SlideShare a Scribd company logo
1 of 8
DEEP FAKE
B y:
Riwaz silwal
Pawan bhattarai
Sampada shrestha
Slide 1 of 8
What are DeepFakes?
● The phenomenon gained its name from a user of the
platform Reddit, who went by the name “deepfakes”
(deep learning + fakes).
● This person shared the first deepfakes by placing
unknowing celebrities into adult video clips. This
triggered widespread interest in the Reddit
community and led to an explosion of fake content.
● The first targets of deepfakes were famous people,
including actors (e.g., Emma Watson and Scarlett
Johansson), singers (e.g., Katy Perry) and politicians
(e.g., President Obama)
Slide 2 of 8
How to deepfakes work?
● Deepfakes are commonly created using a specific deep network architecture
known as autoencoder.
● Autoencoders are trained to recognize key characteristics of an input image to
subsequently recreate it as their output. In this process, the network performs
heavy data compression.
● Autoencoders consist of three subparts:
● - an encoder (recognizing key features of an input face)
● - a latent space (representing the face as a compressed version)
● - a decoder (reconstructing the input image with all detail)
Slide 3 of 8
What is autoencoder and how is it used?
● An autoencoder is a type of neural network used for unsupervised learning. It
consists of an encoder and a decoder, and its primary purpose is to learn an
efficient representation (latent space) of the input data. The encoder compresses
the input data into a lower-dimensional space, and the decoder reconstructs the
input data from this compressed representation.
In the context of creating deepfakes, which involve generating realistic-looking
images or videos of one person's face onto another person's body, the use of two
separate autoencoders is not efficient. This is because each autoencoder, when
trained independently on different people, would learn unique features and
representations specific to the individuals it was trained on. These representations
are likely to be incompatible with each other, making it challenging to seamlessly
combine them for the purpose of generating deepfakes.
Slide 4 of 8
The trick
● Training Individual Autoencoders:
Train an autoencoder for each person separately. Each autoencoder
consists of an encoder and a decoder.
The encoder in each autoencoder is responsible for compressing the facial
features of the respective person into a latent space.
● Sharing Encoder Architecture:
Design the encoder part of both autoencoders to have a similar
architecture. This could involve using the same neural network structure
or ensuring that the dimensions of the latent space are compatible.
● Creating Latent Space Representation:
Use the encoder from the first person's autoencoder to encode an image
of that person's face. This results in a compressed latent space
representation.
● Generating Fake Image:
Take the latent space representation obtained from the first person's
encoder and input it into the decoder of the second person's autoencoder.
Slide 5 of 8
The trick
● The shared-latent space
assumption. The two
heterogeneous images of x 1 and
x 2 can be mapped into the same
latent representation z by a
coupling VAE for comparability,
while the latent representations
can be reconstructed into the
original images, respectively, for
completeness.
Slide 6 of 8
Popular example we all have seen
● Popular Indian
actress
Rashmika
Mandanna’s
deepfake that
went viral on
social media not
too long ago.
Slide 7 of 8
Takeaway
● Deepfakes can be used in positive and negative ways to manipulate content for
media, entertainment, marketing, and education.
● Deepfakes are not magic but are produced using techniques from Al that can
generate fake content that is highly believable.
Slide 8 of 8

More Related Content

Similar to Deep fake.pptx

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
Michael Scovetta
 

Similar to Deep fake.pptx (20)

Computer Quiz (August 2013)
Computer Quiz (August 2013)Computer Quiz (August 2013)
Computer Quiz (August 2013)
 
Building a Thought Controlled Drone
Building a Thought Controlled DroneBuilding a Thought Controlled Drone
Building a Thought Controlled Drone
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
TeQuiz - a Tech Quiz
TeQuiz - a Tech QuizTeQuiz - a Tech Quiz
TeQuiz - a Tech Quiz
 
Dynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open ChallengesDynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open Challenges
 
Introduction to ethereum_public
Introduction to ethereum_publicIntroduction to ethereum_public
Introduction to ethereum_public
 
Playing with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritzPlaying with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritz
 
Software Is Details
Software Is DetailsSoftware Is Details
Software Is Details
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
 
Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?
 
Kraken '16 It quiz final
Kraken '16 It quiz finalKraken '16 It quiz final
Kraken '16 It quiz final
 
Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
 
Android Developer Meetup
Android Developer MeetupAndroid Developer Meetup
Android Developer Meetup
 
Pacman game computer investigatory project
Pacman game computer investigatory projectPacman game computer investigatory project
Pacman game computer investigatory project
 
Robots in Human Environments
Robots in Human EnvironmentsRobots in Human Environments
Robots in Human Environments
 
Jackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.dJackpot! sbancare un atm con ploutus.d
Jackpot! sbancare un atm con ploutus.d
 

Recently uploaded

如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
jk0tkvfv
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
ju0dztxtn
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
dq9vz1isj
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
great91
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 

Recently uploaded (20)

如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 

Deep fake.pptx

  • 1. DEEP FAKE B y: Riwaz silwal Pawan bhattarai Sampada shrestha Slide 1 of 8
  • 2. What are DeepFakes? ● The phenomenon gained its name from a user of the platform Reddit, who went by the name “deepfakes” (deep learning + fakes). ● This person shared the first deepfakes by placing unknowing celebrities into adult video clips. This triggered widespread interest in the Reddit community and led to an explosion of fake content. ● The first targets of deepfakes were famous people, including actors (e.g., Emma Watson and Scarlett Johansson), singers (e.g., Katy Perry) and politicians (e.g., President Obama) Slide 2 of 8
  • 3. How to deepfakes work? ● Deepfakes are commonly created using a specific deep network architecture known as autoencoder. ● Autoencoders are trained to recognize key characteristics of an input image to subsequently recreate it as their output. In this process, the network performs heavy data compression. ● Autoencoders consist of three subparts: ● - an encoder (recognizing key features of an input face) ● - a latent space (representing the face as a compressed version) ● - a decoder (reconstructing the input image with all detail) Slide 3 of 8
  • 4. What is autoencoder and how is it used? ● An autoencoder is a type of neural network used for unsupervised learning. It consists of an encoder and a decoder, and its primary purpose is to learn an efficient representation (latent space) of the input data. The encoder compresses the input data into a lower-dimensional space, and the decoder reconstructs the input data from this compressed representation. In the context of creating deepfakes, which involve generating realistic-looking images or videos of one person's face onto another person's body, the use of two separate autoencoders is not efficient. This is because each autoencoder, when trained independently on different people, would learn unique features and representations specific to the individuals it was trained on. These representations are likely to be incompatible with each other, making it challenging to seamlessly combine them for the purpose of generating deepfakes. Slide 4 of 8
  • 5. The trick ● Training Individual Autoencoders: Train an autoencoder for each person separately. Each autoencoder consists of an encoder and a decoder. The encoder in each autoencoder is responsible for compressing the facial features of the respective person into a latent space. ● Sharing Encoder Architecture: Design the encoder part of both autoencoders to have a similar architecture. This could involve using the same neural network structure or ensuring that the dimensions of the latent space are compatible. ● Creating Latent Space Representation: Use the encoder from the first person's autoencoder to encode an image of that person's face. This results in a compressed latent space representation. ● Generating Fake Image: Take the latent space representation obtained from the first person's encoder and input it into the decoder of the second person's autoencoder. Slide 5 of 8
  • 6. The trick ● The shared-latent space assumption. The two heterogeneous images of x 1 and x 2 can be mapped into the same latent representation z by a coupling VAE for comparability, while the latent representations can be reconstructed into the original images, respectively, for completeness. Slide 6 of 8
  • 7. Popular example we all have seen ● Popular Indian actress Rashmika Mandanna’s deepfake that went viral on social media not too long ago. Slide 7 of 8
  • 8. Takeaway ● Deepfakes can be used in positive and negative ways to manipulate content for media, entertainment, marketing, and education. ● Deepfakes are not magic but are produced using techniques from Al that can generate fake content that is highly believable. Slide 8 of 8