Tecnologías multimedia empleadas como medio para desinformar
Ensayo sobre las tecnologías multimedia que permiten generar desinformación y sobre algunas contra medidas contra el impacto que estas pueden generar en la seguridad nacional.
- Autores:
-
Casanova Cadavid, Nicolás
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad Militar Nueva Granada
- Repositorio:
- Repositorio UMNG
- Idioma:
- spa
- OAI Identifier:
- oai:repository.unimilitar.edu.co:10654/20494
- Acceso en línea:
- http://hdl.handle.net/10654/20494
- Palabra clave:
- MULTIMEDIA POR COMPUTADOR
DESINFORMACION
multimedia
disinformation
security
multimedia
desinformación
seguridad
- Rights
- License
- Derechos Reservados - Universidad Militar Nueva Granada, 2018
id |
UNIMILTAR2_64bd36a86211366b4ed36d8e408d0442 |
---|---|
oai_identifier_str |
oai:repository.unimilitar.edu.co:10654/20494 |
network_acronym_str |
UNIMILTAR2 |
network_name_str |
Repositorio UMNG |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Tecnologías multimedia empleadas como medio para desinformar |
dc.title.translated.spa.fl_str_mv |
Multimedia technologies used as a mean to disinform |
title |
Tecnologías multimedia empleadas como medio para desinformar |
spellingShingle |
Tecnologías multimedia empleadas como medio para desinformar MULTIMEDIA POR COMPUTADOR DESINFORMACION multimedia disinformation security multimedia desinformación seguridad |
title_short |
Tecnologías multimedia empleadas como medio para desinformar |
title_full |
Tecnologías multimedia empleadas como medio para desinformar |
title_fullStr |
Tecnologías multimedia empleadas como medio para desinformar |
title_full_unstemmed |
Tecnologías multimedia empleadas como medio para desinformar |
title_sort |
Tecnologías multimedia empleadas como medio para desinformar |
dc.creator.fl_str_mv |
Casanova Cadavid, Nicolás |
dc.contributor.advisor.spa.fl_str_mv |
Leon Reyes, Freddy |
dc.contributor.author.spa.fl_str_mv |
Casanova Cadavid, Nicolás |
dc.subject.lemb.spa.fl_str_mv |
MULTIMEDIA POR COMPUTADOR DESINFORMACION |
topic |
MULTIMEDIA POR COMPUTADOR DESINFORMACION multimedia disinformation security multimedia desinformación seguridad |
dc.subject.keywords.spa.fl_str_mv |
multimedia disinformation security |
dc.subject.proposal.spa.fl_str_mv |
multimedia desinformación seguridad |
description |
Ensayo sobre las tecnologías multimedia que permiten generar desinformación y sobre algunas contra medidas contra el impacto que estas pueden generar en la seguridad nacional. |
publishDate |
2018 |
dc.date.issued.none.fl_str_mv |
2018-09-20 |
dc.date.accessioned.none.fl_str_mv |
2019-02-25T16:41:12Z 2019-12-26T22:05:02Z |
dc.date.available.none.fl_str_mv |
2019-02-25T16:41:12Z 2019-12-26T22:05:02Z |
dc.type.spa.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.local.spa.fl_str_mv |
Trabajo de grado |
dc.type.dcmi-type-vocabulary.spa.fl_str_mv |
Text |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10654/20494 |
url |
http://hdl.handle.net/10654/20494 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.references.spa.fl_str_mv |
Vasu, Norman, et al. Fake News: National Security in the Post-Truth Era. RSIS, 2018. Merriam-webster.com. (n.d.). Definition of DISINFORMATION. [online] Available at: https://www.merriam-webster.com/dictionary/disinformation [Accessed 03 Sep. 2018]. Jia, Shan, et al. "Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics." IEEE Access 6 (2018): 25323-25335. Bayar, Belhassen, and Matthew C. Stamm. "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection." IEEE Transactions on Information Forensics and Security 13.11 (2018): 2691-2706. Thies, Justus, et al. "Face2face: Real-time face capture and reenactment of rgb videos." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016. Garrido, Pablo, et al. "Automatic face reenactment." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2014. Chesney, Robert, and Danielle Keats Citron. "Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security." (2018). Banks, A. (2018). What Are Deepfakes & Why the Future of Porn is Terrifying. [online] Highsnobiety. Available at: https://www.highsnobiety.com/p/what-are-deepfakes-ai-porn/ [Accessed 28 Aug. 2018]. DeepFakes Club. (2018). Home - DeepFakes Club. [online] Available at: https://www.deepfakes.club [Accessed 27 Aug. 2018]. Murphy, B. (2018). Reddit User Outperforms Disney with AI-Generated Princess Leia. [online] Gray Scott. Available at: https://www.grayscott.com/seriouswonder-//reddit-user-outperforms-dis ney-with-ai-generated-princess-leia [Accessed 4 Sep. 2018]. S. Wiegand, S.E. Middleton, "Veracity and Velocity of Social Media Content during Breaking News: Analysis of November 2015 Paris Shootings", Third Workshop on Social News on the Web Companion of the 25th International World Wide Web Conference (SNOW 16), 2016. Middleton, Stuart E., Symeon Papadopoulos, and Yiannis Kompatsiaris. "Social computing for verifying social media content in breaking news." IEEE Internet Computing 22.2 (2018): 83-89. |
dc.rights.spa.fl_str_mv |
Derechos Reservados - Universidad Militar Nueva Granada, 2018 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by-nc-nd/2.5/co/ |
dc.rights.creativecommons.spa.fl_str_mv |
Atribución-NoComercial-SinDerivadas |
rights_invalid_str_mv |
Derechos Reservados - Universidad Militar Nueva Granada, 2018 https://creativecommons.org/licenses/by-nc-nd/2.5/co/ Atribución-NoComercial-SinDerivadas http://purl.org/coar/access_right/c_abf2 |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.coverage.spatial.spa.fl_str_mv |
Calle 100 |
dc.publisher.department.spa.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.program.spa.fl_str_mv |
Ingeniería Multimedia |
dc.publisher.faculty.spa.fl_str_mv |
Ingeniería - Ingeniería en Multimedia |
dc.publisher.grantor.spa.fl_str_mv |
Universidad Militar Nueva Granada |
institution |
Universidad Militar Nueva Granada |
bitstream.url.fl_str_mv |
http://repository.unimilitar.edu.co/bitstream/10654/20494/1/CasanovaCadavidNicolas2018.pdf http://repository.unimilitar.edu.co/bitstream/10654/20494/2/license.txt http://repository.unimilitar.edu.co/bitstream/10654/20494/3/CasanovaCadavidNicolas2018.pdf.jpg |
bitstream.checksum.fl_str_mv |
e5fe46a57e00c98d9373bf4b428d8ec2 520e8f0b4e8d2d5c25366f2f78f584b0 928ebe3e78e435b889aa2a77d45a2207 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional UMNG |
repository.mail.fl_str_mv |
bibliodigital@unimilitar.edu.co |
_version_ |
1837098376706916352 |
spelling |
Leon Reyes, FreddyCasanova Cadavid, NicolásIngeniero MultimediaCalle 1002019-02-25T16:41:12Z2019-12-26T22:05:02Z2019-02-25T16:41:12Z2019-12-26T22:05:02Z2018-09-20http://hdl.handle.net/10654/20494Ensayo sobre las tecnologías multimedia que permiten generar desinformación y sobre algunas contra medidas contra el impacto que estas pueden generar en la seguridad nacional.Essay about multimedia technologies that allow generating misinformation and some measures against the impact that these can generate on national security.Pregradoapplication/pdfspaDerechos Reservados - Universidad Militar Nueva Granada, 2018https://creativecommons.org/licenses/by-nc-nd/2.5/co/Atribución-NoComercial-SinDerivadashttp://purl.org/coar/access_right/c_abf2Tecnologías multimedia empleadas como medio para desinformarMultimedia technologies used as a mean to disinforminfo:eu-repo/semantics/bachelorThesisTrabajo de gradoTexthttp://purl.org/coar/resource_type/c_7a1fMULTIMEDIA POR COMPUTADORDESINFORMACIONmultimediadisinformationsecuritymultimediadesinformaciónseguridadFacultad de IngenieríaIngeniería MultimediaIngeniería - Ingeniería en MultimediaUniversidad Militar Nueva GranadaVasu, Norman, et al. Fake News: National Security in the Post-Truth Era. RSIS, 2018.Merriam-webster.com. (n.d.). Definition of DISINFORMATION. [online] Available at: https://www.merriam-webster.com/dictionary/disinformation [Accessed 03 Sep. 2018].Jia, Shan, et al. "Coarse-to-Fine Copy-Move Forgery Detection for Video Forensics." IEEE Access 6 (2018): 25323-25335.Bayar, Belhassen, and Matthew C. Stamm. "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection." IEEE Transactions on Information Forensics and Security 13.11 (2018): 2691-2706.Thies, Justus, et al. "Face2face: Real-time face capture and reenactment of rgb videos." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016.Garrido, Pablo, et al. "Automatic face reenactment." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2014.Chesney, Robert, and Danielle Keats Citron. "Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security." (2018).Banks, A. (2018). What Are Deepfakes & Why the Future of Porn is Terrifying. [online] Highsnobiety. Available at: https://www.highsnobiety.com/p/what-are-deepfakes-ai-porn/ [Accessed 28 Aug. 2018].DeepFakes Club. (2018). Home - DeepFakes Club. [online] Available at: https://www.deepfakes.club [Accessed 27 Aug. 2018].Murphy, B. (2018). Reddit User Outperforms Disney with AI-Generated Princess Leia. [online] Gray Scott. Available at: https://www.grayscott.com/seriouswonder-//reddit-user-outperforms-dis ney-with-ai-generated-princess-leia [Accessed 4 Sep. 2018].S. Wiegand, S.E. Middleton, "Veracity and Velocity of Social Media Content during Breaking News: Analysis of November 2015 Paris Shootings", Third Workshop on Social News on the Web Companion of the 25th International World Wide Web Conference (SNOW 16), 2016.Middleton, Stuart E., Symeon Papadopoulos, and Yiannis Kompatsiaris. "Social computing for verifying social media content in breaking news." IEEE Internet Computing 22.2 (2018): 83-89.ORIGINALCasanovaCadavidNicolas2018.pdfEnsayoapplication/pdf2240231http://repository.unimilitar.edu.co/bitstream/10654/20494/1/CasanovaCadavidNicolas2018.pdfe5fe46a57e00c98d9373bf4b428d8ec2MD51LICENSElicense.txttext/plain2898http://repository.unimilitar.edu.co/bitstream/10654/20494/2/license.txt520e8f0b4e8d2d5c25366f2f78f584b0MD52THUMBNAILCasanovaCadavidNicolas2018.pdf.jpgIM Thumbnailimage/jpeg5745http://repository.unimilitar.edu.co/bitstream/10654/20494/3/CasanovaCadavidNicolas2018.pdf.jpg928ebe3e78e435b889aa2a77d45a2207MD5310654/20494oai:repository.unimilitar.edu.co:10654/204942020-06-30 12:53:20.614Repositorio Institucional UMNGbibliodigital@unimilitar.edu.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 |