SlideShare a Scribd company logo
1 of 12
Download to read offline
DEEPFAKE
TECHNOLOGY
NAGARJUNA COLLEGE OF ENGINEERING AND TECHNOLOGY
An Autonomous College under VTU, Belagavi
PRESENTATION ON
INTRODUCTION
► Deepfakes are synthetic media in which a person in an existing
image or video is replaced by someone's else likeness.
► It is a term used to describe a type of artificial intelligence
technology that can be used to create realistic fake videos or
images.
► The term "deepfake" is a combination of "deep learning" and
"fake“.
HISTORY
Photo manipulation was developed in the 19th century and soon
applied to motion pictures. Technology steadily improved during the
20th century, and more quickly with the advent of digital video.
Deepfake technology has been developed by researchers at academic
institutions beginning in the 1990s, and later by amateurs in online
communities. More recently the methods have been adopted by
industry.
In recent time, Deepfake technology has been used to impersonate
notable personalities like former U.S. Presidents Barack Obama and
Donald Trump, India's Prime Minister Narendra Modi, etc.
HOW IT WORKS?
Deepfakes are created by training a machine learning model on
large amounts of data, such as photos or videos of a person's face
or voice. The model then learns to generate realistic media of the
person, even though the media may be entirely fabricated.
In the given fig we can observe the
accuracy of deepfake technology.
AIM & OBJECTIVES
The aim of deepfake technology is to create realistic digital content that
can be used for various purposes, including entertainment, education,
and etc., Objectives include:
• Entertainment-Deepfakes can be used to create realistic special effects
in movies, TV Shows, and video games.
• Education-Deepfakes can be used to create realistic simulations for
training purposes, such as medical procedures or military exercises.
• Social media content-Deepfakes can be used to create humorous or
satirical videos for social media platforms.
ADVANTAGES
1.Low-Cost Video Campaigns:
Marketers using deepfakes can save money on the budgets for their
video campaigns using because you don’t need an in-person actor.
Instead of using an in-person actor, a marketer can purchase a license
for an actor’s identity.
2. Professional training:
Deepfake technology can be used to create AI Avatars for used in
training videos . Startups like London-based Synthesia have been
getting more attention from the corporate world during the COVID
pandemic since lockdowns and health concerns have made video
shoots involving real people much more difficult to pull off.
3.Art:
You can bring back a decedent actor or actress. In many movies to make
a digital creation of an dead person it is used.
4.Financial Saving:
Others point out that generative technology could potentially
democratize a number of industries. By allowing the cheap creation of
everything from videos, to advertisement and games, generative
technology could allow individuals and companies to enter these fields
with less investment.
DISADVANTAGES
1.Sockpuppets:
Deepfake photographs can be used to create sock puppets , non-existent
persons, who are active both online and in traditional media. A deepfake
photograph appears to have been generated together with a legend for
an apparently non-existent person.
2. Politics/Scamming:
Deepfakes have been used to misrepresent well- known politicians in
videos to Scam people.
3.Blackmail:
Deepfakes can be used to generate blackmail materials that
falsely incriminate a victim. It is possible to repurpose commodity
cryptocurrency mining hardware with a small software program to
generate this blackmail content for any number of subjects in
huge quantities, driving up the supply of fake blackmail content
limitlessly and in highly scalable fashion.
4.Lack of authenticity:
Using deepfakes in marketing campaigns could make it seem like
you are not being authentic. People might not trust your brand if
you are using fake technology to mislead them.
Real time examples for usage of Deepfake technology
1.Captain America: Civil War (Robert Downey Jr)
2.Avengers: Endgame (Michael Douglas, John Slattery)
3.James (Punit Rajkumar)
4.Fast & Furious 7 (Paul Walker)
5.US President Campaigns (Mr. Barack Obama)
CONCLUSION
In conclusion, deepfakes have the potential to be used for good or bad,
and it is up to us to determine how we use this technology.
We must be aware of its potential benefits and drawbacks, and take
steps to regulate its use to ensure that it is used ethically and
responsibly.
At the same time, we must continue to invest in technology that can
detect deepfakes and prevent them from spreading false information or
causing harm.
THANK YOU

More Related Content

What's hot

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
DeepFake: Trick or Treat
DeepFake: Trick or TreatDeepFake: Trick or Treat
DeepFake: Trick or TreatSamama Khan
 
DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptxsandeshsb
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsCrystalHariga
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxswathiravishankar3
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...Edge AI and Vision Alliance
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningParvathi Sanil Nair
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
Machine Learning -- The Artificial Intelligence Revolution
Machine Learning -- The Artificial Intelligence RevolutionMachine Learning -- The Artificial Intelligence Revolution
Machine Learning -- The Artificial Intelligence RevolutionExtentia Information Technology
 
How do OpenAI GPT Models Work - Misconceptions and Tips for Developers
How do OpenAI GPT Models Work - Misconceptions and Tips for DevelopersHow do OpenAI GPT Models Work - Misconceptions and Tips for Developers
How do OpenAI GPT Models Work - Misconceptions and Tips for DevelopersIvo Andreev
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 

What's hot (20)

Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
DeepFake: Trick or Treat
DeepFake: Trick or TreatDeepFake: Trick or Treat
DeepFake: Trick or Treat
 
DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive Us
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
Machine Learning -- The Artificial Intelligence Revolution
Machine Learning -- The Artificial Intelligence RevolutionMachine Learning -- The Artificial Intelligence Revolution
Machine Learning -- The Artificial Intelligence Revolution
 
How do OpenAI GPT Models Work - Misconceptions and Tips for Developers
How do OpenAI GPT Models Work - Misconceptions and Tips for DevelopersHow do OpenAI GPT Models Work - Misconceptions and Tips for Developers
How do OpenAI GPT Models Work - Misconceptions and Tips for Developers
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 

Similar to Deepfake.pptx

Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptxspchinchole20
 
What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?janviverma11
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfIMRAN SIDDIQ
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsbluetroyvictorVinay
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdfAiblogtech
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docxjeremylockett77
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docxteresehearn
 
Contemporary Media Art 2023.pptx
Contemporary Media Art 2023.pptxContemporary Media Art 2023.pptx
Contemporary Media Art 2023.pptxRalphNavelino3
 
Deepfakes; the world of deception
Deepfakes; the world of deceptionDeepfakes; the world of deception
Deepfakes; the world of deceptionaditi agarwal
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Media Evaluation Questions
Media Evaluation QuestionsMedia Evaluation Questions
Media Evaluation QuestionsEllie18
 
The New (Improved) Journalist
The New (Improved) JournalistThe New (Improved) Journalist
The New (Improved) JournalistDonald Schwartz
 

Similar to Deepfake.pptx (20)

Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdf
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docx
 
1 www.mediaethicsinitiative.org How Deep Does the .docx
1  www.mediaethicsinitiative.org   How Deep Does the .docx1  www.mediaethicsinitiative.org   How Deep Does the .docx
1 www.mediaethicsinitiative.org How Deep Does the .docx
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Contemporary Media Art 2023.pptx
Contemporary Media Art 2023.pptxContemporary Media Art 2023.pptx
Contemporary Media Art 2023.pptx
 
Deepfakes; the world of deception
Deepfakes; the world of deceptionDeepfakes; the world of deception
Deepfakes; the world of deception
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
TOPIC4_DEEPFAKES.pptx
TOPIC4_DEEPFAKES.pptxTOPIC4_DEEPFAKES.pptx
TOPIC4_DEEPFAKES.pptx
 
Future Normal: Certified Media
Future Normal: Certified MediaFuture Normal: Certified Media
Future Normal: Certified Media
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Media Evaluation Questions
Media Evaluation QuestionsMedia Evaluation Questions
Media Evaluation Questions
 
Viral Advertising
Viral AdvertisingViral Advertising
Viral Advertising
 
The New (Improved) Journalist
The New (Improved) JournalistThe New (Improved) Journalist
The New (Improved) Journalist
 

Recently uploaded

multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...shreenathji26
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 

Recently uploaded (20)

multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 

Deepfake.pptx

  • 1. DEEPFAKE TECHNOLOGY NAGARJUNA COLLEGE OF ENGINEERING AND TECHNOLOGY An Autonomous College under VTU, Belagavi PRESENTATION ON
  • 2. INTRODUCTION ► Deepfakes are synthetic media in which a person in an existing image or video is replaced by someone's else likeness. ► It is a term used to describe a type of artificial intelligence technology that can be used to create realistic fake videos or images. ► The term "deepfake" is a combination of "deep learning" and "fake“.
  • 3. HISTORY Photo manipulation was developed in the 19th century and soon applied to motion pictures. Technology steadily improved during the 20th century, and more quickly with the advent of digital video. Deepfake technology has been developed by researchers at academic institutions beginning in the 1990s, and later by amateurs in online communities. More recently the methods have been adopted by industry. In recent time, Deepfake technology has been used to impersonate notable personalities like former U.S. Presidents Barack Obama and Donald Trump, India's Prime Minister Narendra Modi, etc.
  • 4. HOW IT WORKS? Deepfakes are created by training a machine learning model on large amounts of data, such as photos or videos of a person's face or voice. The model then learns to generate realistic media of the person, even though the media may be entirely fabricated. In the given fig we can observe the accuracy of deepfake technology.
  • 5. AIM & OBJECTIVES The aim of deepfake technology is to create realistic digital content that can be used for various purposes, including entertainment, education, and etc., Objectives include: • Entertainment-Deepfakes can be used to create realistic special effects in movies, TV Shows, and video games. • Education-Deepfakes can be used to create realistic simulations for training purposes, such as medical procedures or military exercises. • Social media content-Deepfakes can be used to create humorous or satirical videos for social media platforms.
  • 6. ADVANTAGES 1.Low-Cost Video Campaigns: Marketers using deepfakes can save money on the budgets for their video campaigns using because you don’t need an in-person actor. Instead of using an in-person actor, a marketer can purchase a license for an actor’s identity. 2. Professional training: Deepfake technology can be used to create AI Avatars for used in training videos . Startups like London-based Synthesia have been getting more attention from the corporate world during the COVID pandemic since lockdowns and health concerns have made video shoots involving real people much more difficult to pull off.
  • 7. 3.Art: You can bring back a decedent actor or actress. In many movies to make a digital creation of an dead person it is used. 4.Financial Saving: Others point out that generative technology could potentially democratize a number of industries. By allowing the cheap creation of everything from videos, to advertisement and games, generative technology could allow individuals and companies to enter these fields with less investment.
  • 8. DISADVANTAGES 1.Sockpuppets: Deepfake photographs can be used to create sock puppets , non-existent persons, who are active both online and in traditional media. A deepfake photograph appears to have been generated together with a legend for an apparently non-existent person. 2. Politics/Scamming: Deepfakes have been used to misrepresent well- known politicians in videos to Scam people.
  • 9. 3.Blackmail: Deepfakes can be used to generate blackmail materials that falsely incriminate a victim. It is possible to repurpose commodity cryptocurrency mining hardware with a small software program to generate this blackmail content for any number of subjects in huge quantities, driving up the supply of fake blackmail content limitlessly and in highly scalable fashion. 4.Lack of authenticity: Using deepfakes in marketing campaigns could make it seem like you are not being authentic. People might not trust your brand if you are using fake technology to mislead them.
  • 10. Real time examples for usage of Deepfake technology 1.Captain America: Civil War (Robert Downey Jr) 2.Avengers: Endgame (Michael Douglas, John Slattery) 3.James (Punit Rajkumar) 4.Fast & Furious 7 (Paul Walker) 5.US President Campaigns (Mr. Barack Obama)
  • 11. CONCLUSION In conclusion, deepfakes have the potential to be used for good or bad, and it is up to us to determine how we use this technology. We must be aware of its potential benefits and drawbacks, and take steps to regulate its use to ensure that it is used ethically and responsibly. At the same time, we must continue to invest in technology that can detect deepfakes and prevent them from spreading false information or causing harm.