Information Forensics and Security: A quarter-century-long journey
- URL: http://arxiv.org/abs/2309.12159v1
- Date: Thu, 21 Sep 2023 15:13:35 GMT
- Title: Information Forensics and Security: A quarter-century-long journey
- Authors: Mauro Barni and Patrizio Campisi and Edward J. Delp and Gwenael
Do\"err and Jessica Fridrich and Nasir Memon and Fernando P\'erez-Gonz\'alez
and Anderson Rocha and Luisa Verdoliva and Min Wu
- Abstract summary: Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes.
For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era.
- Score: 66.16120845232525
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Information Forensics and Security (IFS) is an active R&D area whose goal is
to ensure that people use devices, data, and intellectual properties for
authorized purposes and to facilitate the gathering of solid evidence to hold
perpetrators accountable. For over a quarter century since the 1990s, the IFS
research area has grown tremendously to address the societal needs of the
digital information era. The IEEE Signal Processing Society (SPS) has emerged
as an important hub and leader in this area, and the article below celebrates
some landmark technical contributions. In particular, we highlight the major
technological advances on some selected focus areas in the field developed in
the last 25 years from the research community and present future trends.
Related papers
- Human Rights for the Digital Age [0.0]
The research focuses on important topics including privacy, freedom of speech, and information access.
The paper highlights the challenges posed by surveillance, data breaches, and the digital divide.
It also explores the role of international law and policy in safeguarding digital rights.
arXiv Detail & Related papers (2024-08-30T13:58:39Z) - Deepfake Generation and Detection: A Benchmark and Survey [134.19054491600832]
Deepfake is a technology dedicated to creating highly realistic facial images and videos under specific conditions.
This survey comprehensively reviews the latest developments in deepfake generation and detection.
We focus on researching four representative deepfake fields: face swapping, face reenactment, talking face generation, and facial attribute editing.
arXiv Detail & Related papers (2024-03-26T17:12:34Z) - A Survey on Decentralized Identifiers and Verifiable Credentials [17.808225768298495]
Self-Sovereign Identity (SSI) gives users full control over their data.
SSI leverages decentralized identifiers (DIDs) and verifiable credentials (VCs)
These technologies have the potential to build more secure and decentralized digital identity systems.
arXiv Detail & Related papers (2024-02-04T11:55:14Z) - A Narrative Review of Identity, Data, and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing [2.5944208050492183]
This review focuses on the need for privacy protection in mobile crowdsourcing and edge computing.
We present insights and highlight advancements in privacy-preserving techniques, addressing identity, data, and location privacy.
This review also discusses the potential directions that can be useful resources for researchers, industry professionals, and policymakers.
arXiv Detail & Related papers (2024-01-20T19:32:56Z) - Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision [0.10923877073891446]
This paper presents a comprehensive survey of recent advancements in AI-driven threat response systems.
The most recent survey covering the AI reaction domain was conducted in 2017.
A total of seven research challenges have been identified, pointing out potential gaps and suggesting possible areas of development.
arXiv Detail & Related papers (2023-12-11T09:17:01Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - Milestones in Autonomous Driving and Intelligent Vehicles: Survey of
Surveys [71.28049144033773]
We propose a Survey of Surveys (SoS) for total technologies of autonomous driving (AD) and intelligent vehicles (IVs)
This article is the first SoS with milestones in AD and IVs, which constitutes our complete research work together with two other technical surveys.
arXiv Detail & Related papers (2023-03-30T08:31:22Z) - Coordinated Science Laboratory 70th Anniversary Symposium: The Future of
Computing [80.72844751804166]
In 2021, the Coordinated Science Laboratory CSL hosted the Future of Computing Symposium to celebrate its 70th anniversary.
We summarize the major technological points, insights, and directions that speakers brought forward during the symposium.
Participants discussed topics related to new computing paradigms, technologies, algorithms, behaviors, and research challenges to be expected in the future.
arXiv Detail & Related papers (2022-10-04T17:32:27Z) - The Liberalities and Tyrannies of ICTs for Vulnerable Migrants: The
Status Quo, Gaps and Directions [0.0]
Research on ICTs and migrants almost entirely focused on migrants' ICT use 'en route' or within developed economies principally in the perspectives of researchers from these regions.
This paper scrutinises the existing research vis-a-vis ICTs' liberating and authoritarian role particularly for vulnerable migrants.
It identifies key gaps and opportunities for future research.
arXiv Detail & Related papers (2021-08-22T16:56:31Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.