SlideShare a Scribd company logo
DeepFake Detection
Challenges, Progress and
Hands-on Demonstration of Technology
Dr. Symeon (Akis) Papadopoulos – @sympap
Dr. Nikos Sarris - @nikossarris
MeVer Team @ Information Technologies Institute (ITI) /
Centre for Research & Technology Hellas (CERTH)
Online Webinar, Dec 16th 2021
Media Verification
(MeVer)
DeepFakes
Content, generated by deep neural
networks, that seems authentic to
human eye
Four main types of face DeepFakes:
a) Entire face synthesis, b) Attribute
manipulation, c) Identity swap,
d) Expression swap
Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake
Detection (Tolosana et al., 2020)
Tolosana, R., et al. (2020). Deepfakes and beyond: A
survey of face manipulation and fake detection.
Information Fusion, 64, 131-148.
Verdoliva, L. (2020). Media forensics and deepfakes:
an overview. IEEE Journal of Selected Topics in
Signal Processing, 14(5), 910-932.
Mirsky, Y., & Lee, W. (2021). The creation and
detection of deepfakes: A survey. ACM Computing
Surveys (CSUR), 54(1), 1-41.
reenactment
replacement
editing
generation
Gaining popularity
Nguyen, T. T., et al. (2019). Deep learning for
deepfakes creation and detection. arXiv preprint
arXiv:1909.11573, 1.
Ajder, H., et al. (2019).The State of DeepFakes:
Landscape, Threats and Impact. Report by
DeepTraceLabs/Sensity.
Potential Risks and Harms
Tackling deepfakes in European policy, Panel for the Future of Science and Technology,
Scientific Foresight Unit (STOA), July 2021
DeepFakes and Politics
One week after the video’s release, Gabon’s military
attempted an ultimately unsuccessful coup—the country’s
first since 1964—citing the video’s oddness as proof
something was amiss with the president.
https://www.motherjones.com/politics/2019/03/deepfake
-gabon-ali-bongo/
Mr Nguyen said he could not rule out the video being a
‘deepfake’, a term for the fairly new artificial intelligence
based technology which involves machine learning
techniques to superimpose a face on a video.
https://www.sbs.com.au/news/a-gay-sex-tape-is-threatening-
to-end-the-political-careers-of-two-men-in-malaysia
DeepFake Quality Rapidly Improving
https://twitter.com/goodfellow_ian/status/1084973596236144640
2021
Masood, M., Nawaz, M., Malik, K. M., Javed, A., & Irtaza, A. (2021). Deepfakes Generation and Detection: State-of-
the-art, open challenges, countermeasures, and way forward. arXiv preprint arXiv:2103.00484.
Karras, T., Aittala, M., Laine, S., Härkönen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021, May). Alias-free generative
adversarial networks. In Thirty-Fifth Conference on Neural Information Processing Systems.
A New Level of Realism
• Created by Chris Ume, a VFX specialist
• Not detected by any of the commercial
deepfake detection services
• Not discernible by human inspection
• Potential for misleading
but to date barriers are still high
• a lot of expertise, skill and time
• an impersonator who looks like the target
(Miles Fisher)
https://www.theverge.com/2021/3/5/22314980/tom-cruise-
deepfake-tiktok-videos-ai-impersonator-chris-ume-miles-fisher
Common DF Neural Network Architectures
Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41.
DeepFake Creation Pipeline and Tools
Mirsky, Y., & Lee, W. (2021). The Creation
and Detection of Deepfakes: A Survey. ACM
Computing Surveys, 54(1), 1-41.
faceswap.dev
https://github.com/iperov/DeepFaceLab
zaodownload.com malavida.com/en/soft/fakeapp
hey.reface.ai
facemagic.ai
https://generated.photos/face-generator
Signs of a DeepFake (in 2021)
• Different kinds of
artifacts
• Blurry areas around lips,
hair, earlobs
• Lack of symmetry
• Lighting inconsistencies
• Fuzzy background
• Flickering (in video)
https://apnews.com/article/bc2f19097a4c4fffaa00de6770b8a60d
DF Landscape: Detection Approaches
PHYSIOLOGICAL
SIGNALS
Blinking
information
Corneal specular
highlights
Photo-
plethysmography
ARTIFACT BASED
DETECTION
3D head pose
features
Limited resolution /
blurring
Local artifacts
(eyes, teeth, etc.)
Face X-Ray
(blending artifacts)
DEEP LEARNING
ARCHITECTURES
MesoNet XceptionNet
Capsule
Networks
Recurrent
Convolutions
FREQUENCY
DOMAIN
Local frequency
statistics
Spectral
distribution
Two-stream
approaches
Attention Nets
(Transformers)
The DF Battleground
• DeepFake generation and detection
offer a naturally adversarial setting.
• A recent survey (Feb 2021) analyzed
70 generation and 108 detection
methods and linked them if a
detection method tried to detect
media from a given generator.
• Analysis indicates the fast evolution
of this field.
Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., & Liu, Y.
(2021). Countering Malicious DeepFakes: Survey,
Battleground, and Horizon. arXiv preprint arXiv:2103.00218.
DF Landscape: Datasets
• Large-scale: DFDC, KoDF,
OpenForensics
• Realistic: WildDeepfake
• Classic: FaceForensics++
• Small/limited: UADFV, DF-TIMIT,
Google DFD, Celeb-DF
Open
Forensics
DeepFake Detection Challenge
• Goal: detect videos with facial or voice manipulations
• 2,114 teams participated in the challenge
• Log Loss error evaluation on public and private validation sets
• Public evaluation contained videos with similar transformations as the
training set
• Private evaluation contained organic videos and videos with unknown
transformations from the Internet
Source: https://www.kaggle.com/c/deepfake-detection-challenge
Performance of SotA methods on DFDC
The DFDC highlights the
generalization challenge
faced by SotA methods.
public set
hidden set
Kim, M., Tariq, S., & Woo, S. S. (2021). FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning. In
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1001-1012).
Accuracy in cross forgery experiments (FF++ HQ)
Method DF F2F FS NT
Xception (DF) 99.41 56.05 49.93 66.32
Xception (F2F) 68.55 98.64 50.55 54.81
Xception (FS) 49.89 54.15 98.36 50.74
Xception (NT) 50.05 57.49 50.01 99.88
Accuracy in cross dataset experiments
Method FF++ HQ CELEB-DF
Xception (FF++ HQ) 95.60 73.01
The MeVer DeepFake Detection Service
• R&D started in the end of 2019
• Participation in DeepFake Detection Challenge in Spring 2020
• Ranked among top 5% of solutions
• Alpha version internally released in Summer 2020
• Internally tested and evaluated by WeVerify partners in eight cycles
and continuously refined
• Version 1.0.0 released in November 2021
• Addition of network trained on more realistic datasets
• Available as a standalone service and via third party
applications: a) Truly Media, b) WeVerify plugin (soon)
Image Analysis
Video Analysis
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Shot segmentation
- 64 frames per shot
- Face detection
- Face filtering
- Face clustering per
shot and filtering
P. Charitidis, G. Kordopatis-Zilos, S. Papadopoulos and I. Kompatsiaris. “Investigating
the Impact of Pre-processing and Prediction Aggregation on the DeepFake Detection
Task”. In Proceedings of the Truth and Trust Online, 2020.
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Ensemble of models
(EfficientNet +
Transformers)
- Trained on DFDC
(120K videos) and
WildDeepFake (7314
videos) datasets
- BCE / InfoNCE loss
- DF scores per face
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Average DF scores
per face cluster
- Final prediction is
the maximum face
DF score
- Result preparation
Examples of Successful Image Detection
Limitations in Detection
Hard to spot very
realistic manipulations
from methods that
involve manual tuning
and post-processing.
Current version cannot
detect manipulations in fully
synthetic faces (e.g.
StyleGAN2,
thispersondoesnotexist.com).
Low resolution faces may be falsely
presumed as DeepFakes.
Challenges
• Computational resources (both for training and for serving requests)
• Making the User Interface easy to understand
• Defend against adversarial approaches
• Generalization!
• Keeping up-to-date with new generation models/methods/tools 
continuously enrich training dataset
Current Trends
Generate own DF and Use for
Training
Attention-based and Patch-
level Consistency Analysis
Metric and Contrastive
Learning
Domain Adaptation and
Knowledge Distillation
Next Steps
• New approaches
• Knowledge Distillation: from simple teacher-student pairs to group teaching setups
• Contrastive Learning: investigate decorrelated representations
• Practical considerations
• Usability
• Efficiency
• Maintenance (new training data, model adaptation, etc.)
• Transparency and Robustness
• Creating a model card for the service (modelcards.withgoogle.com)
• Benchmark service robustness with ART (github.com/Trusted-AI/adversarial-
robustness-toolbox)
Our DeepFake Detection Team
Akis: MeVer
leader
Nikos: MeVer senior
researcher
Panagiotis: service/API
development
Lazaros: front end
development
Spiros: DeepFake detection
and service development
Pantelis: GAN
detection
George: Deep Learning
research lead
Olga: technical
support
Thank you!
Dr. Symeon Papadopoulos
papadop@iti.gr
@sympap
Dr. Nikos Sarris
nsarris@iti.gr
@nikossarris
Media Verification (MeVer)
https://mever.iti.gr/
@meverteam

More Related Content

What's hot

Deepfakes
DeepfakesDeepfakes
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
NilayDeshmukh3
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
Anca Georgiana Rusu
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
spchinchole20
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
NandeeshNandhu2
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
vivatechijri
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
swathiravishankar3
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
SuprithaRavishankar
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
Rakshit Shrestha
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET Journal
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
Edge AI and Vision Alliance
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
Sonesh yadav
 
face mask detection ppt66 (2).pptx
face mask detection ppt66 (2).pptxface mask detection ppt66 (2).pptx
face mask detection ppt66 (2).pptx
ShreyaMishra883730
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
findeverything
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
Fares Hasan
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
Akash Satamkar
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 

What's hot (20)

Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
Deepfake.pptx
Deepfake.pptxDeepfake.pptx
Deepfake.pptx
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
 
face mask detection ppt66 (2).pptx
face mask detection ppt66 (2).pptxface mask detection ppt66 (2).pptx
face mask detection ppt66 (2).pptx
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
Image processing ppt
Image processing pptImage processing ppt
Image processing ppt
 

Similar to DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
Symeon Papadopoulos
 
Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection
Weverify
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Symeon Papadopoulos
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptx
ssusercec41e
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
Shakas Technologies
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video Detection
IRJET Journal
 
Unmasking deepfakes: A systematic review of deepfake detection and generation...
Unmasking deepfakes: A systematic review of deepfake detection and generation...Unmasking deepfakes: A systematic review of deepfake detection and generation...
Unmasking deepfakes: A systematic review of deepfake detection and generation...
Araz Taeihagh
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
IJECEIAES
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
SwatiNarkhede1
 
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
DataScienceConferenc1
 
Face recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingFace recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signing
Chimi Wangmo
 
Msm2013challenge
Msm2013challengeMsm2013challenge
Msm2013challenge
fgodin
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
IT Arena
 
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Universitat Politècnica de Catalunya
 
Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10
Mario Cho
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptx
jinaj2
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
Ciente
 
nn.pptx
nn.pptxnn.pptx
nn.pptx
ssusercec41e
 
Rise of AI through DL
Rise of AI through DLRise of AI through DL
Rise of AI through DL
Rehan Guha
 
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Universitat Politècnica de Catalunya
 

Similar to DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology (20)

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptx
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video Detection
 
Unmasking deepfakes: A systematic review of deepfake detection and generation...
Unmasking deepfakes: A systematic review of deepfake detection and generation...Unmasking deepfakes: A systematic review of deepfake detection and generation...
Unmasking deepfakes: A systematic review of deepfake detection and generation...
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
 
Face recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingFace recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signing
 
Msm2013challenge
Msm2013challengeMsm2013challenge
Msm2013challenge
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
 
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
 
Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptx
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
nn.pptx
nn.pptxnn.pptx
nn.pptx
 
Rise of AI through DL
Rise of AI through DLRise of AI through DL
Rise of AI through DL
 
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
 

More from Symeon Papadopoulos

Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering Localization
Symeon Papadopoulos
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact Tracing
Symeon Papadopoulos
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
Symeon Papadopoulos
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air Quality
Symeon Papadopoulos
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
Symeon Papadopoulos
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
Symeon Papadopoulos
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
Symeon Papadopoulos
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on Twitter
Symeon Papadopoulos
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Symeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016
Symeon Papadopoulos
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Symeon Papadopoulos
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging Performance
Symeon Papadopoulos
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
Symeon Papadopoulos
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
Symeon Papadopoulos
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
Symeon Papadopoulos
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015
Symeon Papadopoulos
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
Symeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015
Symeon Papadopoulos
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
Symeon Papadopoulos
 

More from Symeon Papadopoulos (20)

Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering Localization
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact Tracing
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air Quality
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on Twitter
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging Performance
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
 
Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
 

Recently uploaded

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology

  • 1. DeepFake Detection Challenges, Progress and Hands-on Demonstration of Technology Dr. Symeon (Akis) Papadopoulos – @sympap Dr. Nikos Sarris - @nikossarris MeVer Team @ Information Technologies Institute (ITI) / Centre for Research & Technology Hellas (CERTH) Online Webinar, Dec 16th 2021 Media Verification (MeVer)
  • 2. DeepFakes Content, generated by deep neural networks, that seems authentic to human eye Four main types of face DeepFakes: a) Entire face synthesis, b) Attribute manipulation, c) Identity swap, d) Expression swap Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection (Tolosana et al., 2020) Tolosana, R., et al. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131-148. Verdoliva, L. (2020). Media forensics and deepfakes: an overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910-932. Mirsky, Y., & Lee, W. (2021). The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1), 1-41. reenactment replacement editing generation
  • 3. Gaining popularity Nguyen, T. T., et al. (2019). Deep learning for deepfakes creation and detection. arXiv preprint arXiv:1909.11573, 1. Ajder, H., et al. (2019).The State of DeepFakes: Landscape, Threats and Impact. Report by DeepTraceLabs/Sensity.
  • 4. Potential Risks and Harms Tackling deepfakes in European policy, Panel for the Future of Science and Technology, Scientific Foresight Unit (STOA), July 2021
  • 5. DeepFakes and Politics One week after the video’s release, Gabon’s military attempted an ultimately unsuccessful coup—the country’s first since 1964—citing the video’s oddness as proof something was amiss with the president. https://www.motherjones.com/politics/2019/03/deepfake -gabon-ali-bongo/ Mr Nguyen said he could not rule out the video being a ‘deepfake’, a term for the fairly new artificial intelligence based technology which involves machine learning techniques to superimpose a face on a video. https://www.sbs.com.au/news/a-gay-sex-tape-is-threatening- to-end-the-political-careers-of-two-men-in-malaysia
  • 6. DeepFake Quality Rapidly Improving https://twitter.com/goodfellow_ian/status/1084973596236144640 2021 Masood, M., Nawaz, M., Malik, K. M., Javed, A., & Irtaza, A. (2021). Deepfakes Generation and Detection: State-of- the-art, open challenges, countermeasures, and way forward. arXiv preprint arXiv:2103.00484. Karras, T., Aittala, M., Laine, S., Härkönen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021, May). Alias-free generative adversarial networks. In Thirty-Fifth Conference on Neural Information Processing Systems.
  • 7. A New Level of Realism • Created by Chris Ume, a VFX specialist • Not detected by any of the commercial deepfake detection services • Not discernible by human inspection • Potential for misleading but to date barriers are still high • a lot of expertise, skill and time • an impersonator who looks like the target (Miles Fisher) https://www.theverge.com/2021/3/5/22314980/tom-cruise- deepfake-tiktok-videos-ai-impersonator-chris-ume-miles-fisher
  • 8. Common DF Neural Network Architectures Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41.
  • 9. DeepFake Creation Pipeline and Tools Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41. faceswap.dev https://github.com/iperov/DeepFaceLab zaodownload.com malavida.com/en/soft/fakeapp hey.reface.ai facemagic.ai https://generated.photos/face-generator
  • 10. Signs of a DeepFake (in 2021) • Different kinds of artifacts • Blurry areas around lips, hair, earlobs • Lack of symmetry • Lighting inconsistencies • Fuzzy background • Flickering (in video) https://apnews.com/article/bc2f19097a4c4fffaa00de6770b8a60d
  • 11. DF Landscape: Detection Approaches PHYSIOLOGICAL SIGNALS Blinking information Corneal specular highlights Photo- plethysmography ARTIFACT BASED DETECTION 3D head pose features Limited resolution / blurring Local artifacts (eyes, teeth, etc.) Face X-Ray (blending artifacts) DEEP LEARNING ARCHITECTURES MesoNet XceptionNet Capsule Networks Recurrent Convolutions FREQUENCY DOMAIN Local frequency statistics Spectral distribution Two-stream approaches Attention Nets (Transformers)
  • 12. The DF Battleground • DeepFake generation and detection offer a naturally adversarial setting. • A recent survey (Feb 2021) analyzed 70 generation and 108 detection methods and linked them if a detection method tried to detect media from a given generator. • Analysis indicates the fast evolution of this field. Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., & Liu, Y. (2021). Countering Malicious DeepFakes: Survey, Battleground, and Horizon. arXiv preprint arXiv:2103.00218.
  • 13. DF Landscape: Datasets • Large-scale: DFDC, KoDF, OpenForensics • Realistic: WildDeepfake • Classic: FaceForensics++ • Small/limited: UADFV, DF-TIMIT, Google DFD, Celeb-DF Open Forensics
  • 14. DeepFake Detection Challenge • Goal: detect videos with facial or voice manipulations • 2,114 teams participated in the challenge • Log Loss error evaluation on public and private validation sets • Public evaluation contained videos with similar transformations as the training set • Private evaluation contained organic videos and videos with unknown transformations from the Internet Source: https://www.kaggle.com/c/deepfake-detection-challenge
  • 15. Performance of SotA methods on DFDC The DFDC highlights the generalization challenge faced by SotA methods. public set hidden set Kim, M., Tariq, S., & Woo, S. S. (2021). FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1001-1012). Accuracy in cross forgery experiments (FF++ HQ) Method DF F2F FS NT Xception (DF) 99.41 56.05 49.93 66.32 Xception (F2F) 68.55 98.64 50.55 54.81 Xception (FS) 49.89 54.15 98.36 50.74 Xception (NT) 50.05 57.49 50.01 99.88 Accuracy in cross dataset experiments Method FF++ HQ CELEB-DF Xception (FF++ HQ) 95.60 73.01
  • 16. The MeVer DeepFake Detection Service • R&D started in the end of 2019 • Participation in DeepFake Detection Challenge in Spring 2020 • Ranked among top 5% of solutions • Alpha version internally released in Summer 2020 • Internally tested and evaluated by WeVerify partners in eight cycles and continuously refined • Version 1.0.0 released in November 2021 • Addition of network trained on more realistic datasets • Available as a standalone service and via third party applications: a) Truly Media, b) WeVerify plugin (soon)
  • 19. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
  • 20. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Shot segmentation - 64 frames per shot - Face detection - Face filtering - Face clustering per shot and filtering P. Charitidis, G. Kordopatis-Zilos, S. Papadopoulos and I. Kompatsiaris. “Investigating the Impact of Pre-processing and Prediction Aggregation on the DeepFake Detection Task”. In Proceedings of the Truth and Trust Online, 2020.
  • 21. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Ensemble of models (EfficientNet + Transformers) - Trained on DFDC (120K videos) and WildDeepFake (7314 videos) datasets - BCE / InfoNCE loss - DF scores per face
  • 22. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Average DF scores per face cluster - Final prediction is the maximum face DF score - Result preparation
  • 23. Examples of Successful Image Detection
  • 24. Limitations in Detection Hard to spot very realistic manipulations from methods that involve manual tuning and post-processing. Current version cannot detect manipulations in fully synthetic faces (e.g. StyleGAN2, thispersondoesnotexist.com). Low resolution faces may be falsely presumed as DeepFakes.
  • 25. Challenges • Computational resources (both for training and for serving requests) • Making the User Interface easy to understand • Defend against adversarial approaches • Generalization! • Keeping up-to-date with new generation models/methods/tools  continuously enrich training dataset
  • 26. Current Trends Generate own DF and Use for Training Attention-based and Patch- level Consistency Analysis Metric and Contrastive Learning Domain Adaptation and Knowledge Distillation
  • 27. Next Steps • New approaches • Knowledge Distillation: from simple teacher-student pairs to group teaching setups • Contrastive Learning: investigate decorrelated representations • Practical considerations • Usability • Efficiency • Maintenance (new training data, model adaptation, etc.) • Transparency and Robustness • Creating a model card for the service (modelcards.withgoogle.com) • Benchmark service robustness with ART (github.com/Trusted-AI/adversarial- robustness-toolbox)
  • 28. Our DeepFake Detection Team Akis: MeVer leader Nikos: MeVer senior researcher Panagiotis: service/API development Lazaros: front end development Spiros: DeepFake detection and service development Pantelis: GAN detection George: Deep Learning research lead Olga: technical support
  • 29. Thank you! Dr. Symeon Papadopoulos papadop@iti.gr @sympap Dr. Nikos Sarris nsarris@iti.gr @nikossarris Media Verification (MeVer) https://mever.iti.gr/ @meverteam