{"id":"https://openalex.org/W4313451502","doi":"https://doi.org/10.1109/iccr56254.2022.9995978","title":"The Threat of Deep Fake Technology to Trusted Identity Management","display_name":"The Threat of Deep Fake Technology to Trusted Identity Management","publication_year":2022,"publication_date":"2022-10-06","ids":{"openalex":"https://openalex.org/W4313451502","doi":"https://doi.org/10.1109/iccr56254.2022.9995978"},"language":"en","primary_location":{"id":"doi:10.1109/iccr56254.2022.9995978","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9995978","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101493398","display_name":"Atif Ali","orcid":"https://orcid.org/0000-0003-3055-6029"},"institutions":[{"id":"https://openalex.org/I173029219","display_name":"Multimedia University","ror":"https://ror.org/04zrbnc33","country_code":"MY","type":"education","lineage":["https://openalex.org/I173029219"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Atif Ali","raw_affiliation_strings":["Research Management Centre (RMC), Multimedia University,Cyberjaye,Malaysia,63100"],"affiliations":[{"raw_affiliation_string":"Research Management Centre (RMC), Multimedia University,Cyberjaye,Malaysia,63100","institution_ids":["https://openalex.org/I173029219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061383782","display_name":"Yasir Khan Jadoon","orcid":null},"institutions":[{"id":"https://openalex.org/I29698356","display_name":"HITEC University","ror":"https://ror.org/013d87239","country_code":"PK","type":"education","lineage":["https://openalex.org/I29698356"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Yasir Khan Jadoon","raw_affiliation_strings":["HITEC University,Taxila,Pakistan","HITEC University, Taxila, Pakistan"],"affiliations":[{"raw_affiliation_string":"HITEC University,Taxila,Pakistan","institution_ids":["https://openalex.org/I29698356"]},{"raw_affiliation_string":"HITEC University, Taxila, Pakistan","institution_ids":["https://openalex.org/I29698356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004222125","display_name":"Zulqarnain Farid","orcid":null},"institutions":[{"id":"https://openalex.org/I193670377","display_name":"University of Karachi","ror":"https://ror.org/05bbbc791","country_code":"PK","type":"education","lineage":["https://openalex.org/I193670377"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zulqarnain Farid","raw_affiliation_strings":["University of Karachi,Dept of Criminology,Pakistan","Dept of Criminology, University of Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"University of Karachi,Dept of Criminology,Pakistan","institution_ids":["https://openalex.org/I193670377"]},{"raw_affiliation_string":"Dept of Criminology, University of Karachi, Pakistan","institution_ids":["https://openalex.org/I193670377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056873670","display_name":"Munir Ahmad","orcid":"https://orcid.org/0000-0002-5240-0984"},"institutions":[{"id":"https://openalex.org/I43729321","display_name":"National College of Business Administration and Economics","ror":"https://ror.org/02my4wj17","country_code":"PK","type":"education","lineage":["https://openalex.org/I43729321"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Munir Ahmad","raw_affiliation_strings":["National College of business Administration and Economics,Lahore,Pakistan","National College of business Administration and Economics, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"National College of business Administration and Economics,Lahore,Pakistan","institution_ids":["https://openalex.org/I43729321"]},{"raw_affiliation_string":"National College of business Administration and Economics, Lahore, Pakistan","institution_ids":["https://openalex.org/I43729321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086524198","display_name":"Naseem Abidi","orcid":null},"institutions":[{"id":"https://openalex.org/I2799888298","display_name":"Skyline University College","ror":"https://ror.org/05r7nbf33","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799888298"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Naseem Abidi","raw_affiliation_strings":["School of business, Skyline University College, University City Sharjah,Sharjah,UAE,1797"],"affiliations":[{"raw_affiliation_string":"School of business, Skyline University College, University City Sharjah,Sharjah,UAE,1797","institution_ids":["https://openalex.org/I2799888298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084440632","display_name":"Haitham M. Alzoubi","orcid":"https://orcid.org/0000-0003-3178-4007"},"institutions":[{"id":"https://openalex.org/I2799888298","display_name":"Skyline University College","ror":"https://ror.org/05r7nbf33","country_code":"AE","type":"education","lineage":["https://openalex.org/I2799888298"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Haitham M. Alzoubi","raw_affiliation_strings":["School of business, Skyline University College, University City Sharjah,Sharjah,UAE,1797"],"affiliations":[{"raw_affiliation_string":"School of business, Skyline University College, University City Sharjah,Sharjah,UAE,1797","institution_ids":["https://openalex.org/I2799888298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013225206","display_name":"Ali A. Alzoubi","orcid":"https://orcid.org/0000-0002-8336-9588"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ali A. Alzoubi","raw_affiliation_strings":["Directorate of General Security,Jordan","Directorate of General Security, Jordan"],"affiliations":[{"raw_affiliation_string":"Directorate of General Security,Jordan","institution_ids":[]},{"raw_affiliation_string":"Directorate of General Security, Jordan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101493398"],"corresponding_institution_ids":["https://openalex.org/I173029219"],"apc_list":null,"apc_paid":null,"fwci":2.5791,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.91921428,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5713891983032227},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5423939228057861},{"id":"https://openalex.org/keywords/entertainment","display_name":"Entertainment","score":0.5222235918045044},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.49921107292175293},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4805179536342621},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.44585680961608887},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41453659534454346},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41123926639556885},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.346885621547699},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2815815210342407},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2587135434150696},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.16694912314414978},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1322811245918274}],"concepts":[{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5713891983032227},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5423939228057861},{"id":"https://openalex.org/C512170562","wikidata":"https://www.wikidata.org/wiki/Q173799","display_name":"Entertainment","level":2,"score":0.5222235918045044},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.49921107292175293},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4805179536342621},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.44585680961608887},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41453659534454346},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41123926639556885},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.346885621547699},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2815815210342407},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2587135434150696},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.16694912314414978},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1322811245918274},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iccr56254.2022.9995978","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9995978","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},{"id":"pmh:oai:shdl.mmu.edu.my:11243","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196753","display_name":"Siti Hasmah Digital Library-MMU Institutiona Repository (Multimedia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173029219","host_organization_name":"Multimedia University","host_organization_lineage":["https://openalex.org/I173029219"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2904415173","https://openalex.org/W2927107250","https://openalex.org/W2963597855","https://openalex.org/W2997433616","https://openalex.org/W3004507643","https://openalex.org/W3018433599","https://openalex.org/W3028563849","https://openalex.org/W3160808753","https://openalex.org/W3162020795","https://openalex.org/W3179400800","https://openalex.org/W3183869905","https://openalex.org/W4200224789","https://openalex.org/W4200616942","https://openalex.org/W4205483691","https://openalex.org/W4205555939","https://openalex.org/W4205850410","https://openalex.org/W4205867314","https://openalex.org/W4206117987","https://openalex.org/W4210307365","https://openalex.org/W4211119275","https://openalex.org/W4212939825","https://openalex.org/W4223992687","https://openalex.org/W4224920825","https://openalex.org/W4224921329","https://openalex.org/W4281674651","https://openalex.org/W4285130814","https://openalex.org/W4285259873","https://openalex.org/W4289830854","https://openalex.org/W6765712431","https://openalex.org/W6773761492"],"related_works":["https://openalex.org/W2011339062","https://openalex.org/W1807703735","https://openalex.org/W2751243624","https://openalex.org/W4238930562","https://openalex.org/W3123950995","https://openalex.org/W1574707610","https://openalex.org/W4313185140","https://openalex.org/W1607060163","https://openalex.org/W4254194148","https://openalex.org/W2124644269"],"abstract_inverted_index":{"With":[0,49],"the":[1,23,50,57,79,89,112],"rapid":[2],"development":[3],"of":[4,53,82,93],"artificial":[5],"intelligence":[6],"technology,":[7,56],"deepfake":[8],"technology":[9,34,96],"based":[10],"on":[11],"deep":[12,54,83,94],"learning":[13],"is":[14,71],"receiving":[15],"more":[16,18,68],"and":[17,29,60,91,97,114,117],"attention":[19],"from":[20],"society":[21],"or":[22],"industry.":[24],"While":[25],"enriching":[26],"people's":[27],"cultural":[28],"entertainment":[30],"life,":[31],"in-depth":[32],"fakes":[33,55,95],"has":[35],"also":[36],"caused":[37,63],"many":[38],"social":[39],"problems,":[40],"especially":[41],"potential":[42],"risks":[43],"to":[44,73,77,104],"managing":[45],"network":[46,105],"credible":[47],"identities.":[48],"continuous":[51],"advancement":[52],"security":[58],"threats":[59],"trust":[61],"crisis":[62],"by":[64],"it":[65,110],"will":[66],"become":[67],"serious.":[69],"It":[70],"urgent":[72],"take":[74],"adequate":[75],"measures":[76],"curb":[78],"abuse":[80],"risk":[81],"fakes.":[84],"The":[85],"article":[86],"first":[87],"introduces":[88],"principles":[90],"characteristics":[92],"then":[98],"deeply":[99],"analyzes":[100],"its":[101],"severe":[102],"challenges":[103],"trusted":[106],"identity":[107],"management.":[108],"Finally,":[109],"researches":[111],"supervision":[113],"technical":[115],"level":[116],"puts":[118],"forward":[119],"targeted":[120],"preventive":[121],"countermeasures.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
