Kosaraju, 2024 - Google Patents
From Vulnerability to Vault: Mitigating Risks for Confidential Documents in AR/VRKosaraju, 2024
View PDF- Document ID
- 7507384532245963873
- Author
- Kosaraju V
- Publication year
External Links
Snippet
In an era marked by escalating cyber threats targeting financial institutions, government entities, critical infrastructure, and various industries, safeguarding sensitive information has become imperative. This thesis explores innovative strategies to bolster document security …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hasan et al. | Automatically detecting bystanders in photos to reduce privacy risks | |
Li et al. | Face recognition under spoofing attacks: countermeasures and research directions | |
Chingovska et al. | Face recognition systems under spoofing attacks | |
Cao et al. | Understanding the security of deepfake detection | |
Alanazi et al. | Exploring deepfake technology: creation, consequences and countermeasures | |
Tiwari et al. | Emerging biometric modalities and integration challenges | |
Xu et al. | Examining human perception of generative content replacement in image privacy protection | |
Kuznetsov et al. | AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection | |
Arya et al. | A study on deep fake face detection techniques | |
Zurita et al. | Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions | |
Soares et al. | On the Application of Synthetic Media to Penetration Testing | |
Kosaraju | From Vulnerability to Vault: Mitigating Risks for Confidential Documents in AR/VR | |
McQuillan | Is lip-reading the secret to security? | |
Zeng et al. | Pri-EMO: A universal perturbation method for privacy preserving facial emotion recognition | |
Rajput et al. | A Systematic review of deepfake detection using learning Techniques and Vision Transformer | |
He et al. | Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives | |
Kotey et al. | Preserving Privacy in Multimedia: Text-Aware Sensitive Information Masking for Visual Data | |
Minh-Ha | Beyond Recognition: Privacy Protections in a Surveilled World | |
Chen et al. | A Survey on Facial Image Privacy Preservation in Cloud-Based Services | |
Inuwa | Real-Time Application of Deepfake for De-Identification: Privacy Preservation and Data Protection | |
Komulainen | Software-based countermeasures to 2D facial spoofing attacks | |
Alshammari | E-passport security systems and attack implications | |
Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
Merino et al. | Unmasking the Threat: Detecting Cloaking Attacks in Facial Recognition | |
Dahiwal | DEEP LEARNING-BASED ENHANCED CLOUD AUTHENTICATION USING COGNITIVE BIOMETRICS AND SECURE ENCRYPTION TECHNIQUES |