{"title":"基于智能合约和SHA算法的假视频识别","authors":"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav","doi":"10.3233/apc210227","DOIUrl":null,"url":null,"abstract":"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identification of Fake Video Using Smart Contracts and SHA Algorithm\",\"authors\":\"SwapnaliTambe, Dr. Anil Pawar, Dr. S K Yadav\",\"doi\":\"10.3233/apc210227\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string\",\"PeriodicalId\":429440,\"journal\":{\"name\":\"Recent Trends in Intensive Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Recent Trends in Intensive Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/apc210227\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Trends in Intensive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/apc210227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification of Fake Video Using Smart Contracts and SHA Algorithm
Deepfake is as a matter of fact a medium where one individual is supplanted by another who appears as though him. The profound bogus demonstration has been continuing for quite a long while. Profound phony uses incredible strategies, for example, AI and man-made consciousness to create and control visual and sound substance with high potential for the gadget. Profound misrepresentation relies upon the sort of impartial association called and the programmed encoder. These are essential for an encoder, which lessens a picture to a lower dimensional ideal and an ideal introduction picture. I examined various answers on various advances via web-based media stages like twitter and face book. From these examinations we are roused to extend this objective. In our proposed framework, we centre around identifying profound phony recordings utilizing blockchains, keen agreements, and secure hashing calculations. We utilize a few calculations to relieve the issue, for example, the SHA string