benchmark arXiv Sep 17, 2025 · Sep 2025
Sara Concas, Simone Maurizio La Cava, Andrea Panzino et al. · University of Cagliari
Evaluates how beauty filters degrade deepfake and morphing attack detectors, exposing robustness vulnerabilities in state-of-the-art detection systems
Output Integrity Attack vision
Digital beautification through social media filters has become increasingly popular, raising concerns about the reliability of facial images and videos and the effectiveness of automated face analysis. This issue is particularly critical for digital manipulation detectors, systems aiming at distinguishing between genuine and manipulated data, especially in cases involving deepfakes and morphing attacks designed to deceive humans and automated facial recognition. This study examines whether beauty filters impact the performance of deepfake and morphing attack detectors. We perform a comprehensive analysis, evaluating multiple state-of-the-art detectors on benchmark datasets before and after applying various smoothing filters. Our findings reveal performance degradation, highlighting vulnerabilities introduced by facial enhancements and underscoring the need for robust detection models resilient to such alterations.
cnn University of Cagliari
survey arXiv Aug 26, 2025 · Aug 2025
Jefferson David Rodriguez Chivata, Davide Ghiani, Simone Maurizio La Cava et al. · University of Cagliari · Dedem S.p.A.
Surveys deep learning watermarking and steganography defenses for ICAO biometric passport images against deepfakes and morphing attacks
Output Integrity Attack vision
ICAO-compliant facial images, initially designed for secure biometric passports, are increasingly becoming central to identity verification in a wide range of application contexts, including border control, digital travel credentials, and financial services. While their standardization enables global interoperability, it also facilitates practices such as morphing and deepfakes, which can be exploited for harmful purposes like identity theft and illegal sharing of identity documents. Traditional countermeasures like Presentation Attack Detection (PAD) are limited to real-time capture and offer no post-capture protection. This survey paper investigates digital watermarking and steganography as complementary solutions that embed tamper-evident signals directly into the image, enabling persistent verification without compromising ICAO compliance. We provide the first comprehensive analysis of state-of-the-art techniques to evaluate the potential and drawbacks of the underlying approaches concerning the applications involving ICAO-compliant images and their suitability under standard constraints. We highlight key trade-offs, offering guidance for secure deployment in real-world identity systems.
cnn gan diffusion transformer University of Cagliari · Dedem S.p.A.