2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&am 2022
DOI: 10.1109/itqmis56172.2022.9976507
|View full text |Cite
|
Sign up to set email alerts
|

Deepfakes and Information Security Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Initially, the quality of deepfakes was limited, with visible anomalies that made them distinguishable from genuine media. However, over time, these technologies have evolved to produce highly convincing and indistinguishable manipulations of aural and visual content, blurring the lines between reality and fabrication (Frolov, Makhaev, & Shishkarev, 2022). This progression is intricately associated with expansive advancements in the domains of machine learning and neural networks.…”
Section: Historical Context and Evolutionmentioning
confidence: 99%
“…Initially, the quality of deepfakes was limited, with visible anomalies that made them distinguishable from genuine media. However, over time, these technologies have evolved to produce highly convincing and indistinguishable manipulations of aural and visual content, blurring the lines between reality and fabrication (Frolov, Makhaev, & Shishkarev, 2022). This progression is intricately associated with expansive advancements in the domains of machine learning and neural networks.…”
Section: Historical Context and Evolutionmentioning
confidence: 99%
“…Another easier channel of getting computer virus is via e-mail attachments, which are downloaded into the computer system via an internet connectivity. As soon as the corrupted or infected file is open through an application, the malicious code duplicates itself into a file on the computers' hard drive [12]. Where it wants to deliver its payload (whatever the programmer designed it to do to your system), by simply deleting the email after opening the attachment would not eliminate the virus, since it has already entered the machine.…”
Section: Related Literature Reviewmentioning
confidence: 99%