skip to main content
research-article
Free Access

The state of fakery

Published:21 February 2018Publication History
Skip Abstract Section

Abstract

How digital media could be authenticated, from computational, legal, and ethical points of view.

References

  1. Physical Unclonable Functions and Applications: A Tutorial. Proceedings of the IEEE, Volume: 102, Issue: 8, Aug. 2014.Google ScholarGoogle Scholar
  2. Pappu, S.R. Physical One-Way Functions. Pappu, Ravikanth. 2001. Massachusetts Institute of Technology, http://cba.mit.edu/docs/theses/01.03.pappuphd.powf.pdf.Google ScholarGoogle Scholar
  3. Thies, J., Zollhofer, M., Samminger, M., Theobalt, C., and Niessner, M. Face2Face: Real-time Face Capture and Reenactment of RGB Videos, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) http://www.graphics.stanford.edu/~niessner/papers/2016/1facetoface/thies2016face.pdf.Google ScholarGoogle Scholar
  4. Denton, E., Gross, S., and Fergus, R. Semi-Supervised Learning with Context-Conditional Generative Adversarial Networks. 2016 https://arxiv.org/abs/1611.06430.Google ScholarGoogle Scholar
  5. Sencar, H. T., and Memon, N. Digital Image Forensics: There is More to a Picture than Meets the Eye. ISBN-13:978-1461407560 https://www.amazon.com/Digital-Image-Forensics-There-Picture/dp/1461407567/ref=reg_hu-rd_add_1_dp. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. The National Academy of Science. Strengthening Forensic Science in the United State: A Path Forward. 2009. The National Academies Press. https://www.ncjrs.gov/pdffiles1/nij/grants/228091.pdf.Google ScholarGoogle Scholar

Index Terms

  1. The state of fakery

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 61, Issue 3
        March 2018
        107 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/3190347
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 February 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Pre-selected
      • Article Metrics

        • Downloads (Last 12 months)51
        • Downloads (Last 6 weeks)17

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format