• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

OSINT.org

Intelligence Matters

  • Sponsored Post
    • Make a Contribution
  • Market Intelligence
    • Technologies
    • Startups
    • Events
  • Domain Intelligence
  • About
  • Contact

Deconstructing Deepfakes: How do they work and what are the risks?

October 21, 2020 By admin Leave a Comment

Last month, Microsoft introduced a new deepfake detection tool. Weeks ago, Intel launched another. As more and more companies follow suit and more concerns arise about the use of this technology, we take a look in today’s WatchBlog at how this technology works and the policy questions it raises.

What is a deepfake?
A deepfake is a video, photo, or audio recording that seems real but has been manipulated using artificial intelligence (AI). The underlying technology can replace faces, manipulate facial expressions, synthesize faces, and synthesize speech. These tools are used most often to depict people saying or doing something they never said or did.

How do deepfakes work?
Deepfake videos commonly swap faces or manipulate facial expressions. The image below illustrates how this is done. In face swapping, the face on the left is placed on another person’s body. In facial manipulation, the expressions of the face on the left are imitated by the face on the right.

Face Swapping and Facial Manipulation
Deepfakes rely on artificial neural networks, which are computer systems that recognize patterns in data. Developing a deepfake photo or video typically involves feeding hundreds or thousands of images into the artificial neural network, “training” it to identify and reconstruct patterns—usually faces.

How can you spot a deepfake?
The figure below illustrates some of the ways you can identify a deepfake from the real thing. To learn more about how to identify a deepfake, and to learn about the underlying technology used, check out GAO recent Spotlight on this technology.

What are the benefits of these tools?
Voices and likenesses developed using deepfake technology can be used in movies to achieve a creative effect or maintain a cohesive story when the entertainers themselves are not available. For example, in the latest Star Wars movies, this technology was used to replace characters who had died or to show characters as they appeared in their youth. Retailers have also used this technology to allow customers to try on clothing virtually.

What risks do they pose?
In spite of such benign and legitimate applications like films and commerce, deepfakes are more commonly used for exploitation. Some studies have shown that much of deepfake content online is pornographic, and deepfake pornography disproportionately victimizes women.

There is also concern about potential growth in the use of deepfakes for disinformation. Deepfakes could be used to influence elections or incite civil unrest, or as a weapon of psychological warfare. They could also lead to disregard of legitimate evidence of wrongdoing and, more generally, undermine public trust.

What can be done to protect people?
As discussed above, researchers and internet companies, such as Microsoft and Intel, have experimented with several methods to detect deepfakes. These methods typically use AI to analyze videos for digital artifacts or details that deepfakes fail to imitate realistically, such as blinking or facial tics. But even with these interventions by tech companies, there are a number of policy questions about deepfakes that still need to be answered. For example:

What can be done to educate the public about deepfakes to protect them and help them identify real from fake?
What rights do individuals have to privacy when it comes to the use of deepfake technology?
What First Amendment protections do creators of deepfake videos, photos, and more have?
Deepfakes are powerful tools that can be used for exploitation and disinformation. With advances making them more difficult to detect, these technologies require a deeper look.

Sources:
SCIENCE & TECH SPOTLIGHT: DEEPFAKES
Deepfake Technology, Market Analysis

Filed Under: Workflow

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Market Analysis

DevOps and Agile: Integrating Development and Operations
China’s Use of Golden Shares: From Reducing State Role to Quietly Controlling Tech Giants
Why Amazon Acquired One Medical: Disrupting the Healthcare Industry with Technology-Enabled Care
The End of an Era: Why China is No Longer Viable as the World’s Factory
Cloudflare’s FedRAMP authorization opens up a huge market opportunity in the US government sector
Datadog’s strong financial results for the fourth quarter and fiscal year 2022 provide a solid case for a Buy recommendation
Cisco: Struggling to find new avenues of growth

Opinion

China’s Pursuit of an Economy of National Greatness: Ambitions, Risks, and Criticisms
Why VPNs are Essential for Those Living in Non-Democratic Countries
Massive Protests in Israel Against Proposed Judicial Reforms as Lawmakers Prepare for Knesset Vote
Putin has overestimated his negotiating power, repeatedly
All autocratic governments fail to adapt
The Perfect Storm: A Hypothetical Scenario of Turkey’s Economic Collapse
Why protests over depictions of Mohammed are completely unjustified

Secondary Sidebar

Market Research Media

Agile Leadership: Leading Agile Teams for Success
Chinese Brands Reach New Heights of Popularity in the West Amid Growing Political Tensions
Unrestricted Streaming: How VPNs Can Enhance Media Consumption Experience
How the world’s biggest companies have built and defended their moats
Virtual Learning Environments: A Game-Changer in Education?

Dossier

Agile Coaching: The Key to Successful Agile Implementation
GameTech 2023, GameDev Conference, March 3, 2023
AI is Disrupting Software: Key Takeaways from Tech Summit 2023
indie Semiconductor has entered into a definitive agreement to purchase GEO Semiconductor
Why UK faces chronic labor shortages

Footer

Recent Posts

  • Importance of Communication in Agile Development
  • Unveiling the Power of VPNs: How OSINT Professionals Can Stay Anonymous and Secure Online
  • Vexcel Data Program, the world’s largest aerial imagery program, has announced plans to expand its high-resolution coverage in urban areas
  • How AI will change OSINT
  • China’s Global Expansion: The Quest for Control Over Critical Infrastructure
  • Growing Discontent Among Earthquake Survivors in Turkey Over Government’s Handling of Crisis
  • New app detecting and reporting changes in land use
  • The Perfect Storm: A Not-So-Hypothetical Scenario of Russian Economy Collapse
  • The United States government is reportedly considering new sanctions on Chinese surveillance technology companies
  • The Rise of Biometric Technologies: Implications for Security and Civil Liberties

Analysis

New Report: 77 Million Adults Do Not Have Dental Insurance
How to address manageable upstream problems before they become critical
Rates Shock Puts The Global Economy On A Slower Path, Says Report
Average Age of Vehicles in the US Increases to 12.2 years, according to S&P Global Mobility
Agile Planning and Estimation Techniques

VPNW

Integrating VPN functionality into a mobile app
AI-Powered VPNs: The Future of Online Privacy and Security
Building a simple VPN client with Python
The role of VPNs in protecting IoT (Internet of Things) devices and networks
The Future of VPN Technology: What to Expect

OPINT

Market Research Digest
Set shorter deadlines
Domains of the day: taxware.io
Pfizer and BioNTech to Provide U.S. Government with an Additional 200 Million Doses of COVID-19 Vaccine to Help Meet Continued Need for Vaccine Supply in the U.S.
FDA Awards REI System $400M SIRCE IT Modernization Contract

Calendarial

Each year, on 17 January, we honour the memory of Raoul Wallenberg
UKRAINE HOUSE DAVOS OPENS FROM JAN 16-19 IN DAVOS
ABF Freight to Host Dayton-Area Hiring Event, November 12, 2022, Dayton
The OurCrowd Global Investor Summit, the largest investor event in the Middle East, is scheduled to take place in Jerusalem on February 15, 2023
The Advanced Imaging Society’s 13th Annual Lumiere Awards were held on February 10th, 2023 at the Beverly Hills Hotel

Copyright © 2022 OSINT.org

Technologies, Market Analysis & Market Research and Exclusive Domains

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT