Detecting “DeepFakes” in H.264 Video Data Using Compression Ghost Artifacts

2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.

2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Irene Amerini ◽  
Rudy Becarelli ◽  
Roberto Caldelli ◽  
Matteo Casini

Nowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in detecting forgeries in which a portion of an image is cloned somewhere else onto the same image. Anyway such techniques cannot be adopted to deal with splicing attack, that is, when the image portion comes from another picture that then, usually, is not available anymore for an operation of feature match. In this paper, a procedure in which these techniques could also be employed will be shown to get rid of splicing attack by resorting to the use of some repositories of images available on the Internet like Google Images or TinEye Reverse Image Search. Experimental results are presented on some real case images retrieved on the Internet to demonstrate the capacity of the proposed procedure.


Author(s):  
Alexander Carôt

With the current Internet bandwidth capacities and machine processing performance the personal computer has become an affordable and flexible multimedia platform for high quality audio and video content. Besides the delivery of services such as TV, telephone and radio, the Internet can also be used for the instantaneous bidirectional exchange of musical information. Due to the variety and complexity of already existing remote music and communication approaches, an elaboration on this topic is mandatory, which covers any relevant musical, technical or interdisciplinary aspect of remote musical interaction. Therefore, this chapter gives an overview of currently applied technologies and possibilities with their theoretical background.


2019 ◽  
Vol 2019 ◽  
pp. 1-22 ◽  
Author(s):  
Krzysztof Cabaj ◽  
Marcin Gregorczyk ◽  
Wojciech Mazurczyk ◽  
Piotr Nowakowski ◽  
Piotr Żórawski

Currently 5G communication networks are envisioned to offer in a near future a wide range of high-quality services and unfaltering user experiences. In order to achieve this, several issues including security, privacy, and trust aspects need to be solved so that the 5G networks can be widely welcomed and accepted. Considering above, in this paper, we take a step towards these requirements by proposing a dedicated SDN-based integrated security framework for the Internet of Radio Light (IoRL) system that is following 5G architecture design. In particular, we present how TCP SYN-based scanning activities and DHCP-related network threats like Denial of Service (DoS), traffic eavesdropping, etc. can be detected and mitigated using such an approach. Enclosed experimental results prove that the proposed security framework is effective and efficient and thus can be considered as a promising defensive solution.


2021 ◽  
Vol 37 ◽  
pp. 01015
Author(s):  
Chitra Ramesh ◽  
Jayalakshmi Sekar

The Internet of Things allows things to become active users, facilitating interaction with things and the sharing of data between them. The most interesting issue in the science world, the public sector and industry in the IoT is unavoidable. It ensures a seamless relationship between doctors and patients that results in medical treatment with high quality results. This is accomplished by constant surveillance of patients through the use of sensors. The collected data is registered for potential uses and used for analytics. The analytical approach offers the opportunity for disease detection in healthcare results. This paper concerns the Internet of Things in healthcare and explores the different algorithms used in it. The system involved in analytics of healthcare and data sources involved in analytics are further clarified. Finally this paper demonstrates the Internet of Things and Big Data survey of healthcare systems with a reference table.


Author(s):  
Banage T. G. S. Kumara ◽  
Incheon Paik ◽  
Koswatte R. C. Koswatte

With the large number of web services now available via the internet, service discovery, recommendation, and selection have become a challenging and time-consuming task. Organizing services into similar clusters is a very efficient approach. A principal issue for clustering is computing the semantic similarity. Current approaches use methods such as keyword, information retrieval, or ontology-based methods. These approaches have problems that include discovering semantic characteristics, loss of semantic information, and a shortage of high-quality ontologies. Thus, the authors present a method that first adopts ontology learning to generate ontologies via the hidden semantic patterns existing within complex terms. Then, they propose service recommendation and selection approaches based on proposed clustering approach. Experimental results show that the term-similarity approach outperforms comparable existing clustering approaches. Further, empirical study of the prototyping recommendation and selection approaches have proved the effectiveness of proposed approaches.


2008 ◽  
Vol 18 (1) ◽  
pp. 24-31
Author(s):  
Martha Wilder Wilson ◽  
Elizabeth Zylla-Jones

Abstract The goal of university training programs is to educate speech-language pathology and audiology students to become competent and independent practitioners, with the ability to provide high quality and professional services to the public. This article describes the behaviors of “at-risk” student clinicians, so they may be identified early in their practica and remediation may be implemented. The importance of establishing a student at-risk protocol is discussed as well as a remediation plan for these students. This article summarized the Auburn University Speech and Hearing Clinic’s Student At-Risk Protocol, which may serve as a model for university training programs. The challenges of implementing such a protocol are also discussed.


Author(s):  
Matthew Hindman

The Internet was supposed to fragment audiences and make media monopolies impossible. Instead, behemoths like Google and Facebook now dominate the time we spend online—and grab all the profits from the attention economy. This book explains how this happened. It sheds light on the stunning rise of the digital giants and the online struggles of nearly everyone else—and reveals what small players can do to survive in a game that is rigged against them. The book shows how seemingly tiny advantages in attracting users can snowball over time. The Internet has not reduced the cost of reaching audiences—it has merely shifted who pays and how. Challenging some of the most enduring myths of digital life, the book explains why the Internet is not the postindustrial technology that has been sold to the public, how it has become mathematically impossible for grad students in a garage to beat Google, and why net neutrality alone is no guarantee of an open Internet. It also explains why the challenges for local digital news outlets and other small players are worse than they appear and demonstrates what it really takes to grow a digital audience and stay alive in today's online economy. The book shows why, even on the Internet, there is still no such thing as a free audience.


2019 ◽  
Vol 25242644 ◽  
pp. 63-68
Author(s):  
Alina Lisnevska

The myth-making processes in the communicative space are the «cornerstone» of ideology at all times of mankind’s existence. One of the tools of the effective impact of propaganda is trust in information. Today this come round due to the dissemination of information on personalized video content in social networks, including through converged media. New myths and social settings are creating, fate of the countries is being solved, public opinion is being formed. It became possible to create artificially a model of social installation using the myths (the smallest indivisible element of the myth) based on real facts, but with the addition of «necessary» information. In the 20–30 years of the XX century cinematograph became the most powerful screen media. The article deals with the main ideological messages of the Ukrainian Soviet film «Koliivshchyna» (1933). In the period of mass cinematography spread in the Soviet Ukraine, the tape was aimed at a grand mission – creation of a new mythology through the interpretation of the true events and a con on the public, propaganda of the Soviet ideology. This happened in the tragic period of Ukrainian history (1933, the Holodomor) through the extrapolation of historical truth and its embodiment in the most formative form at that time – the form of the screen performance. The Soviet authorities used the powerful influence of the screen image to propagate dreams, illusions, images, stereotypes that had lost any reference to reality. I. Kavaleridze’s film «Koliivshchyna» demonstrates the interpretation of historical events and national ideas, the interpretation of a relatively remote past through the ideology of the «Soviet-era». The movie is created as a part of the political conjuncture of the early 1930s: the struggle against Ukrainian «bourgeois nationalism» and against the «Union of Liberation Ukraine», the repressive policies against the peasants, the close-out of the «back to the roots» policy. The movie, on the one hand, definitely addresses to the Ukrainian ideas, on the other hand it was made at the period of the repressions against the Ukrainian peasantry. In the movie «Koliivshchyna», despite the censorship, I. Kavaleridze manages to create a national inclusive narrative that depicts Ukrainian space as multi-ethnic and diverse, but at the same time nationally colorful.


Sign in / Sign up

Export Citation Format

Share Document