Autors: Vladimirov, I. H., Nenova, M. V., Nikolova, D. V., Terneva, Z. A.
Title: Security and Privacy Protection Obstacles with 3D Reconstructed Models of People in Applications and the Metaverse: A Survey
Keywords: 3D Reconstructed Models, Security, Privacy Protection, Internet, Metaverse

Abstract: In this scientific research, a survey of different security and privacy protection issues and flaws in the context of the reconstruction of 3D models of real people is made. The intent of this analysis the threats that a realistic digital clone AKA avatar of a person can have in the wrong hands. This paper will also offer different approaches that can be used in overcoming this privacy problem.


  1. Gunn, A., 2020, Living in A Digital World: The Causes and the Consequences, A Medium Corp., <>, Дата на последен преглед (Last accessed on): 08.11.2022
  2. Prantosh, P., Aithal, P.S., 2018, Digital Society: Its Foundation and Towards an Interdisciplinary Field, Mangalore, India, 22 December 2018, <Online>,
  3. Montag, C. and Diefenbach, S., 2018, Towards Homo Digitalis: Important Research Issues for Psychology and the Neurosciences at the Dawn of the Internet of Things and the Digital Society, Sustainability, Volume 10(2), pp. p.415
  4. Grider, D., Maximo, M., 2021, The Metaverse: Web 3.0 Virtual Cloud Economies, Online, Grayscale Company Research
  5. Moy, C., Gadgil, A., 2022, Opportunities in the Metaverse: How Businesses Can Explore the Metaverse and Navigate the Hype Vs. Reality, Onyx by J. P. Morgan Company, <>, Дата на последен преглед (Last accessed on): 08.11.2022
  6. Sahmim, S., Gharsellaoui, H., 2017, Privacy and security in internetbased computing: Cloud computing, internet of things, cloud of things: A review, Marseille, France, 6-8 September 2017, <Procedia Computer Science open access journal>, Elsevier
  7. Abba Ari, A.A., Ngangmo, O.K., Titouna, C., Thiare, O., Kolyang, M.A., Gueroui, A.M., 2020, Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges, Applied Computing and Informatics Journal, Volume , pp.
  8. ISO/IEC 27001:2005, 2005, Specification for an Information Security Management System
  9. Kosinski, M., Stillwell, D. and Graepel, T., 2013, Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences, Volume 110(15), pp. pp. 5802–5805
  10. Di Pietro, R. and Cresci, S., 2021, Metaverse: Security and Privacy Issues, Atlanta, GA, USA, 13-15 December 2021, <USA>, IEEE
  11. Falchuk, B., Loeb, S. and Neff, R., 2018, The Social Metaverse: Battle for Privacy, IEEE Technology and Society Magazine, Volume 37(2), pp. pp. 52–61
  12. Snyder, P., Kanich, C., Doerfler, P., McCoy, D., 2017, Fifteen minutes of unwanted fame: Detecting and characterizing doxing, London, United Kingdom, 1-3 November 2017, <>, ACM
  13. Conti, M., Dragoni, N., Lesyk, V., 2016, A Survey of Man in the Middle Attacks, IEEE Communications Surveys and Tutorials, Volume 18(3), pp. pp. 2027-2051
  14. Vladimirov, I., Nikolova, D., Terneva, Z., 2020, Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the AES-128 Key, Nis, Serbia, 10-12 September 2020, <>, IEEE
  15. Nikolova, D., Vladimirov, I., Terneva, Z., 2020, Software Implementation of CRA and TRA to Recover the AES-128 Key using Side-Channel Signals with Python3, Nis, Serbia, 10-12 September 2020, <>, IEEE
  16. Alkhalil, Z., Hewage, C., Nawaf, L. and Khan, I., 2021, Phishing Attacks: A Recent Comprehensive Study and a New Anatomy, Frontiers in Computer Science, Volume 3(1), pp.
  17. Rodríguez, G.E., Torres, J.G., Flores, P. and Benavides, D.E., 2020, Cross-site scripting (XSS) attacks and mitigation: A survey, Computer Networks, Volume 166, pp. p. 106960
  18. Li, C., Lalani, F., 2022, How to address digital safety in the metaverse, the World Economic Forum, <>, Дата на последен преглед (Last accessed on): 08.11.2022
  19. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q., 2018, A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 2(1), pp. pp. 41-50
  20. Dutta, I.K., Ghosh, B., Carlson, A., Totaro, M., Bayoumi, M., 2020, Generative Adversarial Networks in Security: A Survey, Virtual, 28-31 October 2020, <>, IEEE
  21. Yang, J., Li, T., Liang, G., He, W., Zhao, Y., 2019, A simple recurrent unit model based intrusion detection system with DCGAN, IEEE Access, Volume 7, pp. pp. 83286-83296
  22. Bojjagani, S., Brabin, D.R.D., Rao, P.V.V., 2020, PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification, Procedia Computer Science, Volume 171, pp. pp. 1110-1119
  23. Dalton, M., Kozyrakis, C., Zeldovich, N., 2009, Nemesis: Preventing authentication & access control vulnerabilities in web applications, Monreal, Canada, 10-14 August 2009, <>, ACM
  24. Goswami, U., Wang, K., Nguyen, G., Lagesse, B., 2020, Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption, Austin, TX, USA, 23-27 August 2020, <>, IEEE
  25. Lagesse, B., Nguyen, G., Goswami, U., Wu, K., 2021, You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption, Kassel, Germany, 22-26 March 2021, <>, IEEE
  26. Li, Q., Zheng, Z., Wu, F., Chen, G., 2020, Generative Adversarial Networks-based Privacy-Preserving 3D Reconstruction, Virtual, 15-17 June 2020, <>, IEEE
  27. Chen, L.C., Papandreou, G., Schroff, F., Adam, H., 2017, Rethinking atrous convolution for semantic image segmentation, Honolulu, HI, USA, 21-26 July 2017, <>, IEEE
  28. Yang, K., Yau, J., Fei-Fei, L., Deng, J., Russakovsky, O., 2021, A Study of Face Obfuscation in Imagenet, Stanford Vision Lab, Stanford University, Princeton University, <>, Дата на последен преглед (Last accessed on): 08.11.2022
  29. Vladimirov, I., Nikolova, D., Terneva, Z., 2021, Overview of Methods for 3D Reconstruction of Human Models with Applications in Fashion E-Commerce, Sozopol, Bulgaria, 16-18 June 2021, <>, IEEE


ICEST Conference, issue 57, 2022, Macedonia, IEEE, DOI 10.1109/ICEST55168.2022.9828791

Copyright IEEE

Full text of the publication

Вид: пленарен доклад в международен форум, публикация в реферирано издание, индексирана в Scopus