Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








8 Hits in 5.7 sec

Cybersecurity in the AI-Based Metaverse: A Survey

Mitra Pooyandeh, Ki-Jin Han, Insoo Sohn
2022 Applied Sciences  
Based on the results, the issue of user identification plays a very important role in the presented works, for which biometric methods are the most commonly used.  ...  A cyber-situation management system based on artificial intelligence should be able to analyze data of any volume with the help of algorithms.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app122412993 fatcat:z47jwlc2cje7lddeibk7lcp5li

Machine Learning Techniques for Image Forensics in Adversarial Setting

Ehsan Nowroozi, Mauro Barni, Benedetta Tondi
2020 Zenodo  
The analysis of the security of machine learning-based techniques in the presence of an adversary attempting to impede the forensic analysis, and the development of new solutions capable to improve the  ...  detectors based on machine learning in several adversarial scenarios.  ...  Thanks to my father (Esmaeil Nowroozi -he was passed away on 1986) that reminds us love, respect, care, shelter, support, sacrifices, and many more.  ... 
doi:10.5281/zenodo.4559666 fatcat:itun24lqq5blxfrvmg67pa7ddq

Transferable Class-Modelling for Decentralized Source Attribution of GAN-Generated Images [article]

Brandon B. G. Khoo, Chern Hong Lim, Raphael C.-W. Phan
2022 arXiv   pre-print
Our models are determined via experimentation to be competitive with current benchmarks, and capable of decent performance on human portraits in ideal conditions.  ...  Decentralized fingerprint-based attribution is found to retain validity in the presence of novel sources, but is more susceptible to type II errors that intensify with image perturbations and attributive  ...  Since GAP is inappropriate for summarizing spectral coefficients, variants of our model intended for frequency domain analysis omit CAM for a typical ConvNet structure at the cost of increased complexity  ... 
arXiv:2203.09777v1 fatcat:uxjx4y4ntna5hfjmme5v2545oi

Visual analysis of faces with application in biometrics, forensics and health informatics [article]

Mohammad Ahsanul Haque
2016 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
and then the coefficients of the Discrete Cosine Transform (DCT) of the autocorrelation of these segments have been obtained for the identification.  [35] a ZivMerhav cross parsing method based on  ...  and social cue analysis [8] .  ...  For example, fingerprint and hand-written signature can be forged to breach the identification system [2] , voice can be altered or imitated, and still picture based traits can be used in absence of the  ... 
doi:10.5278/vbn.phd.engsci.00104 fatcat:445elv6ftfcw3lhg7svwqx3ifu

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also led to an increased risk of privacy invasion.  ...  Specifically, we present a definition and a taxonomy of OSN image privacy, and a high-level privacy analysis framework based on the lifecycle of OSN image sharing.  ...  [32] reviewed the state of the art in privacy-preserving schemes developed for (or applied in the context of) ad hoc social networks, including mobile social networks (MSNs) and vehicular social networks  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
In this paper, we classify the data in terms of data mining rules on complex types of data such as time-series, symbolic sequences, data streams, and so forth.  ...  Over the last 25 years, there has been much work on multimedia digital watermarking. In this domain, the primary limitation to watermark strength has been in its visibility.  ...  identification of every image/video at the acquisition hardware of standard cameras.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Interpol questioned documents review 2019-2022

Marie Deviterne-Lapeyre, Samiah Ibrahim
2023
In this data-driven approach taking input from both raw JPEG DCT coefficients and decompressed image pixels, the authors explored CNN capabilities of learning deep representations from training data, thus  ...  In this study [654] , Mondal et al. explored a Multi-Tasking learning (MTL) based network to perform document attribute classification They used a MTL based network for the classification of a full document  ... 
doi:10.1016/j.fsisyn.2022.100300 pmid:36875349 pmcid:PMC9974465 fatcat:4ekk6rdgdzfoxf6i4l2uh2mwji

Strengthening trust in the identity life cycle [article]

Nicolas Buchmann, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
2019
The security of birth certificates is strengthened by a blockchain based system and a 2D barcode which stores biometric information.  ...  On the other hand, electronic travel documents are only one part of the document life cycle, since a passport can be obtained with an insecure birth certificate.  ...  The lossless Huffmann compression of the JPG data gets decompressed and the DCT coefficients get recompressed by a more efficient compression algorithm.  ... 
doi:10.17169/refubium-1829 fatcat:23mb2ng5j5hddgpbmldt5xylfm