://openalex.org/W2912975194","https://openalex.org/W2946948417","https://openalex.org/W3008823916","https://openalex.org/W3025670292","https://openalex.org/W3080865364","https://openalex.org/W3081160891","https://openalex.org/W3082083621","https://openalex.org/W3163547718","https://openalex.org/W4233043189","https://openalex.org/W4294732263","https://openalex.org/W6639102338","https://openalex.org/W6677400437","https://openalex.org/W6767264202","https://openalex.org/W7070368780"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W2336272890","https://openalex.org/W4308999381","https://openalex.org/W3183843611","https://openalex.org/W4312238398","https://openalex.org/W3211418293","https://openalex.org/W4308999963","https://openalex.org/W4312081214","https://openalex.org/W2059356388","https://openalex.org/W325114128"],"abstract_inverted_index":{"The":[0],"progress":[1],"made":[2],"in":[3,39],"deep":[4,40,120],"learning":[5,41],"has":[6],"allowed":[7],"the":[8,59,73,80,92],"deployment":[9],"of":[10,17,61,79,127],"more":[11],"powerful":[12],"biometric":[13],"authentication":[14],"systems":[15],"instead":[16],"traditional":[18],"ones":[19],"based":[20],"on":[21,31,84,113],"passwords":[22],"or":[23,77,108],"PIN":[24],"codes.":[25],"Facial":[26],"recognition":[27,98],"is":[28,65,100],"widely":[29],"used":[30],"smartphones":[32],"to":[33,57,70,72,123],"grant":[34],"user":[35,52],"access.":[36],"However,":[37],"advances":[38],"also":[42,117],"improve":[43],"methods":[44,56],"for":[45,68],"doctoring":[46],"images":[47],"and":[48],"videos.":[49],"A":[50],"fraudulent":[51],"can":[53],"use":[54],"these":[55],"steal":[58],"identity":[60],"another":[62,85],"person.":[63],"It":[64],"very":[66],"easy":[67],"impostors":[69],"present":[71,118],"smartphone":[74],"an":[75,104,109],"image":[76],"video":[78,107],"victim's":[81],"face":[82],"displayed":[83,112],"screen.":[86,115],"In":[87],"this":[88,125],"paper,":[89],"we":[90],"describe":[91],"security":[93],"risks":[94],"when":[95],"a":[96,106,114,119],"facial":[97],"system":[99],"attacked":[101],"by":[102],"presenting":[103],"image,":[105],"interactive":[110],"deepfake":[111],"We":[116],"learning-based":[121],"method":[122],"detect":[124],"kind":[126],"attack.":[128]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
