Data-Driven Digital Integrity Verification
نویسندگان
چکیده
Abstract Images and videos are by now a dominant part of the information flowing on Internet preferred communication means for younger generations. Besides providing information, they elicit emotional responses, much stronger than text does. It is probably these reasons that advent AI-powered deepfakes, realistic relatively easy to generate, has raised great concern among governments ordinary people alike.
منابع مشابه
Integrity verification for XML data
The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile...
متن کاملReplicated Data Integrity Verification in Cloud
Cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality applications and services from a shared pool of configurable computing resources. However, since data owners and cloud servers are not in the same trusted domain, ...
متن کاملData Integrity Verification in Cloud Computing
Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cl...
متن کاملCompositional Verification of Integrity for Digital Stream Signature Protocols
We investigate the application of concurrency theory notions as simulation relations and compositional proof rules for verifying digital stream signature protocols. In particular, we formally prove the integrity of the Gennaro-Rohatgi protocols in [7]. As a peculiarity, our technique is able to check a protocol with an unbounded number of parallel processes. We argue also that our approach may ...
متن کاملExperiments on Formal Verification of Mobile Agent Data Integrity Properties
This paper explores the possibility of applying existing verification techniques and tools to the cryptographic mechanisms specifically designed for the protection of mobile agents from their environment, with a particular emphasis on agent data integrity. In a previous paper we explored the use of the CSPbased tools FDR and Casper. Here, instead, we present our experience with a prototype of a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in computer vision and pattern recognition
سال: 2022
ISSN: ['2191-6594', '2191-6586']
DOI: https://doi.org/10.1007/978-981-16-7621-5_11