SlideShare a Scribd company logo
1 of 11
Seminar and Technical Communication
DEEP FAKE
Under the guidance of
Prof. Swamiraj Jadhav
Chinchole Suraj Pramod
20CO018
How DeepFake
is Created ?
Advantages and
Disadvantages
Introduction
01 02
TABLE OF CONTENTS
03
References
Conclusion
04 05
 Deep fake (also spelled deepfake) is a type of
artificial intelligence used to create
convincing images, audio and video hoaxes.
 Deepfake is a technique that uses deep
learning algorithms to create fake images
usually by swapping a person’s face from a
source image into another person’s face in a
target image, with a resulting fake image that
is sometimes hard to detect.
INTRODUCTION
How DeepFake is created ?
 Deepfakes are created using deep learning methods in
which they aim to replace the face of a targeted
person by the face of someone else in an image or
video.
 This technique was improved by developers and
online communities to notably create user-friendly
applications that are readily available online like
FakeApp and FaceSwap.
 Deepfake videos are often made using a variational
auto-encoder (VAE) and a facial recognition algorithm.
 Images are encoded into low-dimensional
representations, which are then decoded back into
images by trained VAEs.
Advantages of DeepFake
 Low-Cost Video Campaigns - Marketers using
deepfakes can save money on the budgets for
their video campaigns using because you don’t
need an in-person actor.
 Improved Omni Channel Campaigns-
Instead of reshooting to fit different purposes for
different channels, you can instead just edit or
replace video cuts to create a paid social
campaign.
 Hyper Personalization- Deepfake technology
would allow you to alter the skin tone of that
model so the customer can experience what the
product would look like on their skin tone.
Disadvantages of DeepFake
 Scamming Increases - Deepfake technology
may also increase the number of scams online,
you could create false accusations or complaints
against companies.
 Lack Of Trust Or Ethics Issues - The most
obvious impact of deepfake technology is that it
can be used to create a fake video, so ascertaining
the authenticity of a piece of content has become
more difficult.
 Spreading Misleading News via Politicians -
We are so open to believing what we see or hear
in media. And if you see a public figure talking
about a topic, you usually would not think if the
person is “real” or “fake?”.
DeepFake Detection
 Deepfake Detection To successfully build a robust
neural network capable of detecting complex
deepfakes a large dataset of training images is needed.
due to social media these kind of images can be easily
obtained also companies like google provide large
datasets to help accelerate the research in protection
against deepfakes . MesoNet used a dataset of more
than 5000 images Fig. 6, the images are divided into
real images and deepfake images.
 After training the CNN with the dataset, the CNN is able
to detect deepfake images with over 80 % confidence
rate Figure. When exploring current deepfake images
available online, deepfake flaws are easily noticeable,
deepfake images of a person’s face looking straight
ahead to the camera are harder to detect than images
where the person’s face is looking at an angle. current
deepfake generation techniques aren’t that great at
dealing with faces at an angle.
Conclusion
• People got used to hearing about Deepfakes.
Most of the Internet people know what
Deepfake is. We do not have to wait for years
to reach and use new technologies like old
times.
• We are in the era of Artificial Intelligence. They
can see, they can analyze, and they can fake it.
There are good and bad sides of Deepfakes,
but the usage area of technology depends on
us. We must use it for the greater good. Also,
some legal arrangements must be done.
• Indeed, all these will take some time to reach
a certain point. We will see what kind of world
this technology leads us to.
References
1. Deepfakes Creation and Detection Using Deep Learning Hady A.
Khalil, Shady A. Maged Department o f Mechatronics
Engineering, Ain Shams University, Cairo, Egypt
hadyayman1996@gmail.com, shady.maged@eng.asu.edu.eg
(https://ieeexplore.ieee.org/document/9447642)
2. Deepfake Detection through Deep Learning Deng Pan, Lixian
Sun, Rui Wang, Xingjian Zhang, Richard O. Sinnott School of
Computing and Information Systems The University of Melbourne,
Melbourne, Australia Contact: rsinnott@unimelb.edu.au
(https://ieeexplore.ieee.org/document/9302547)
Thank You..

More Related Content

What's hot

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsCrystalHariga
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...Edge AI and Vision Alliance
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Ian McCarthy
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxswathiravishankar3
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 

What's hot (20)

Deep fakes and beyond
Deep fakes and beyondDeep fakes and beyond
Deep fakes and beyond
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive Us
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
Dcgan
DcganDcgan
Dcgan
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
face recognition
face recognitionface recognition
face recognition
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 

Similar to Seminar and Technical Communication on DeepFake Detection

Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfIMRAN SIDDIQ
 
What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?janviverma11
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]christeenamoses
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxShakas Technologies
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptxjinaj2
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
How deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinHow deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinShadekulIslamShovo
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsbluetroyvictorVinay
 
VOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradtsVOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradtsvoginip
 
Fake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewFake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewIRJET Journal
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdfAiblogtech
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
deepfakesbh-200107203532.pdf
deepfakesbh-200107203532.pdfdeepfakesbh-200107203532.pdf
deepfakesbh-200107203532.pdfGeorgiStefanov28
 

Similar to Seminar and Technical Communication on DeepFake Detection (20)

Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?What is Deepfake AI? How it works and How Dangerous Are They?
What is Deepfake AI? How it works and How Dangerous Are They?
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptx
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
How deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastinHow deep learning could revolutionize broadcastin
How deep learning could revolutionize broadcastin
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video Detection
 
Deepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming ConcernsDeepfake Videos on the Rise: Examining the Alarming Concerns
Deepfake Videos on the Rise: Examining the Alarming Concerns
 
VOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradtsVOGIN-IP-lezing-Zeno_ geradts
VOGIN-IP-lezing-Zeno_ geradts
 
Fake Video Creation and Detection: A Review
Fake Video Creation and Detection: A ReviewFake Video Creation and Detection: A Review
Fake Video Creation and Detection: A Review
 
The World of Deepfake AI.pdf
The World of Deepfake AI.pdfThe World of Deepfake AI.pdf
The World of Deepfake AI.pdf
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
deepfakesbh-200107203532.pdf
deepfakesbh-200107203532.pdfdeepfakesbh-200107203532.pdf
deepfakesbh-200107203532.pdf
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Seminar and Technical Communication on DeepFake Detection

  • 1. Seminar and Technical Communication DEEP FAKE
  • 2. Under the guidance of Prof. Swamiraj Jadhav Chinchole Suraj Pramod 20CO018
  • 3. How DeepFake is Created ? Advantages and Disadvantages Introduction 01 02 TABLE OF CONTENTS 03 References Conclusion 04 05
  • 4.  Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing images, audio and video hoaxes.  Deepfake is a technique that uses deep learning algorithms to create fake images usually by swapping a person’s face from a source image into another person’s face in a target image, with a resulting fake image that is sometimes hard to detect. INTRODUCTION
  • 5. How DeepFake is created ?  Deepfakes are created using deep learning methods in which they aim to replace the face of a targeted person by the face of someone else in an image or video.  This technique was improved by developers and online communities to notably create user-friendly applications that are readily available online like FakeApp and FaceSwap.  Deepfake videos are often made using a variational auto-encoder (VAE) and a facial recognition algorithm.  Images are encoded into low-dimensional representations, which are then decoded back into images by trained VAEs.
  • 6. Advantages of DeepFake  Low-Cost Video Campaigns - Marketers using deepfakes can save money on the budgets for their video campaigns using because you don’t need an in-person actor.  Improved Omni Channel Campaigns- Instead of reshooting to fit different purposes for different channels, you can instead just edit or replace video cuts to create a paid social campaign.  Hyper Personalization- Deepfake technology would allow you to alter the skin tone of that model so the customer can experience what the product would look like on their skin tone.
  • 7. Disadvantages of DeepFake  Scamming Increases - Deepfake technology may also increase the number of scams online, you could create false accusations or complaints against companies.  Lack Of Trust Or Ethics Issues - The most obvious impact of deepfake technology is that it can be used to create a fake video, so ascertaining the authenticity of a piece of content has become more difficult.  Spreading Misleading News via Politicians - We are so open to believing what we see or hear in media. And if you see a public figure talking about a topic, you usually would not think if the person is “real” or “fake?”.
  • 8. DeepFake Detection  Deepfake Detection To successfully build a robust neural network capable of detecting complex deepfakes a large dataset of training images is needed. due to social media these kind of images can be easily obtained also companies like google provide large datasets to help accelerate the research in protection against deepfakes . MesoNet used a dataset of more than 5000 images Fig. 6, the images are divided into real images and deepfake images.  After training the CNN with the dataset, the CNN is able to detect deepfake images with over 80 % confidence rate Figure. When exploring current deepfake images available online, deepfake flaws are easily noticeable, deepfake images of a person’s face looking straight ahead to the camera are harder to detect than images where the person’s face is looking at an angle. current deepfake generation techniques aren’t that great at dealing with faces at an angle.
  • 9. Conclusion • People got used to hearing about Deepfakes. Most of the Internet people know what Deepfake is. We do not have to wait for years to reach and use new technologies like old times. • We are in the era of Artificial Intelligence. They can see, they can analyze, and they can fake it. There are good and bad sides of Deepfakes, but the usage area of technology depends on us. We must use it for the greater good. Also, some legal arrangements must be done. • Indeed, all these will take some time to reach a certain point. We will see what kind of world this technology leads us to.
  • 10. References 1. Deepfakes Creation and Detection Using Deep Learning Hady A. Khalil, Shady A. Maged Department o f Mechatronics Engineering, Ain Shams University, Cairo, Egypt hadyayman1996@gmail.com, shady.maged@eng.asu.edu.eg (https://ieeexplore.ieee.org/document/9447642) 2. Deepfake Detection through Deep Learning Deng Pan, Lixian Sun, Rui Wang, Xingjian Zhang, Richard O. Sinnott School of Computing and Information Systems The University of Melbourne, Melbourne, Australia Contact: rsinnott@unimelb.edu.au (https://ieeexplore.ieee.org/document/9302547)