{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:39:42Z","timestamp":1740101982313,"version":"3.37.3"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,22]]},"DOI":"10.1109\/uv56588.2022.10185510","type":"proceedings-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T17:58:12Z","timestamp":1690394292000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Targeted Data Extraction and Deepfake Detection with Blockchain Technology"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Taeb","sequence":"first","affiliation":[{"name":"Electrical &#x0026; Computer Engineering FAMU-FSU College of Engineering,Tallahassee,USA"}]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Florida A&#x0026;M University,Computer Information &#x0026; Sciences,Tallahassee,USA"}]},{"given":"Shonda","family":"Bernadin","sequence":"additional","affiliation":[{"name":"Electrical &#x0026; Computer Engineering FAMU-FSU College of Engineering,Tallahassee,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1365712718807226"},{"key":"ref12","article-title":"Digital forensics, deepfakes, and the legal process","author":"venema","year":"2020","journal-title":"The SciTech Lawyer"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref31","first-page":"1786","article-title":"Detecting deepfake videos using digital watermarking","author":"qureshi","year":"2021","journal-title":"2021 IEEE Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"},{"key":"ref30","first-page":"771","article-title":"Establishing environment setup for preventing deepfakes using blockchain technology","author":"chauhan","year":"2020","journal-title":"Mukt Shabd J"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870644"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC51422.2021.9532725"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3491418.3535127"},{"key":"ref1","article-title":"Current challenges and future research areas for digital forensic investigation","author":"lillis","year":"2016","journal-title":"arXiv preprint arXiv 1604 03850"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/iSES50453.2020.00031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2010007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"ref18","article-title":"Forensic acquisition of cloud drives","author":"roussev","year":"2016","journal-title":"arXiv preprint arXiv 1603 06782"},{"key":"ref24","first-page":"1044","article-title":"Blockchain technology for combating deepfake and protect video\/image integrity","volume":"24","author":"rashid","year":"2021","journal-title":"Journal of Korea Multimedia Society"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905689"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194319"},{"key":"ref25","first-page":"138","article-title":"Detection of parvovirus 4 in iranian patients with hbv, hcv, hiv mono-infection, hiv and hcv co-infection","author":"rastegarpouyani","year":"2018","journal-title":"Gastroenterology and Hepatology from Bed to Bench"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2927431"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.14979"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.3390\/app12031752","article-title":"Trademark image similarity detection using convolutional neural network","volume":"12","author":"alshowaish","year":"2022","journal-title":"Applied Sciences"},{"key":"ref27","first-page":"663","article-title":"A survey on video-based fake news detection techniques","author":"agrawal","year":"2021","journal-title":"2021 IEEE 8th International Conference on Computing for Sustainable Global Development (INDIACom)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA51532.2021.9544854"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367545"},{"key":"ref7","first-page":"i","article-title":"Digital forensic evidence in the courtroom: understanding content and quality","volume":"12","author":"garrie","year":"2014","journal-title":"Nw J Tech & Intell Prop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806675"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"12063","DOI":"10.1088\/1757-899X\/722\/1\/012063","article-title":"Clustering storage method for digital evidence storage using software defined storage","volume":"722","author":"faruq","year":"2020","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.07.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1115\/1.4053497"}],"event":{"name":"2022 6th International Conference on Universal Village (UV)","start":{"date-parts":[[2022,10,22]]},"location":"Boston, MA, USA","end":{"date-parts":[[2022,10,25]]}},"container-title":["2022 6th International Conference on Universal Village (UV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10185200\/10185442\/10185510.pdf?arnumber=10185510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:34:28Z","timestamp":1692034468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10185510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,22]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/uv56588.2022.10185510","relation":{},"subject":[],"published":{"date-parts":[[2022,10,22]]}}}