Data-Driven Digital Integrity Verification

نویسندگان

چکیده

Abstract Images and videos are by now a dominant part of the information flowing on Internet preferred communication means for younger generations. Besides providing information, they elicit emotional responses, much stronger than text does. It is probably these reasons that advent AI-powered deepfakes, realistic relatively easy to generate, has raised great concern among governments ordinary people alike.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrity verification for XML data

The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile...

متن کامل

Replicated Data Integrity Verification in Cloud

Cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality applications and services from a shared pool of configurable computing resources. However, since data owners and cloud servers are not in the same trusted domain, ...

متن کامل

Data Integrity Verification in Cloud Computing

Cloud computing is recognized as a hottest technology which has a significant impact on IT field in the nearby future. Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. Cloud computing is on demand and pay per use service. That means customers pay providers based on usage. Data Integrity is the major issue in cl...

متن کامل

Compositional Verification of Integrity for Digital Stream Signature Protocols

We investigate the application of concurrency theory notions as simulation relations and compositional proof rules for verifying digital stream signature protocols. In particular, we formally prove the integrity of the Gennaro-Rohatgi protocols in [7]. As a peculiarity, our technique is able to check a protocol with an unbounded number of parallel processes. We argue also that our approach may ...

متن کامل

Experiments on Formal Verification of Mobile Agent Data Integrity Properties

This paper explores the possibility of applying existing verification techniques and tools to the cryptographic mechanisms specifically designed for the protection of mobile agents from their environment, with a particular emphasis on agent data integrity. In a previous paper we explored the use of the CSPbased tools FDR and Casper. Here, instead, we present our experience with a prototype of a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in computer vision and pattern recognition

سال: 2022

ISSN: ['2191-6594', '2191-6586']

DOI: https://doi.org/10.1007/978-981-16-7621-5_11