A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cybersecurity in the AI-Based Metaverse: A Survey
2022
Applied Sciences
Based on the results, the issue of user identification plays a very important role in the presented works, for which biometric methods are the most commonly used. ...
A cyber-situation management system based on artificial intelligence should be able to analyze data of any volume with the help of algorithms. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app122412993
fatcat:z47jwlc2cje7lddeibk7lcp5li
Machine Learning Techniques for Image Forensics in Adversarial Setting
2020
Zenodo
The analysis of the security of machine learning-based techniques in the presence of an adversary attempting to impede the forensic analysis, and the development of new solutions capable to improve the ...
detectors based on machine learning in several adversarial scenarios. ...
Thanks to my father (Esmaeil Nowroozi -he was passed away on 1986) that reminds us love, respect, care, shelter, support, sacrifices, and many more. ...
doi:10.5281/zenodo.4559666
fatcat:itun24lqq5blxfrvmg67pa7ddq
Transferable Class-Modelling for Decentralized Source Attribution of GAN-Generated Images
[article]
2022
arXiv
pre-print
Our models are determined via experimentation to be competitive with current benchmarks, and capable of decent performance on human portraits in ideal conditions. ...
Decentralized fingerprint-based attribution is found to retain validity in the presence of novel sources, but is more susceptible to type II errors that intensify with image perturbations and attributive ...
Since GAP is inappropriate for summarizing spectral coefficients, variants of our model intended for frequency domain analysis omit CAM for a typical ConvNet structure at the cost of increased complexity ...
arXiv:2203.09777v1
fatcat:uxjx4y4ntna5hfjmme5v2545oi
Visual analysis of faces with application in biometrics, forensics and health informatics
[article]
2016
Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet
and then the coefficients of the Discrete Cosine Transform (DCT) of the autocorrelation of these segments have been obtained for the identification. [35] a ZivMerhav cross parsing method based on ...
and social cue analysis [8] . ...
For example, fingerprint and hand-written signature can be forged to breach the identification system [2] , voice can be altered or imitated, and still picture based traits can be used in absence of the ...
doi:10.5278/vbn.phd.engsci.00104
fatcat:445elv6ftfcw3lhg7svwqx3ifu
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
[article]
2021
arXiv
pre-print
Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also led to an increased risk of privacy invasion. ...
Specifically, we present a definition and a taxonomy of OSN image privacy, and a high-level privacy analysis framework based on the lifecycle of OSN image sharing. ...
[32] reviewed the state of the art in privacy-preserving schemes developed for (or applied in the context of) ad hoc social networks, including mobile social networks (MSNs) and vehicular social networks ...
arXiv:2008.12199v2
fatcat:vxv6rsnyavesjiw2bbnc4jzsiy
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques
2016
IEEE Access
In this paper, we classify the data in terms of data mining rules on complex types of data such as time-series, symbolic sequences, data streams, and so forth. ...
Over the last 25 years, there has been much work on multimedia digital watermarking. In this domain, the primary limitation to watermark strength has been in its visibility. ...
identification of every image/video at the acquisition hardware of standard cameras. ...
doi:10.1109/access.2016.2570812
fatcat:2xxteahvprepzekaqqbbyey7hi
Interpol questioned documents review 2019-2022
2023
In this data-driven approach taking input from both raw JPEG DCT coefficients and decompressed image pixels, the authors explored CNN capabilities of learning deep representations from training data, thus ...
In this study [654] , Mondal et al. explored a Multi-Tasking learning (MTL) based network to perform document attribute classification They used a MTL based network for the classification of a full document ...
doi:10.1016/j.fsisyn.2022.100300
pmid:36875349
pmcid:PMC9974465
fatcat:4ekk6rdgdzfoxf6i4l2uh2mwji
Strengthening trust in the identity life cycle
[article]
2019
The security of birth certificates is strengthened by a blockchain based system and a 2D barcode which stores biometric information. ...
On the other hand, electronic travel documents are only one part of the document life cycle, since a passport can be obtained with an insecure birth certificate. ...
The lossless Huffmann compression of the JPG data gets decompressed and the DCT coefficients get recompressed by a more efficient compression algorithm. ...
doi:10.17169/refubium-1829
fatcat:23mb2ng5j5hddgpbmldt5xylfm