| 000 | 02826naaaa2200493uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/78253 | ||
| 005 | 20220220110657.0 | ||
| 020 | _a978-3-030-87664-7 | ||
| 020 | _a9783030876647 | ||
| 024 | 7 |
_a10.1007/978-3-030-87664-7 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aUYQP _2bicssc |
|
| 072 | 7 |
_aUYQV _2bicssc |
|
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aTTBM _2bicssc |
|
| 100 | 1 |
_aRathgeb, Christian _4edt |
|
| 700 | 1 |
_aTolosana, Ruben _4edt |
|
| 700 | 1 |
_aVera-Rodriguez, Ruben _4edt |
|
| 700 | 1 |
_aBusch, Christoph _4edt |
|
| 700 | 1 |
_aRathgeb, Christian _4oth |
|
| 700 | 1 |
_aTolosana, Ruben _4oth |
|
| 700 | 1 |
_aVera-Rodriguez, Ruben _4oth |
|
| 700 | 1 |
_aBusch, Christoph _4oth |
|
| 245 | 1 | 0 | _aHandbook of Digital Face Manipulation and Detection : From DeepFakes to Morphing Attacks |
| 260 |
_aCham _bSpringer Nature _c2022 |
||
| 300 | _a1 electronic resource (487 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area. | ||
| 540 |
_aCreative Commons _fby/4.0/ _2cc _4http://creativecommons.org/licenses/by/4.0/ |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aPattern recognition _2bicssc |
|
| 650 | 7 |
_aComputer vision _2bicssc |
|
| 650 | 7 |
_aComputer security _2bicssc |
|
| 650 | 7 |
_aImaging systems & technology _2bicssc |
|
| 653 | _aDeepFakes | ||
| 653 | _aFace Manipulation Detection | ||
| 653 | _aMedia Forensic | ||
| 653 | _aBiometric Recognition | ||
| 653 | _aImage Processing and Pattern Recognition | ||
| 653 | _aOpen Access | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/52835/1/978-3-030-87664-7.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/78253 _70 _zDOAB: description of the publication |
| 999 |
_c83121 _d83121 |
||