Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The aim of this article is to present methods for protecting audio and video transmissions from manipulation in the context of the use of artificial intelligence. In addition, the aim of the article is to characterise steganography techniques and their practical application. The subject of the considerations is to provide an overview of how audio-video transmission can be secured against the risks associated with the application of artificial intelligence used for deepfake transmission.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Opis fizyczny
Bibliogr. 19 poz., rys.
Twórcy
autor
- Lecturer at the Polish Naval Academy, 69 Śmidowicza Str., 81-127 Gdynia, Poland
autor
- Lecturer at the Polish Naval Academy, 69 Śmidowicza Str., 81-127 Gdynia, Poland
autor
- Lecturer at the Polish Naval Academy, 69 Śmidowicza Str., 81-127 Gdynia, Poland
Bibliografia
- 1. Altaay, Alaa A. Jabbar, et al. “An Introduction to Image Steganography Techniques.” 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), IEEE, Kuala Lumpur, Malaysia, 2012, pp. 122–126.
- 2. Antonopoulos, Andreas M., Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O'Reilly Media, 2017.
- 3. Caviglione, L., and W. Mazurczyk. “Never Mind the Malware, Here’s the Stegomalware.” IEEE Security & Privacy, 2022, pp. 101–106.
- 4. Cyber Security Conference, 8th NMIOTC Conference on Cyber Security in the Maritime Domain, NMIOTC,https://nmiotc.nato.int/transformation/conferences/cyber-security-conference.
- 5. Devine C., O'Sullivan D. Lyngaas S, “CNN Investigates”, A fake recording of a candidate saying he’d rigged the election went viral. Experts say it’s only the beginning, CNN, 1 Feb. 2024. https://edition.cnn.com/2024/02/01/politics/election-deepfake-threatsinvs/index.html.
- 6. ENISA Threat Landscape 2024, 19 Sep. 2024, https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024.
- 7. EU AI Act: first regulation on artificial intelligence, 18 Jul. 2024, https://www.europarl.europa.eu/topics/en/article/20230601STO93804/eu-ai-act-first-regulation-on-artificial-intelligence.
- 8. Iftekharuddin, K.M., and F. Ahmed. “Detection | image post-processing and electronic distribution.” Encyclopedia of Modern Optics, 2005, pp. 206–218, https://doi.org/10.1016/b0-12-369395-0/00730-2.
- 9. Jackson T., Deepfakes And The Erosion Of Digital Trust: Zero-Trust Strategies In The Age Of AI-Generated Content, Forbes Media LLC, 14 Mar 2024, https://www.forbes.com/councils/forbestechcouncil/2024/03/14/deepfakes-andthe-erosion-of-digital-trust-zero-trust-strategies-in-the-age-of-ai-generatedcontent.
- 10. Jain, Anil K., Handbook of Biometrics, Springer, 2007.
- 11. Kadian, Poonam, et al. “Robust digital watermarking techniques for copyright protection of Digital Data: A survey.” Wireless Personal Communications, vol. 118, no. 4, 23 Feb. 2021, pp. 3225–3249, https://doi.org/10.1007/s11277-021-08177-w.
- 12. Martens X., “Internet Storm Center”. ShellCode Hidden with Steganography, SANS Technology Institute, 28 Jul 2023,https://isc.sans.edu/diary/ShellCode+Hidden+with+Steganography/30074.
- 13. Por Lip Yee, Beh Delina. “Information Hiding: A New Approach in Text Steganography.” Advances on Applied Computer and Applied Computational Science, WSEAS Press, Hangzhou, China, 2008, pp. 689–695.
- 14. Rizal M., Tech Companies and Their Obsession With AI, Hackerdose LLC, 7 July 2024, https://hackerdose.com/editors-picks/tech-companies-obsession-ai.
- 15. Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, 1996.
- 16. Sharmila, K., Kamalakkannan, S., & Devi, M. R. (2019). A comprehensive study on blockchain with its components, taxonomy and consensus. International Journal of Advanced Science and Technology. https://www.researchgate.net/publication/333161368_A_Comprehensive_study_on_Blockchain_with_its_Components_Taxonomy_and_Consensus.
- 17. Sora, Research techniques, OpenAI, https://openai.com/index/sora.
- 18. Stech B., Polska ma patent na przełomowy sposób szyfrowania. To nowa jakość w zabezpieczeniach, Spider’s Web, 28 Oct 2024, https://spidersweb.pl/2024/08/polska-ma-patent-na-przelomowy-sposobszyfrowania.html.
- 19. Zhang, David. Advanced Biometrics: Technology and Systems. Springer, 2010.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3a02a241-48ec-4f15-bdf9-a393c2560786
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.