SlideShare a Scribd company logo
1 of 15
11/03/21
Cramma: Crystal, Ram, Emma
Deepfake:
Do Our Eyes
Deceive Us?
AGENDA
AGENDA WHAT IS DEEPFAKE/EXAMPLES
FUTURE APPLICATIONS DETECTIONS
BEHIND THE SCENES
FUTURE CONCERNS
01
02
03
04
05
06
What is Deepfake?
● Any type of media where one
person’s face is replaced by a
computer-generated face
● The U.S. government has
grown increasingly concerned
about their potential to be used
to spread disinformation and
commit crimes
Example of Deepfake
HISTORY OF EXAMPLES
2019
Simple to make
deepfake algorithm
released to public
through research paper
2020
Fake political ads of
Putin and Kim Jong-Un
discussing state of US
democracy
2018
Reddit User found posting
nonconsensual fake
sexual videos of
individuals
Sports Ads created with
faces of sports icons
during pandemic to
advertise season
MIT researchers work to
create alternate historical
events, Time Magazine
recreates MLK march
(virtual reality experience)
Film on LBGTQ
individuals in Russia,
used deepfakes to hide
identities of individuals
“Believe it when I see it” now
“See it when I believe it”
BEHIND THE
SCENES
● Autoencoders:
○ Using neural networks to
extract face and encode into
set of features and mask
○ Using another neural
network to decode features,
upscale face, and apply face
to another image
○ Training can take weeks
without GPU
BEHIND THE
SCENES
● Generative Adversarial Networks (GAN):
○ Pit two neural networks against
each other
○ Generator create examples that
have the same statistics as
original
○ Discriminator detect deviations
from original data distribution
○ More time-consuming, high costs
FUTURE APPLICATIONS
Message Reach
Personalized voice
messaging at scale
Safety
Reconstructing crime
scenes
Entertainment
Digital influencers
Arts
Synthetic voice of same
actor in different
languages
Innovation
Trying out products
digitally
Education
Reenacting historical
figures
DETECTION
● Specialized tools are used in determination
● Detections of these videos began 3 years ago - easy tell sign years ago was
that people don’t blink but quality and graphics have gotten better in recent
years
● Detector tool is in early stages of development - need to prevent hacking of
tools before mass release
CATEGORIES OF DETECTION
● Categories: looking at the behavior of people in the videos and differences
that all deepfakes have compared to real videos
● Behavior - learn from patterns, from hand gestures to usual pauses in
speech
● Differences -extract the essential data from the faces in individual frames of
a video and then track them through sets of concurrent frames -
inconsistencies from one frame to another
FUTURE CONCERNS
● Deepfakes make it possible to put an actor in a movie that they were never in - but also
used for bad such as making explicit videos
● Deepfakes can also be used to create videos of political leaders saying things they
never said
● People don’t know what is real and what is a Deepfake - leads to doubt - need a tool to
ensure fake videos don’t fool the public and how real videos can be labeled as authentic
● Big companies like Facebook and Microsoft investing in technology to understand and
detect Deepfakes
● Need to figure out how best to warn people about deepfakes when they are detected
● Research has shown that people remember the lie, but not the fact that it was a lie
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics & images by Freepik.
THANKS!
Do you have any questions?
Sources
https://youtu.be/T76bK2t2r8g
https://www.infoworld.com/article/3574949/what-are-deepfakes-ai-that-deceives.html
https://www.youtube.com/watch?v=p7-B8S734T4&ab_channel=VICE
https://www.knowledgenile.com/blogs/applications-of-deepfake-technology-positives-and-dangers/
https://www.technologyreview.com/2020/12/24/1015380/best-ai-deepfakes-of-2020/
https://www.youtube.com/watch?v=jTAgvf8fHOs
https://theconversation.com/in-a-battle-of-ai-versus-ai-researchers-are-preparing-for-the-coming-
wave-of-deepfake-propaganda-146536
https://www.cbsnews.com/news/deepfake-artificial-intelligence-60-minutes-2021-10-10/
https://thispersondoesnotexist.com/

More Related Content

What's hot

DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptxspchinchole20
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxNilayDeshmukh3
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIFashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIShalin Hai-Jew
 

What's hot (20)

DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deep fake
Deep fakeDeep fake
Deep fake
 
Deep fakes and beyond
Deep fakes and beyondDeep fakes and beyond
Deep fakes and beyond
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AIFashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
Fashioning Text (and Image) Prompts for the CrAIyon Art-Making Generative AI
 

Similar to Deepfake - Do Our Eyes Deceive Us

The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docxjeremylockett77
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docxteresehearn
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa
 
Augieray16x9 shortened-130527112906-phpapp02
Augieray16x9 shortened-130527112906-phpapp02Augieray16x9 shortened-130527112906-phpapp02
Augieray16x9 shortened-130527112906-phpapp02Kuhoo Edson
 
Debunking Digital Disinformation
Debunking Digital DisinformationDebunking Digital Disinformation
Debunking Digital Disinformationmmfd
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014protected7000
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsHeather Vescent
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
The impact of deepfakes on the right to identity: A South African perspective
The impact of deepfakes on the right to identity: A South African perspectiveThe impact of deepfakes on the right to identity: A South African perspective
The impact of deepfakes on the right to identity: A South African perspectiveN Mashinini
 
Top Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningTop Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningintroNetworks.com
 
CHI2022 Presenation .pptx
CHI2022 Presenation .pptxCHI2022 Presenation .pptx
CHI2022 Presenation .pptxdilrukshigamage
 
Deepfakes; the world of deception
Deepfakes; the world of deceptionDeepfakes; the world of deception
Deepfakes; the world of deceptionaditi agarwal
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA Surender Singh
 
Dystopian AI. Is human-machine coexistence already here?
Dystopian AI.  Is human-machine coexistence already here?Dystopian AI.  Is human-machine coexistence already here?
Dystopian AI. Is human-machine coexistence already here?Alexandra Petruș
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 

Similar to Deepfake - Do Our Eyes Deceive Us (20)

The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docx
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docx
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
 
MANAGERIAL ECO. PPT.pptx
MANAGERIAL ECO. PPT.pptxMANAGERIAL ECO. PPT.pptx
MANAGERIAL ECO. PPT.pptx
 
Augieray16x9 shortened-130527112906-phpapp02
Augieray16x9 shortened-130527112906-phpapp02Augieray16x9 shortened-130527112906-phpapp02
Augieray16x9 shortened-130527112906-phpapp02
 
Debunking Digital Disinformation
Debunking Digital DisinformationDebunking Digital Disinformation
Debunking Digital Disinformation
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
sih_ppt2.pptx
sih_ppt2.pptxsih_ppt2.pptx
sih_ppt2.pptx
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
The impact of deepfakes on the right to identity: A South African perspective
The impact of deepfakes on the right to identity: A South African perspectiveThe impact of deepfakes on the right to identity: A South African perspective
The impact of deepfakes on the right to identity: A South African perspective
 
Top Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningTop Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social Learning
 
CHI2022 Presenation .pptx
CHI2022 Presenation .pptxCHI2022 Presenation .pptx
CHI2022 Presenation .pptx
 
Deepfakes; the world of deception
Deepfakes; the world of deceptionDeepfakes; the world of deception
Deepfakes; the world of deception
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
 
Dystopian AI. Is human-machine coexistence already here?
Dystopian AI.  Is human-machine coexistence already here?Dystopian AI.  Is human-machine coexistence already here?
Dystopian AI. Is human-machine coexistence already here?
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
Plug & Play News
Plug & Play News Plug & Play News
Plug & Play News
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Deepfake - Do Our Eyes Deceive Us

Editor's Notes

  1. After 2:02 stop
  2. Dr.Hany Farid, Computer Science Professor at UC Berkeley
  3. Deepfake technology involves two main methods that uses neural networks. The first method is called Autoencoders, which involves a pair of 3 main parts. Encoder compresses image and turns it to a vector Classification to a Convolutional Neural Network(CNN) Bottleneck (inter layer): connected/dense layer Abstract and Compressed representation of data -- make the deepfake Decoder takes vector and returns it into original image As these image datasets will be large, training can take weeks without a GPU
  4. This method is used more to generate synthetic faces. Embedder is the sample based on real images Generator is a convolutional neural network Goal is to artificially manufacture outputs that could easily be mistaken for real data Discriminator is a deconvolutional neural network Goal is to identify which outputs it receives have been artificially created Compares images from generator with embedder Once the discriminator can no longer tell the difference, the synthetic face has been generated
  5. Message Reach Personalized marketing using synthetic voice to advertise at scale Safety Reconstructing crime scenes Entertainment Korean virtual Youtuber, RUI; and various Korean & Japanese Instagram digital models (@imma.gram; @shudu.gram) Synthetically generated Arts No longer the need for dubbers, but we can synthesize an actor’s voice to speak in a different language Innovation Online fitting room where customers become the models for certain outfits Education Using voice and video to reenact historical figures to create a more immersive experience for students Emma will discuss about how to detect Deepfake content