SlideShare a Scribd company logo
DEEP FAKE
B y:
Riwaz silwal
Pawan bhattarai
Sampada shrestha
Slide 1 of 8
What are DeepFakes?
● The phenomenon gained its name from a user of the
platform Reddit, who went by the name “deepfakes”
(deep learning + fakes).
● This person shared the first deepfakes by placing
unknowing celebrities into adult video clips. This
triggered widespread interest in the Reddit
community and led to an explosion of fake content.
● The first targets of deepfakes were famous people,
including actors (e.g., Emma Watson and Scarlett
Johansson), singers (e.g., Katy Perry) and politicians
(e.g., President Obama)
Slide 2 of 8
How to deepfakes work?
● Deepfakes are commonly created using a specific deep network architecture
known as autoencoder.
● Autoencoders are trained to recognize key characteristics of an input image to
subsequently recreate it as their output. In this process, the network performs
heavy data compression.
● Autoencoders consist of three subparts:
● - an encoder (recognizing key features of an input face)
● - a latent space (representing the face as a compressed version)
● - a decoder (reconstructing the input image with all detail)
Slide 3 of 8
What is autoencoder and how is it used?
● An autoencoder is a type of neural network used for unsupervised learning. It
consists of an encoder and a decoder, and its primary purpose is to learn an
efficient representation (latent space) of the input data. The encoder compresses
the input data into a lower-dimensional space, and the decoder reconstructs the
input data from this compressed representation.
In the context of creating deepfakes, which involve generating realistic-looking
images or videos of one person's face onto another person's body, the use of two
separate autoencoders is not efficient. This is because each autoencoder, when
trained independently on different people, would learn unique features and
representations specific to the individuals it was trained on. These representations
are likely to be incompatible with each other, making it challenging to seamlessly
combine them for the purpose of generating deepfakes.
Slide 4 of 8
The trick
● Training Individual Autoencoders:
Train an autoencoder for each person separately. Each autoencoder
consists of an encoder and a decoder.
The encoder in each autoencoder is responsible for compressing the facial
features of the respective person into a latent space.
● Sharing Encoder Architecture:
Design the encoder part of both autoencoders to have a similar
architecture. This could involve using the same neural network structure
or ensuring that the dimensions of the latent space are compatible.
● Creating Latent Space Representation:
Use the encoder from the first person's autoencoder to encode an image
of that person's face. This results in a compressed latent space
representation.
● Generating Fake Image:
Take the latent space representation obtained from the first person's
encoder and input it into the decoder of the second person's autoencoder.
Slide 5 of 8
The trick
● The shared-latent space
assumption. The two
heterogeneous images of x 1 and
x 2 can be mapped into the same
latent representation z by a
coupling VAE for comparability,
while the latent representations
can be reconstructed into the
original images, respectively, for
completeness.
Slide 6 of 8
Popular example we all have seen
● Popular Indian
actress
Rashmika
Mandanna’s
deepfake that
went viral on
social media not
too long ago.
Slide 7 of 8
Takeaway
● Deepfakes can be used in positive and negative ways to manipulate content for
media, entertainment, marketing, and education.
● Deepfakes are not magic but are produced using techniques from Al that can
generate fake content that is highly believable.
Slide 8 of 8

More Related Content

Similar to deepfake.ppppppppppppppppppppppppppppppppppppppppppt

Computer Quiz (August 2013)
Computer Quiz (August 2013)Computer Quiz (August 2013)
Computer Quiz (August 2013)
Soham Banerjee
 
Building a Thought Controlled Drone
Building a Thought Controlled DroneBuilding a Thought Controlled Drone
Building a Thought Controlled Drone
Jim McKeeth
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Harish Sidhart
 
deep learning evaluation and its advantages.ppt
deep learning evaluation and its advantages.pptdeep learning evaluation and its advantages.ppt
deep learning evaluation and its advantages.ppt
Srisaikudavalli
 
TeQuiz - a Tech Quiz
TeQuiz - a Tech QuizTeQuiz - a Tech Quiz
TeQuiz - a Tech Quiz
Yogesh Ks
 
Dynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open ChallengesDynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open Challenges
bcantrill
 
Introduction to ethereum_public
Introduction to ethereum_publicIntroduction to ethereum_public
Introduction to ethereum_public
antitree
 
Playing with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritzPlaying with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritz
Deepanshu Gajbhiye
 
Software Is Details
Software Is DetailsSoftware Is Details
Software Is Details
Kevlin Henney
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
TimePass720676
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
Felipe Prado
 
Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?
Universitat Politècnica de Catalunya
 
Kraken '16 It quiz final
Kraken '16 It quiz finalKraken '16 It quiz final
Kraken '16 It quiz final
Shyju Chathampalli
 
Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)
Jon Radoff
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
ijtsrd
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
Michael Scovetta
 
Android Developer Meetup
Android Developer MeetupAndroid Developer Meetup
Android Developer Meetup
Medialets
 
Pacman game computer investigatory project
Pacman game computer investigatory projectPacman game computer investigatory project
Pacman game computer investigatory project
meenaloshiniG
 
Robots in Human Environments
Robots in Human EnvironmentsRobots in Human Environments
Robots in Human Environments
Andreas Heil
 

Similar to deepfake.ppppppppppppppppppppppppppppppppppppppppppt (20)

Computer Quiz (August 2013)
Computer Quiz (August 2013)Computer Quiz (August 2013)
Computer Quiz (August 2013)
 
Building a Thought Controlled Drone
Building a Thought Controlled DroneBuilding a Thought Controlled Drone
Building a Thought Controlled Drone
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
deep learning evaluation and its advantages.ppt
deep learning evaluation and its advantages.pptdeep learning evaluation and its advantages.ppt
deep learning evaluation and its advantages.ppt
 
TeQuiz - a Tech Quiz
TeQuiz - a Tech QuizTeQuiz - a Tech Quiz
TeQuiz - a Tech Quiz
 
Dynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open ChallengesDynamic Languages in Production: Progress and Open Challenges
Dynamic Languages in Production: Progress and Open Challenges
 
Introduction to ethereum_public
Introduction to ethereum_publicIntroduction to ethereum_public
Introduction to ethereum_public
 
Playing with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritzPlaying with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritz
 
Software Is Details
Software Is DetailsSoftware Is Details
Software Is Details
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
 
DEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning securityDEF CON 27- JISKA FABIAN - vacuum cleaning security
DEF CON 27- JISKA FABIAN - vacuum cleaning security
 
Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?Machine Learning Overview: How did we get here ?
Machine Learning Overview: How did we get here ?
 
Kraken '16 It quiz final
Kraken '16 It quiz finalKraken '16 It quiz final
Kraken '16 It quiz final
 
Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)Digital Identity and the Evolution of Creativity (MAS.S61)
Digital Identity and the Evolution of Creativity (MAS.S61)
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Don't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade MachinesDon't Give Credit: Hacking Arcade Machines
Don't Give Credit: Hacking Arcade Machines
 
Android Developer Meetup
Android Developer MeetupAndroid Developer Meetup
Android Developer Meetup
 
Pacman game computer investigatory project
Pacman game computer investigatory projectPacman game computer investigatory project
Pacman game computer investigatory project
 
Robots in Human Environments
Robots in Human EnvironmentsRobots in Human Environments
Robots in Human Environments
 

Recently uploaded

DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 

Recently uploaded (20)

DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 

deepfake.ppppppppppppppppppppppppppppppppppppppppppt

  • 1. DEEP FAKE B y: Riwaz silwal Pawan bhattarai Sampada shrestha Slide 1 of 8
  • 2. What are DeepFakes? ● The phenomenon gained its name from a user of the platform Reddit, who went by the name “deepfakes” (deep learning + fakes). ● This person shared the first deepfakes by placing unknowing celebrities into adult video clips. This triggered widespread interest in the Reddit community and led to an explosion of fake content. ● The first targets of deepfakes were famous people, including actors (e.g., Emma Watson and Scarlett Johansson), singers (e.g., Katy Perry) and politicians (e.g., President Obama) Slide 2 of 8
  • 3. How to deepfakes work? ● Deepfakes are commonly created using a specific deep network architecture known as autoencoder. ● Autoencoders are trained to recognize key characteristics of an input image to subsequently recreate it as their output. In this process, the network performs heavy data compression. ● Autoencoders consist of three subparts: ● - an encoder (recognizing key features of an input face) ● - a latent space (representing the face as a compressed version) ● - a decoder (reconstructing the input image with all detail) Slide 3 of 8
  • 4. What is autoencoder and how is it used? ● An autoencoder is a type of neural network used for unsupervised learning. It consists of an encoder and a decoder, and its primary purpose is to learn an efficient representation (latent space) of the input data. The encoder compresses the input data into a lower-dimensional space, and the decoder reconstructs the input data from this compressed representation. In the context of creating deepfakes, which involve generating realistic-looking images or videos of one person's face onto another person's body, the use of two separate autoencoders is not efficient. This is because each autoencoder, when trained independently on different people, would learn unique features and representations specific to the individuals it was trained on. These representations are likely to be incompatible with each other, making it challenging to seamlessly combine them for the purpose of generating deepfakes. Slide 4 of 8
  • 5. The trick ● Training Individual Autoencoders: Train an autoencoder for each person separately. Each autoencoder consists of an encoder and a decoder. The encoder in each autoencoder is responsible for compressing the facial features of the respective person into a latent space. ● Sharing Encoder Architecture: Design the encoder part of both autoencoders to have a similar architecture. This could involve using the same neural network structure or ensuring that the dimensions of the latent space are compatible. ● Creating Latent Space Representation: Use the encoder from the first person's autoencoder to encode an image of that person's face. This results in a compressed latent space representation. ● Generating Fake Image: Take the latent space representation obtained from the first person's encoder and input it into the decoder of the second person's autoencoder. Slide 5 of 8
  • 6. The trick ● The shared-latent space assumption. The two heterogeneous images of x 1 and x 2 can be mapped into the same latent representation z by a coupling VAE for comparability, while the latent representations can be reconstructed into the original images, respectively, for completeness. Slide 6 of 8
  • 7. Popular example we all have seen ● Popular Indian actress Rashmika Mandanna’s deepfake that went viral on social media not too long ago. Slide 7 of 8
  • 8. Takeaway ● Deepfakes can be used in positive and negative ways to manipulate content for media, entertainment, marketing, and education. ● Deepfakes are not magic but are produced using techniques from Al that can generate fake content that is highly believable. Slide 8 of 8