Popular Discourse Around Deepfakes and the Interdisciplinary Challenge of Fake Video Distribution

Author(s):  
Catherine Francis Brooks
2021 ◽  
pp. 147035722097406
Author(s):  
Nashwa Elyamany

Musical numbers, as viral modes of entertainment, influential forms of visual culture and catalysts of popular discourse are dense with multivariate aesthetic performers, and are interlaced to punctuate the melodramatic narrative texture in advancement of the plot and characterization in musical films. Performing identity through dancing bodies has been the subject of several film, music, culture, performance and communication research endeavours yet has rarely been explored from multimodal discourse analysis perspectives. To examine the ‘resilient identities’ underlying performances, the article adopts an eclectic approach informed by the Bakhtinian chronotope with regard to two numbers drawn from a recent American musical film in order to pinpoint: (a) the full repertoire of multimodal resources of narrative agency and identity performance; (b) the emotional experiences evoked by the musical numbers; and (c) the social practices that constitute, maintain and resist social realities and identities. The unconventional approach to the analysis of the musical numbers is what makes the current research project stand out among interdisciplinary studies of musical discourse.


2018 ◽  
Vol 28 (4) ◽  
pp. 997-1008 ◽  
Author(s):  
Yipeng Zhou ◽  
Liang Chen ◽  
Mi Jing ◽  
Zhong Ming ◽  
Yuedong Xu

Author(s):  
Hideaki Kimata ◽  
Daisuke Ochi ◽  
Akio Kameda ◽  
Hajime Noto ◽  
Katsuhiko Fukazawa ◽  
...  

2014 ◽  
Vol 984-985 ◽  
pp. 1357-1363
Author(s):  
M. Vinothini ◽  
M. Manikandan

During real time there are problems in transmitting video directly to the client. One of the main problems is, intermediate intelligent proxy can easily hack the data as the transmitter fails to address authentication, and fails to provide security guarantees. Hence we provide steganography and cryptography mechanisms like secure-code, IP address and checksum for authentication and AES algorithm with secret key for security. Although the hacker hacks the video during transmission, he cannot view the information. Based on IP address and secure-code, the authenticated user only can get connected to the transmitter and view the information. For further improvement in security, the video is converted into frames and these frames are split into groups and separate shared key is applied to each group of frames for encryption and decryption. This secured communication process is applied in image processing modules like face detection, edge detection and color object detection. To reduce the computation time multi-core CPU processing is utilized. Using multi-core, the tasks are processed in parallel fashion.


2016 ◽  
Vol 34 (8) ◽  
pp. 2207-2218 ◽  
Author(s):  
Angela Sara Cacciapuoti ◽  
Marcello Caleffi ◽  
Mingyue Ji ◽  
Jaime Llorca ◽  
Antonia Maria Tulino
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document