2022 International Conference on Cyber Resilience (ICCR) 2022
DOI: 10.1109/iccr56254.2022.9995978
|View full text |Cite
|
Sign up to set email alerts
|

The Threat of Deep Fake Technology to Trusted Identity Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 26 publications
0
0
0
Order By: Relevance
“…Further, some works were left aside since they didn't fit the survey's scope in terms of application or architecture. In this context, (Rezende et al, 2017), for instance, employ a shallow model, that is, the Support Vector Machines (SVM) for classification purposes, while (Agarwal et al, 2021; Atif et al, 2022; Mohammad et al, 2021; Shruti & Hany, 2021; Shubham et al, 2021) presents different methods for fake image classification using distinct feature extraction techniques. Additionally, the work of (Birunda et al, 2022), which addresses deepfake detection using the Flood Fill algorithm, can be included in this list.…”
Section: Review Methodologymentioning
confidence: 99%
“…Further, some works were left aside since they didn't fit the survey's scope in terms of application or architecture. In this context, (Rezende et al, 2017), for instance, employ a shallow model, that is, the Support Vector Machines (SVM) for classification purposes, while (Agarwal et al, 2021; Atif et al, 2022; Mohammad et al, 2021; Shruti & Hany, 2021; Shubham et al, 2021) presents different methods for fake image classification using distinct feature extraction techniques. Additionally, the work of (Birunda et al, 2022), which addresses deepfake detection using the Flood Fill algorithm, can be included in this list.…”
Section: Review Methodologymentioning
confidence: 99%
“…Further, some works were left aside since they didn't fit the survey's scope in terms of application or architecture. In this context, Rezende et al [16], for instance, employs a shallow model, i.e., the Support Vector Machines (SVM) for classification purposes, while [17,18,19,20,21] presents different methods for fake image classification using distinct feature extraction techniques. Additionally, the work of Birunda et al [22], which addresses deepfake detection using the Flood Fill algorithm, can be included in this list.…”
Section: Selection Criteriamentioning
confidence: 99%
“…They employed a smartphone with a compromised camera to trick the tax invoice system with pre-generated deepfake identities. Another concerning aspect is its potential misuse in child predator scenarios [27], where the predator hides behind a virtual avatar, needing no resemblance to any existing individual. reenactment is a suitable form of deepfakes to spoof face biometrics systems implementing real-time challenge-response liveness detection mechanisms.…”
Section: Face Swapmentioning
confidence: 99%