2022 57th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST) 2022
DOI: 10.1109/icest55168.2022.9828791
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Protection Obstacles with 3D Reconstructed Models of People in Applications and the Metaverse: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Stolen avatars might be used for money laundering purposes with cryptocurrencies. Vladimirov et al [68] analyses the threats that a realistic digital clone (avatar) of a person can have in the wrong hands from the perspective of security and privacy. In his study, a network intrusion detection system, by protecting against cyberattacks, misuse, and negligence, and dynamic information flow tracking methods, by monitoring the flow of user login details, are proposed to detect unauthorised access to the metaverse platforms in an automated way to avoid avatar theft.…”
Section: Avatar Theftmentioning
confidence: 99%
“…Stolen avatars might be used for money laundering purposes with cryptocurrencies. Vladimirov et al [68] analyses the threats that a realistic digital clone (avatar) of a person can have in the wrong hands from the perspective of security and privacy. In his study, a network intrusion detection system, by protecting against cyberattacks, misuse, and negligence, and dynamic information flow tracking methods, by monitoring the flow of user login details, are proposed to detect unauthorised access to the metaverse platforms in an automated way to avoid avatar theft.…”
Section: Avatar Theftmentioning
confidence: 99%
“…big data, IoT, blockchain, AR, VR, and DT). Cybersecurity countermeasures have emerged in Metaverse environments [60], [61], [62], [63]. Figure 10 shows various security issues and their corresponding countermeasures.…”
Section: ) Cybersecuritymentioning
confidence: 99%
“…Virtual humans must handle large amounts of user data, such as voice and behavioral habits. The collection, storage, and analysis of data often involves user privacy and security issues [103]. Therefore, data protection and information security are important considerations in the development and application process.…”
Section: ) Privacy and Securitymentioning
confidence: 99%