2020 IEEE / ITU International Conference on Artificial Intelligence for Good (AI4G) 2020
DOI: 10.1109/ai4g50087.2020.9311067
|View full text |Cite
|
Sign up to set email alerts
|

Combating Deepfakes: Multi-LSTM and Blockchain as Proof of Authenticity for Digital Media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 35 publications
0
15
0
Order By: Relevance
“…decentralized storage ability to Blockchain-based Ethereum Name service. Chan et al [115] proposed a decentralized approach based on Blockchain to trace and track digital content's historical provenance (i.e., image, videos, etc.). In this proposed approach, multiple LSTM networks are being used as a deep encoder for creating discriminating features, which are then compressed and used to hash the transaction.…”
Section: • Integrates the Critical Features Of Ipfs [114]-basedmentioning
confidence: 99%
“…decentralized storage ability to Blockchain-based Ethereum Name service. Chan et al [115] proposed a decentralized approach based on Blockchain to trace and track digital content's historical provenance (i.e., image, videos, etc.). In this proposed approach, multiple LSTM networks are being used as a deep encoder for creating discriminating features, which are then compressed and used to hash the transaction.…”
Section: • Integrates the Critical Features Of Ipfs [114]-basedmentioning
confidence: 99%
“…Prevention: For the prevention of deepfakes, some suggested blockchains and other distributed ledger technologies (DLTs) can be used for finding data provenance and tracing the information (Chauhan and Kumar, 2020 ; Fraga-Lamas and Fernandez-Carames, 2020 ; Ki Chan et al, 2020 ; Yazdinejad et al, 2020 ). Extracting and comparing affecting cues corresponding to perceived emotions from the digital content is also proposed as a way to combat deepfakes (Mittal et al, 2020 ).…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…For instance, Koopman et al [ 62 ] analyzed photo response non-uniformity (PRNU) for detection. Also, warping artifacts [ 63 ], eye blinking [ 64 ], optical flow with CNNs [ 65 ], heart rate [ 66 ], image quality [ 28 ], local image textures [ 37 ], long short-term memory (LSTM) and recurrent neural network (RNN) [ 67 ], multi-LSTM and blockchain [ 68 ], clustering [ 69 ], context [ 70 ], compression artifacts [ 71 ], metric learning [ 72 ], CNN ensemble [ 73 ], Identity-aware [ 74 ], transformers [ 75 ], audio-visual dissonance [ 76 ], and multi-attentional [ 77 ] features were used. Very few works have been focused on deepfake detection method’s explainability (e.g., [ 78 ]) and generalization capability (e.g., work of Bekci et al in [ 38 ] and Aneja et al [ 79 ] work using zero-shot learning).…”
Section: Deepfake Generation and Detectionmentioning
confidence: 99%