[go: up one dir, main page]

Kosaraju, 2024 - Google Patents

From Vulnerability to Vault: Mitigating Risks for Confidential Documents in AR/VR

Kosaraju, 2024

View PDF
Document ID
7507384532245963873
Author
Kosaraju V
Publication year

External Links

Snippet

In an era marked by escalating cyber threats targeting financial institutions, government entities, critical infrastructure, and various industries, safeguarding sensitive information has become imperative. This thesis explores innovative strategies to bolster document security …
Continue reading at deepblue.lib.umich.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Hasan et al. Automatically detecting bystanders in photos to reduce privacy risks
Li et al. Face recognition under spoofing attacks: countermeasures and research directions
Chingovska et al. Face recognition systems under spoofing attacks
Cao et al. Understanding the security of deepfake detection
Alanazi et al. Exploring deepfake technology: creation, consequences and countermeasures
Tiwari et al. Emerging biometric modalities and integration challenges
Xu et al. Examining human perception of generative content replacement in image privacy protection
Kuznetsov et al. AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection
Arya et al. A study on deep fake face detection techniques
Zurita et al. Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions
Soares et al. On the Application of Synthetic Media to Penetration Testing
Kosaraju From Vulnerability to Vault: Mitigating Risks for Confidential Documents in AR/VR
McQuillan Is lip-reading the secret to security?
Zeng et al. Pri-EMO: A universal perturbation method for privacy preserving facial emotion recognition
Rajput et al. A Systematic review of deepfake detection using learning Techniques and Vision Transformer
He et al. Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives
Kotey et al. Preserving Privacy in Multimedia: Text-Aware Sensitive Information Masking for Visual Data
Minh-Ha Beyond Recognition: Privacy Protections in a Surveilled World
Chen et al. A Survey on Facial Image Privacy Preservation in Cloud-Based Services
Inuwa Real-Time Application of Deepfake for De-Identification: Privacy Preservation and Data Protection
Komulainen Software-based countermeasures to 2D facial spoofing attacks
Alshammari E-passport security systems and attack implications
Malik Biometric Authentication-Risks and advancements in biometric security systems
Merino et al. Unmasking the Threat: Detecting Cloaking Attacks in Facial Recognition
Dahiwal DEEP LEARNING-BASED ENHANCED CLOUD AUTHENTICATION USING COGNITIVE BIOMETRICS AND SECURE ENCRYPTION TECHNIQUES