I have so many issues with this document and will share one as a representative if anyone even cares. It is clear that the author has no idea what a morph attack is or what NIST did to evaluate the efficacy of morph attack detection schemes when they write: "Some morphing techniques use a single image provided to the algorithm or two-image differential morphing is where two face images - a morph and a real face image - are merged to generate a new identity." Thank You, Daniel Bachenheimer Digital Identity Innovations | Technology Lead Office: Arlington, VA | USA Direct: +1 703.947.1659 | Mobile: +1 202.251.7073 Email: daniel.bachenheimer@accenture.com<mailto:daniel.bachenheimer@accenture.com> [cid:image001.jpg@01DA61BE.87E281E0] From: Maxine Most via DG-DeepfakesIDV <dg-deepfakesidv@kantarainitiative.org> Sent: Saturday, February 17, 2024 12:44 PM To: dg-deepfakesidv@kantarainitiative.org Subject: [External] [DG-DeepfakesIDV] Identity Week's take on deepfakes CAUTION: External email. Be cautious with links and attachments. https://urldefense.com/v3/__https://www.terrapinn.com/template/live/PDF/The-Gold-Standard-for-defeating-AI-Deepf/10795/22601/MDUwMjIwMjQtLXRoZS1uZXh0LWNoYWxsZW5nZS0tdGhlLWdvbGQtc3RhbmRhcmQtZm9yLWRlZmVhdGluZy1haS1kZWVwZmFrZXMucGRm__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8oNN1OGa$<https://urldefense.com/v3/__https:/www.terrapinn.com/template/live/PDF/The-Gold-Standard-for-defeating-AI-Deepf/10795/22601/MDUwMjIwMjQtLXRoZS1uZXh0LWNoYWxsZW5nZS0tdGhlLWdvbGQtc3RhbmRhcmQtZm9yLWRlZmVhdGluZy1haS1kZWVwZmFrZXMucGRm__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8oNN1OGa$> C. Maxine Most Sent from my iPhone _______________________________________________ A Community Group mailing list of KantaraInitiative.org DG-DeepfakesIDV mailing list -- dg-deepfakesidv@kantarainitiative.org<mailto:dg-deepfakesidv@kantarainitiative.org> To unsubscribe send an email to staff@kantarainitiative.org<mailto:staff@kantarainitiative.org> List archives -- https://urldefense.com/v3/__https://mailman.kantarainitiative.org/hyperkitty/list/dg-deepfakesidv@kantarainitiative.org/__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8k5eBy5l$<https://urldefense.com/v3/__https:/mailman.kantarainitiative.org/hyperkitty/list/dg-deepfakesidv@kantarainitiative.org/__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8k5eBy5l$> ______ Group wiki -- https://urldefense.com/v3/__https://kantara.atlassian.net/wiki/spaces/DFDG/overview__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8oelfPw4$<https://urldefense.com/v3/__https:/kantara.atlassian.net/wiki/spaces/DFDG/overview__;!!OrxsNty6D4my!9XZpaaV8SEepd9W3fOJr0smBF_Pki9oX0FRk5NIZr0_pmNVWMCeVtGeG-Lez_7hlGv0M52_EcapGzZxApElpoSqbJ96IIcxNUrvi8oelfPw4$> ________________________________ This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential information. If you have received it in error, please notify the sender immediately and delete the original. Any other use of the e-mail by you is prohibited. Where allowed by local law, electronic communications with Accenture and its affiliates, including e-mail and instant messaging (including content), may be scanned by our systems for the purposes of information security, AI-powered support capabilities, and assessment of internal compliance with Accenture policy. Your privacy is important to us. Accenture uses your personal data only in compliance with data protection laws. For further information on how Accenture processes your personal data, please see our privacy statement at https://www.accenture.com/us-en/privacy-policy. ______________________________________________________________________________________ www.accenture.com