Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros

Base de dados
Ano de publicação
Tipo de documento
País de afiliação
Intervalo de ano de publicação
1.
Sensors (Basel) ; 24(17)2024 Aug 25.
Artigo em Inglês | MEDLINE | ID: mdl-39275415

RESUMO

Face morphing attacks disrupt the essential correlation between a face image and its identity information, posing a significant challenge to face recognition systems. Despite advancements in face morphing attack detection methods, these techniques cannot reconstruct the face images of accomplices. Existing deep learning-based face de-morphing techniques have mainly focused on identity disentanglement, overlooking the morphing factors inherent in the morphed images. This paper introduces a novel face de-morphing method to restore the identity information of accomplices by predicting the corresponding de-morphing factor. To obtain reasonable de-morphing factors, a channel-wise attention mechanism is employed to perform feature interaction, and the correlation between the morphed image and the real-time captured reference image is integrated to promote the prediction of the de-morphing factor. Furthermore, the identity information of the accomplice is restored by mapping the morphed and reference images into the StyleGAN latent space and performing inverse linear interpolation using the predicted de-morphing factor. Experimental results demonstrate the superiority of this method in restoring accomplice facial images, achieving improved restoration accuracy and image quality compared to existing techniques.

2.
Appl Opt ; 52(3): 467-73, 2013 Jan 20.
Artigo em Inglês | MEDLINE | ID: mdl-23338195

RESUMO

We propose an improvement method for an asymmetric cryptosystem based on spherical wave illumination. Compared with the phase-truncated Fourier transform-based cryptosystem and the reported improving methods, the encryption process uses a spherical wave to illuminate the encryption system, rather than a uniform plane wave. As a result, the proposed method can avoid various types of the currently existing attacks and maintain the asymmetric characteristic of the cryptosystem. Moreover, due to only changing the illuminating mode, the proposed method can be easily implemented in optics compared with the reported improving methods. Simulation results are presented to demonstrate the feasibility and the security performance of the proposed method.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA