{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:15:14Z","timestamp":1766733314904,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Brno University of Technology","award":["FIT-S-23-8151"],"award-info":[{"award-number":["FIT-S-23-8151"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635953","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1376-1384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Security Implications of Deepfakes in Face Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9604-168X","authenticated-orcid":false,"given":"Milan","family":"Salko","sequence":"first","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4717-1910","authenticated-orcid":false,"given":"Anton","family":"Firc","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9009-2193","authenticated-orcid":false,"given":"Kamil","family":"Malinka","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BioPass ID. [n. d.]. Learn the requirements of the ICAO standard (ISO 19794-5). https:\/\/www.biopassid.com\/post\/norma-icao"},{"key":"e_1_3_2_1_2_1","unstructured":"Masha Borak. 2021. Tax scammers hack government-run facial recognition system. https:\/\/www.scmp.com\/tech\/tech-trends\/article\/3127645\/chinese-government-run-facial-recognition-system-hacked-tax"},{"key":"e_1_3_2_1_3_1","volume-title":"ICCWS 2020 15th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited. 57","author":"Botha Johnny","year":"2020","unstructured":"Johnny Botha and Heloise Pieterse. 2020. Fake news and deepfakes: A dangerous threat for 21st century information security. In ICCWS 2020 15th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited. 57."},{"key":"e_1_3_2_1_4_1","volume-title":"Fakecatcher: Detection of synthetic portrait videos using biological signals","author":"Ciftci Umur Aybars","year":"2020","unstructured":"Umur Aybars Ciftci, Ilke Demir, and Lijun Yin. 2020. Fakecatcher: Detection of synthetic portrait videos using biological signals. IEEE transactions on pattern analysis and machine intelligence (2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2020.3009287"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-04-2022-0090"},{"key":"e_1_3_2_1_8_1","volume-title":"The DeepFake Detection Challenge Dataset. CoRR abs\/2006.07397","author":"Dolhansky Brian","year":"2020","unstructured":"Brian Dolhansky, Joanna Bitton, Ben Pflaum, Jikuo Lu, Russ Howes, Menglin Wang, and Cristian Canton-Ferrer. 2020. The DeepFake Detection Challenge Dataset. CoRR abs\/2006.07397 (2020). arXiv:2006.07397 https:\/\/arxiv.org\/abs\/2006.07397"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e15090"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7080128"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295036.2020.1832697"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3196668"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484396"},{"key":"e_1_3_2_1_15_1","volume-title":"Woo","author":"Khalid Hasam","year":"2021","unstructured":"Hasam Khalid, Shahroz Tariq, Minha Kim, and Simon S. Woo. 2021. FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. In Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2). https:\/\/openreview.net\/forum?id=TAXFsg6ZaOl"},{"key":"e_1_3_2_1_16_1","unstructured":"Pavel Korshunov and Sebastien Marcel. 2018. DeepFakes: a New Threat to Face Recognition? Assessment and Detection. arXiv:1812.08685 [cs.CV]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"e_1_3_2_1_18_1","volume-title":"Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics. In IEEE Conference on Computer Vision and Patten Recognition (CVPR).","author":"Li Yuezun","year":"2020","unstructured":"Yuezun Li. 2020. Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics. In IEEE Conference on Computer Vision and Patten Recognition (CVPR)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109628"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"e_1_3_2_1_21_1","unstructured":"Neurotechnology. 2023. Megamatcher SDK. https:\/\/www.neurotechnology.com\/megamatcher.html"},{"key":"e_1_3_2_1_22_1","unstructured":"Person and Shane Raymond. 2021. Deepfake anyone? Ai Synthetic Media Tech enters perilous phase. https:\/\/www.reuters.com\/technology\/deepfake-anyone-ai-synthetic-media-tech-enters-perilous-phase-2021-12-13\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG58226.2023.10346006"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"volume-title":"Digital Forensics and Watermarking","author":"Seibold Clemens","key":"e_1_3_2_1_26_1","unstructured":"Clemens Seibold, Wojciech Samek, Anna Hilsmann, and Peter Eisert. 2017. Detection of Face Morphing Attacks by Deep Learning. In Digital Forensics and Watermarking. Springer International Publishing, Cham, 107--120."},{"key":"e_1_3_2_1_27_1","unstructured":"John Seymour and Azeem Aqil. 2018. Your Voice is My Passport. https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/#your-voice-is-my-passport-11395"},{"key":"e_1_3_2_1_28_1","volume-title":"Garnett (Eds.)","volume":"32","author":"Siarohin Aliaksandr","year":"2019","unstructured":"Aliaksandr Siarohin, St\u00e9phane Lathuili\u00e8re, Sergey Tulyakov, Elisa Ricci, and Nicu Sebe. 2019. First Order Motion Model for Image Animation. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.), Vol. 32. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/31c0b36aef265d9221af80872ceb62f9-Paper.pdf"},{"key":"e_1_3_2_1_29_1","unstructured":"Innovatrics s.r.o. 2021. Face functions. https:\/\/developers.innovatrics.com\/digital-onboarding\/docs\/functionalities\/face\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512212"},{"key":"e_1_3_2_1_31_1","volume-title":"The emergence of deepfake technology: A review. Technology innovation management review 9, 11","author":"Westerlund Mika","year":"2019","unstructured":"Mika Westerlund. 2019. The emergence of deepfake technology: A review. Technology innovation management review 9, 11 (2019)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Milan \u0161alko. 2023. Security Implications of Deepfakes in Face Authentication. Available at https:\/\/www.vut.cz\/en\/students\/final-thesis\/detail\/141060.","DOI":"10.1145\/3605098.3635953"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:14Z","timestamp":1750178174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":33,"alternative-id":["10.1145\/3605098.3635953","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635953","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}