Frontiers in Fake Media Generation and Detection -

Frontiers in Fake Media Generation and Detection (eBook)

eBook Download: PDF
2022 | 1. Auflage
XVI, 273 Seiten
Springer Nature Singapore (Verlag)
978-981-19-1524-6 (ISBN)
Systemvoraussetzungen
171,19 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones' attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.



Mahdi Khosravy was born in Birjand, Iran, 1979. He received BSc. in Electrical Engineering (bio-electric) from the Sahand University of Technology, Tabriz, Iran, and MSc. in Biomedical Engineering (bio-electric) from Beheshti University of Medical Studies, Tehran, Iran. Mahdi received his Ph.D. in Interdisciplinary Intelligent Systems from University of the Ryukyus, Okinawa, Japan. He was awarded by the head of the University for excellence in research activities. To grow his international experience in education and research, in September 2010, he joined the University of Information Science and Technology, North Macedonia. In July 2017, he became an associate professor. August 2018 he joined the Energy lab in the University of the Ryukyus, Japan as a Visiting Researcher, and from April 2018 to September 2019, he was jointly a visiting associate professor in the Electrical Engineering Department, Federal University of Juiz de Fora in Brazil. From 2019 to 2021, he was a specially appointed researcher in Osaka University under the MediaClone project. Currently, he is a senior research scientist in Cross Labs, Cross-compass Ltd. Tokyo, Japan. He is a member of IEEE.

Isao Echizen received B.S., M.S., and D.E. degrees from the Tokyo Institute of Technology, Japan, in 1995, 1997, and 2003, respectively. He joined Hitachi, Ltd. in 1997 and until 2007 was a research engineer in the company's systems development laboratory. He is currently a director and a professor of the Information and Society Research Division, the National Institute of Informatics (NII), a director of the Global Research Center for Synthetic Media, the NII, and a professor in the Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo, Japan. He was a visiting professor at Tsuda University, Japan, at the University of Freiburg, Germany, and at the University of Halle-Wittenberg, Germany. He is currently engaged in research on multimedia security and multimedia forensics. He currently serves as a research director in CREST FakeMedia project, Japan Science and Technology Agency (JST). He received the Best Paper Award from the IPSJ in 2005 and 2014, the Fujio Frontier Award and the Image Electronics Technology Award in 2010, the One of the Best Papers Award from the Information Security and Privacy Conference in 2011, the IPSJ Nagao Special Researcher Award in 2011, the DOCOMO Mobile Science Award in 2014, the Information Security Cultural Award in 2016, and the IEEE Workshop on Information Forensics and Security Best Paper Award in 2017. He was a member of the Information Forensics and Security Technical Committee and the IEEE Signal Processing Society. He is the Japanese representative on IFIP TC11 (Security and Privacy Protection in Information Processing Systems), a member-at-large of board-of-governors of APSIPA, and an editorial board member of the IEEE Transactions on Dependable and Secure Computing and the EURASIP Journal on Image and Video processing.

Noboru Babaguchi received the B.E., M.E. and Ph.D. degrees in communication engineering from Osaka University, in 1979, 1981 and 1984, respectively. He is currently a Professor of the Department of Information and Communications Technology, Osaka University. From 1996 to 1997, he was a Visiting Scholar at the University of California, San Diego. His research interests include image/video analysis, multimedia computing and intelligent systems. Recently, he has been engaged in privacy protection for visual information, and security and fabrication of multimedia. He has published over 250 journal and conference papers and several textbooks. Prof. Babaguchi received Best Paper Award of PCM2006 and IAS2009. He is on the editorial board of Multimedia Tools and Applications, and New Generation Computing. He served as a Guest Editor of IEEE TIFS, Special Issue on Intelligent Video Surveillance for Public Security & Personal Privacy He also served as a workshop Co-chair of MIR2001, a Track Co-chair of IEEEICME2006, a General Co-chair of MMM2008, a Sub-Track Chair of APSIPAASC 2009, a General Co-Chair of ACM Multimedia 2012, a Track Co-Chair of ICPR2012, an Area Chair of IEEE ICME2013, and an Honorary Co-Chair of ACM ICMR2018. He also served on program committee of international conferences in multimedia related fields. He is a Fellow of IEICE, a Senior Member of IEEE, and a member of ACM, IPSJ, ITE and JSAI. 


The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones' attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.
Erscheint lt. Verlag 28.5.2022
Reihe/Serie Studies in Autonomic, Data-driven and Industrial Computing
Zusatzinfo XVI, 273 p. 81 illus., 64 illus. in color.
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik
Schlagworte Adversarial Defense • Adversarial Detection • Clone Attack • Cloned Recognizers • data anonymization • generative models
ISBN-10 981-19-1524-5 / 9811915245
ISBN-13 978-981-19-1524-6 / 9789811915246
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
24,90