CONCEPTUAL APPROACH TO DETECTING DEEPFAKE MODIFICATIONS OF BIOMETRIC IMAGES USING NEURAL NETWORKS

K. Mykytyn, K. Ruda
{"title":"CONCEPTUAL APPROACH TO DETECTING DEEPFAKE MODIFICATIONS OF BIOMETRIC IMAGES USING NEURAL NETWORKS","authors":"K. Mykytyn, K. Ruda","doi":"10.23939/csn2024.01.124","DOIUrl":null,"url":null,"abstract":"The National Cybersecurity Cluster of Ukraine is functionally oriented towards building systems to protect various platforms of information infrastructure including the creation of secure technologies for detecting deepfake modifications of biometric images based on neural networks in cyberspace. This space proposes a conceptual approach to detecting deepfake modifications which is deployed based on the functioning of a convolutional neural network and the classifier algorithm for biometric images structured as 'sensitivity-Yuden index-optimal threshold-specificity'. An analytical security structure for neural network information technologies is presented based on a multi-level model of 'resources-systems-processes-networks-management' according to the concept of 'object-threat-defense'. The core of the IT security structure is the integrity of the neural network system for detecting deepfake modifications of biometric face images as well as data analysis systems implementing the information process of 'video file segmentation into frames-feature detection processing - classifier image accuracy assessment'. A constructive algorithm for detecting deepfake modifications of biometric images has been developed: splitting the video file of biometric images into frames - recognition by the detector - reproduction of normalized facial images - processing by neural network tools - feature matrix computation - image classifier construction. Keywords: biometric image deepfake modifications neural network technology convolutional neural network classification decision support system conceptual approach analytical security structure.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer systems and network","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23939/csn2024.01.124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The National Cybersecurity Cluster of Ukraine is functionally oriented towards building systems to protect various platforms of information infrastructure including the creation of secure technologies for detecting deepfake modifications of biometric images based on neural networks in cyberspace. This space proposes a conceptual approach to detecting deepfake modifications which is deployed based on the functioning of a convolutional neural network and the classifier algorithm for biometric images structured as 'sensitivity-Yuden index-optimal threshold-specificity'. An analytical security structure for neural network information technologies is presented based on a multi-level model of 'resources-systems-processes-networks-management' according to the concept of 'object-threat-defense'. The core of the IT security structure is the integrity of the neural network system for detecting deepfake modifications of biometric face images as well as data analysis systems implementing the information process of 'video file segmentation into frames-feature detection processing - classifier image accuracy assessment'. A constructive algorithm for detecting deepfake modifications of biometric images has been developed: splitting the video file of biometric images into frames - recognition by the detector - reproduction of normalized facial images - processing by neural network tools - feature matrix computation - image classifier construction. Keywords: biometric image deepfake modifications neural network technology convolutional neural network classification decision support system conceptual approach analytical security structure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用神经网络检测生物识别图像深度伪造修改的概念方法
乌克兰国家网络安全集群的功能定位是建立保护各种信息基础设施平台的系统,包括创建基于网络空间神经网络的检测生物识别图像深度伪造修改的安全技术。该空间提出了一种检测深度伪造修改的概念方法,该方法的部署基于卷积神经网络的功能和生物识别图像的分类算法,其结构为 "灵敏度-Yuden 指数-最佳阈值-特异性"。根据 "对象-威胁-防御 "的概念,在 "资源-系统-流程-网络-管理 "多层次模型的基础上,提出了神经网络信息技术的分析性安全结构。信息技术安全结构的核心是用于检测生物特征人脸图像深度伪造修改的神经网络系统的完整性,以及实施 "视频文件分割成帧-特征检测处理-分类器图像准确性评估 "信息流程的数据分析系统。我们开发了一种用于检测生物识别图像深度伪造修改的建设性算法:将生物识别图像的视频文件分割成帧--检测器识别--再现归一化面部图像--神经网络工具处理--特征矩阵计算--图像分类器构建。关键词:生物识别图像深度伪造修改神经网络技术卷积神经网络分类决策支持系统概念方法分析安全结构。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
METHODS AND MEANS OF ENSURING STABILITY AND PROTECTION OF RADIO COMMUNICATIONS IN A COMPLEX ELECTROMAGNETIC ENVIRONMENT RESEARCH AND IMPROVEMENT OF COMPUTING ALGORITHMS FOR CALCULATING THE TRIGONOMETRICAL COEFFICIENTS OF THE HASHING ALGORITHM MD5 UTILIZATION OF VOICE EMBEDDINGS IN INTEGRATED SYSTEMS FOR SPEAKER DIARIZATION AND MALICIOUS ACTOR DETECTION IMPROVEMENT THE SECURITY OF THE ENTERPRISE’S NETWORK INFRASTRUCTURE IN CONDITIONS OF MODERN CHALLENGES AND LIMITED RESOURCES OVERVIEW OF THE CIS BENCHMARKS USAGE FOR FULFILLING THE REQUIREMENTS FROM INTERNATIONAL STANDARD ISO/IEC 27001:2022
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1