Breakthroughs in Digital Biometrics and Forensics 2022
DOI: 10.1007/978-3-031-10706-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Media Forensics and Deepfake in Society

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 34 publications
0
0
0
Order By: Relevance
“…The weakness and exploits of human psychology (greed, curiosity, emotions) promote social engineering and other attacks that are difficult to counter through software or hardware solutions 83,140 . The attacker can gain control over computers and information and can use it for illegal and threatening activities 140 . In such a scenario, even blockchain technology's security can't secure the user from herself 134 …”
Section: Discussion Of the Endpoint Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The weakness and exploits of human psychology (greed, curiosity, emotions) promote social engineering and other attacks that are difficult to counter through software or hardware solutions 83,140 . The attacker can gain control over computers and information and can use it for illegal and threatening activities 140 . In such a scenario, even blockchain technology's security can't secure the user from herself 134 …”
Section: Discussion Of the Endpoint Vulnerabilitiesmentioning
confidence: 99%
“…83,140 The attacker can gain control over computers and information and can use it for illegal and threatening activities. 140 In such a scenario, even blockchain technology's security can't secure the user from herself. 134 The mere solution is to educate the users about the approaches of social engineering fraud.…”
Section: Human Negligencementioning
confidence: 99%
“…Deepfakes have gained attention due to their ability to generate convincing forgeries that can be indistinguishable from authentic recordings. This technology employs a two-step process: training a DNN on a large dataset of real media to learn patterns and then using that knowledge to generate new content by altering or replacing elements within the media (Nowroozi et al ., 2022).…”
Section: Introductionmentioning
confidence: 99%