SlideShare a Scribd company logo
Deepfake:
Trick or Treat
Samama Khan
What is Deepfake?
01
History of Deepfakes
02
The present and the future of
Deepfakes
03
Consequences of Deepfakes
04
Discussion Topics
What is Deepfake?
• When something real is taken and deep
learning is applied onto it, making it into
something fake.
• Deep learning + Fake = Deepfake
• Deep learning involve training generative neural
network architectures, such as Autoencoders or
Generative Adversarial Networks (GANs).
• The generated visual and audio content have a
high potential to deceive.
History of Deepfakes?
• Photo manipulation was developed in the 19th
century and soon applied to motion pictures.
• Technology steadily improved during the 20th century,
and more quickly with digital video.
• Initially Deepfake technology development began by
researchers at academic institutions in the 1990s,
and later by amateurs in online communities.
• An early landmark project was the Video Rewrite
program, published in 1997, which modified existing
video footage of a person speaking to depict that
person mouthing the words contained in a different
audio track.
The Present and the Future
of Deepfakes
The Present;
• The Face2Face program, published in 2016.
• The “Synthesizing Obama” program, published in 2017.
• In August 2018, researchers at the University of
California, Berkeley published a paper introducing a
fake dancing app that can create the impression of
masterful dancing ability using AI.
• As of 2019, open-source software such as Faceswap
and the command line-based DeepFaceLab were
brought to the people.
• A famous research paper published in June 2018, by
the name of Transfer Learning from Speaker
Verification to Multispeaker Text-To-Speech Synthesis.
• In January 2020, another research paper by the name
of Neural Voice Puppetry: Audio-driven Facial
Reenactment was published.
• Avatarify launched in April 2020, and the main
purpose is to provide photorealistic avatars for video-
conferencing apps and more interestingly its open-
source.
• Before these white papers were published, In 2017,
Lyrebird AI, a software existed for creating
synthesized audio.
• Desktop app like FakeApp and Mobile apps like
Impression and Doublicat.
• And many more…
The Future;
• Generalization;
High-quality Deepfakes are often achieved by
training on hours of footage of the target. This
challenge is to minimize of the amount of training
data required to produce quality images and to
enable the execution of trained models on new
identities (unseen during training).
• Paired Training;
Training a supervised model can produce high-
quality results, but requires data pairing. This is the
process of finding examples of inputs and their
desired outputs for the model to learn from. Data
pairing is laborious and impractical when training
on multiple identities and facial behaviors. Some
solutions include self-supervised training (using
frames from the same video), the use of unpaired
networks such as Cycle-GAN, or the manipulation
of network embeddings.
• Identity leakage;
This is where the identity of the driver (i.e., the
actor controlling the face in a reenactment) is
partially transferred to the generated face. Some
solutions proposed include attention mechanisms,
few-shot learning, disentanglement, boundary
conversions, and skip connections.
• Occlusions;
When part of the face is obstructed with a hand,
hair, glasses, or any other item then artifacts can
occur. A common occlusion is a closed mouth
which hides the inside of the mouth and the teeth.
Some solutions include image segmentation during
training and in-painting.
• Temporal coherence;
In videos containing Deepfakes, artifact such as
flickering and jitter can occur because the network
has no context of the preceding frames. Some
researchers provide this context or use novel
temporal coherence losses to help improve
realism.
Consequences of Deepfakes
The way in which the following
are the Target;
• Politicians (easy and dangerous)
• Film Actors (too much data available)
• Social Figures
• General Public
The Prevention;
• Use of AI against AI.
• Use of Blockchain.
• Awareness
Questions???
Thank You!!!

More Related Content

What's hot

Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
Anca Georgiana Rusu
 
Deep fake
Deep fakeDeep fake
Deep fake
elisetty pavan
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
Weverify
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
Symeon Papadopoulos
 
What are deepfakes?
What are deepfakes?What are deepfakes?
What are deepfakes?
Dr Janet Bastiman
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
NilayDeshmukh3
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
Rakshit Shrestha
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
NandeeshNandhu2
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
vivatechijri
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Modern face recognition with deep learning
Modern face recognition with deep learningModern face recognition with deep learning
Modern face recognition with deep learning
marada0033
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
SuprithaRavishankar
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Pushkar Dutt
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
spchinchole20
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 

What's hot (20)

Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deep fake
Deep fakeDeep fake
Deep fake
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
What are deepfakes?
What are deepfakes?What are deepfakes?
What are deepfakes?
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Modern face recognition with deep learning
Modern face recognition with deep learningModern face recognition with deep learning
Modern face recognition with deep learning
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

Similar to DeepFake: Trick or Treat

Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
Shakas Technologies
 
Tech Fest 2012-Evolving video Instruction development
Tech Fest 2012-Evolving video Instruction developmentTech Fest 2012-Evolving video Instruction development
Tech Fest 2012-Evolving video Instruction development
Western Illinois University
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET Journal
 
Fake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewFake Video Creation and Detection: A Review
Fake Video Creation and Detection: A Review
IRJET Journal
 
Technology Driven Differentiated Instruction #KCDTTL
Technology Driven Differentiated Instruction #KCDTTLTechnology Driven Differentiated Instruction #KCDTTL
Technology Driven Differentiated Instruction #KCDTTL
Vicki Davis
 
Forrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
Forrest Iandola: My Adventures in Artificial Intelligence and EntrepreneurshipForrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
Forrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
Forrest Iandola
 
Sandeep-portfolio-2016
Sandeep-portfolio-2016Sandeep-portfolio-2016
Sandeep-portfolio-2016
Sandeep Zechariah George
 
Machine Learning ass. of tanumalakar.pdf
Machine Learning ass. of tanumalakar.pdfMachine Learning ass. of tanumalakar.pdf
Machine Learning ass. of tanumalakar.pdf
DYDF
 
A SURVEY ON DEEPFAKES CREATION AND DETECTION
A SURVEY ON DEEPFAKES CREATION AND DETECTIONA SURVEY ON DEEPFAKES CREATION AND DETECTION
A SURVEY ON DEEPFAKES CREATION AND DETECTION
IRJET Journal
 
Educational technology 2
Educational technology 2Educational technology 2
Educational technology 2
Yeye Gangcuangco
 
Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
Montellll
 
e-schools conference presentation
e-schools conference presentatione-schools conference presentation
e-schools conference presentation
Maggie Verster
 
Multimediaexercise
MultimediaexerciseMultimediaexercise
Multimediaexercise
Rony Mohamed
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
IJECEIAES
 
34th.余凯.机器学习进展及语音图像中的应用
34th.余凯.机器学习进展及语音图像中的应用34th.余凯.机器学习进展及语音图像中的应用
34th.余凯.机器学习进展及语音图像中的应用
komunling
 
VOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradtsVOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradts
voginip
 
Using video and online resource in online teaching
Using video and online resource in online teachingUsing video and online resource in online teaching
Using video and online resource in online teaching
Yun Wan
 
Technology Driven Differentiated Instruction
Technology Driven Differentiated InstructionTechnology Driven Differentiated Instruction
Technology Driven Differentiated Instruction
Vicki Davis
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
swathiravishankar3
 
Image Processing and Computer Vision in iOS
Image Processing and Computer Vision in iOSImage Processing and Computer Vision in iOS
Image Processing and Computer Vision in iOS
Oge Marques
 

Similar to DeepFake: Trick or Treat (20)

Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
 
Tech Fest 2012-Evolving video Instruction development
Tech Fest 2012-Evolving video Instruction developmentTech Fest 2012-Evolving video Instruction development
Tech Fest 2012-Evolving video Instruction development
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Fake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewFake Video Creation and Detection: A Review
Fake Video Creation and Detection: A Review
 
Technology Driven Differentiated Instruction #KCDTTL
Technology Driven Differentiated Instruction #KCDTTLTechnology Driven Differentiated Instruction #KCDTTL
Technology Driven Differentiated Instruction #KCDTTL
 
Forrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
Forrest Iandola: My Adventures in Artificial Intelligence and EntrepreneurshipForrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
Forrest Iandola: My Adventures in Artificial Intelligence and Entrepreneurship
 
Sandeep-portfolio-2016
Sandeep-portfolio-2016Sandeep-portfolio-2016
Sandeep-portfolio-2016
 
Machine Learning ass. of tanumalakar.pdf
Machine Learning ass. of tanumalakar.pdfMachine Learning ass. of tanumalakar.pdf
Machine Learning ass. of tanumalakar.pdf
 
A SURVEY ON DEEPFAKES CREATION AND DETECTION
A SURVEY ON DEEPFAKES CREATION AND DETECTIONA SURVEY ON DEEPFAKES CREATION AND DETECTION
A SURVEY ON DEEPFAKES CREATION AND DETECTION
 
Educational technology 2
Educational technology 2Educational technology 2
Educational technology 2
 
Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
 
e-schools conference presentation
e-schools conference presentatione-schools conference presentation
e-schools conference presentation
 
Multimediaexercise
MultimediaexerciseMultimediaexercise
Multimediaexercise
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
34th.余凯.机器学习进展及语音图像中的应用
34th.余凯.机器学习进展及语音图像中的应用34th.余凯.机器学习进展及语音图像中的应用
34th.余凯.机器学习进展及语音图像中的应用
 
VOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradtsVOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradts
 
Using video and online resource in online teaching
Using video and online resource in online teachingUsing video and online resource in online teaching
Using video and online resource in online teaching
 
Technology Driven Differentiated Instruction
Technology Driven Differentiated InstructionTechnology Driven Differentiated Instruction
Technology Driven Differentiated Instruction
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
Image Processing and Computer Vision in iOS
Image Processing and Computer Vision in iOSImage Processing and Computer Vision in iOS
Image Processing and Computer Vision in iOS
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 

DeepFake: Trick or Treat

  • 2. What is Deepfake? 01 History of Deepfakes 02 The present and the future of Deepfakes 03 Consequences of Deepfakes 04 Discussion Topics
  • 4. • When something real is taken and deep learning is applied onto it, making it into something fake. • Deep learning + Fake = Deepfake • Deep learning involve training generative neural network architectures, such as Autoencoders or Generative Adversarial Networks (GANs). • The generated visual and audio content have a high potential to deceive.
  • 5.
  • 7. • Photo manipulation was developed in the 19th century and soon applied to motion pictures. • Technology steadily improved during the 20th century, and more quickly with digital video. • Initially Deepfake technology development began by researchers at academic institutions in the 1990s, and later by amateurs in online communities. • An early landmark project was the Video Rewrite program, published in 1997, which modified existing video footage of a person speaking to depict that person mouthing the words contained in a different audio track.
  • 8. The Present and the Future of Deepfakes
  • 10. • The Face2Face program, published in 2016. • The “Synthesizing Obama” program, published in 2017.
  • 11. • In August 2018, researchers at the University of California, Berkeley published a paper introducing a fake dancing app that can create the impression of masterful dancing ability using AI.
  • 12.
  • 13. • As of 2019, open-source software such as Faceswap and the command line-based DeepFaceLab were brought to the people. • A famous research paper published in June 2018, by the name of Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis. • In January 2020, another research paper by the name of Neural Voice Puppetry: Audio-driven Facial Reenactment was published. • Avatarify launched in April 2020, and the main purpose is to provide photorealistic avatars for video- conferencing apps and more interestingly its open- source.
  • 14.
  • 15.
  • 16. • Before these white papers were published, In 2017, Lyrebird AI, a software existed for creating synthesized audio. • Desktop app like FakeApp and Mobile apps like Impression and Doublicat. • And many more…
  • 18. • Generalization; High-quality Deepfakes are often achieved by training on hours of footage of the target. This challenge is to minimize of the amount of training data required to produce quality images and to enable the execution of trained models on new identities (unseen during training).
  • 19. • Paired Training; Training a supervised model can produce high- quality results, but requires data pairing. This is the process of finding examples of inputs and their desired outputs for the model to learn from. Data pairing is laborious and impractical when training on multiple identities and facial behaviors. Some solutions include self-supervised training (using frames from the same video), the use of unpaired networks such as Cycle-GAN, or the manipulation of network embeddings.
  • 20. • Identity leakage; This is where the identity of the driver (i.e., the actor controlling the face in a reenactment) is partially transferred to the generated face. Some solutions proposed include attention mechanisms, few-shot learning, disentanglement, boundary conversions, and skip connections.
  • 21. • Occlusions; When part of the face is obstructed with a hand, hair, glasses, or any other item then artifacts can occur. A common occlusion is a closed mouth which hides the inside of the mouth and the teeth. Some solutions include image segmentation during training and in-painting.
  • 22. • Temporal coherence; In videos containing Deepfakes, artifact such as flickering and jitter can occur because the network has no context of the preceding frames. Some researchers provide this context or use novel temporal coherence losses to help improve realism.
  • 24.
  • 25.
  • 26. The way in which the following are the Target; • Politicians (easy and dangerous) • Film Actors (too much data available) • Social Figures • General Public
  • 27. The Prevention; • Use of AI against AI. • Use of Blockchain. • Awareness
  • 28.