SlideShare a Scribd company logo
1 of 8
DEEPFAKES
A NEWCYBER THREAT
UNDERSTANDING “DEEPFAKES”
• Uses Machine learning an aspect of Artificial Intelligence .
• It manipulates Video or Audio clips to fabricate reality, to prompt
negative response from the target audience.
• Fraudsters too are using Deepfakes to commit their frauds.
• The user name Deepfakes come from the notorious website Reddit in
2017 though now impersonations are forbidden on this site.
• As of 2019 it is estimated 14,600Deepfake Videos existed and posted
online.
• Deepfake tools are many.
• Fraudsters might have used the Deepfake technology .
• Deepfake technology is going to be the future threat by fraudsters as
it is easy to use many tools that are available to do voice cloning etc.
• Fraudsters cheat people through deepfake apps. By impersonating
voice, images etc of public figures and celebrities.
• Deepfakes are also used to manipulate Biometrics-like-Face
recognition, Voice recognition and Finger prints.
• It is at times very difficult too to prove in courts of law a Deepfake
instances besides involves costs too.
• Thus deepfakes are used by fraudsters for stock profiteering,
extortion and virtual kidnapping etc.
Possible Remedies:
1.Training
2.Awareness of deepfake usage and consequences
3. Good procedures in place
4. Good controls.

More Related Content

What's hot

DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptxsandeshsb
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsCrystalHariga
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Ian McCarthy
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...Edge AI and Vision Alliance
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...KIMMINHA3
 
Animation Summary
Animation SummaryAnimation Summary
Animation SummaryH Pemberton
 

What's hot (20)

DeepFake_Seminar.pptx
DeepFake_Seminar.pptxDeepFake_Seminar.pptx
DeepFake_Seminar.pptx
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive Us
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
3 d password
3 d password3 d password
3 d password
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
Animation Summary
Animation SummaryAnimation Summary
Animation Summary
 

Similar to Deepfakes

What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?janviverma11
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptxvb334531
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsbluetroyvictorVinay
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
Phishing
PhishingPhishing
Phishingdefquon
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingth3prodevelopper
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfIMRAN SIDDIQ
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-bBbAOC
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdfAiblogtech
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 

Similar to Deepfakes (20)

What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
Cyber crime ppt college.pptx
Cyber crime ppt college.pptxCyber crime ppt college.pptx
Cyber crime ppt college.pptx
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishing
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdf
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from CA.Kolluru Narayanarao (16)

Alumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptxAlumni Meetinfg2022-August.pptx
Alumni Meetinfg2022-August.pptx
 
Do you know..006
Do you know..006Do you know..006
Do you know..006
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Do u know 001-ROMANCE FRAUDS
Do u know 001-ROMANCE FRAUDSDo u know 001-ROMANCE FRAUDS
Do u know 001-ROMANCE FRAUDS
 
Do you know..series 05
Do you know..series 05Do you know..series 05
Do you know..series 05
 
Do u know 002
Do u know 002Do u know 002
Do u know 002
 
Ponzi schemes-lesson vii
Ponzi  schemes-lesson viiPonzi  schemes-lesson vii
Ponzi schemes-lesson vii
 
Ponzi schemes
Ponzi  schemes Ponzi  schemes
Ponzi schemes
 
Whistle Blowers
Whistle BlowersWhistle Blowers
Whistle Blowers
 
Lesson 08-red flags
Lesson 08-red flagsLesson 08-red flags
Lesson 08-red flags
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lessons on fraud awareness-PART-II
Lessons on fraud awareness-PART-IILessons on fraud awareness-PART-II
Lessons on fraud awareness-PART-II
 
Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1Part 1- FRAUD AWARENESS -LESSONS-PART-1
Part 1- FRAUD AWARENESS -LESSONS-PART-1
 
Fraudsdetection
FraudsdetectionFraudsdetection
Fraudsdetection
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Deepfakes

  • 3.
  • 4. UNDERSTANDING “DEEPFAKES” • Uses Machine learning an aspect of Artificial Intelligence . • It manipulates Video or Audio clips to fabricate reality, to prompt negative response from the target audience.
  • 5. • Fraudsters too are using Deepfakes to commit their frauds. • The user name Deepfakes come from the notorious website Reddit in 2017 though now impersonations are forbidden on this site. • As of 2019 it is estimated 14,600Deepfake Videos existed and posted online.
  • 6. • Deepfake tools are many. • Fraudsters might have used the Deepfake technology . • Deepfake technology is going to be the future threat by fraudsters as it is easy to use many tools that are available to do voice cloning etc. • Fraudsters cheat people through deepfake apps. By impersonating voice, images etc of public figures and celebrities.
  • 7. • Deepfakes are also used to manipulate Biometrics-like-Face recognition, Voice recognition and Finger prints. • It is at times very difficult too to prove in courts of law a Deepfake instances besides involves costs too. • Thus deepfakes are used by fraudsters for stock profiteering, extortion and virtual kidnapping etc.
  • 8. Possible Remedies: 1.Training 2.Awareness of deepfake usage and consequences 3. Good procedures in place 4. Good controls.