AI Can Turn Hollywood Stars Into Pornographic Actors

The sex industry is an early adpoter of new technololgy as it seeks out new distribution channels and effects. Now, advanced machine learning technology is being used to create fake pornography featuring real actors and pop stars, pasting their faces over existing performers in explicit movies.

The resulting clips, made without consent from the actors whose faces are used, are often indistinguishable from a real film, with only subtly uncanny differences suggesting something is amiss.

A community on the social news site Reddit has spent months creating and sharing the images, which were initially made by a solo hobbyist who went by the name “deepfake”.

When the technology site Motherboard first reported on the user in December last year, they had already made images featuring women including Wonder Woman star, Gal Gadot, Taylor Swift, Scarlett Johansson, and Game of Thrones actor Maisie Williams.

In the months since, videos featuring other celebrities including Star Wars lead Daisy Ridley, Game of Thrones’s Sophie Turner, and Harry Potter star Emma Watson have been posted on the site, which has become the main location for sharing the clips.

While simple face swaps can be done in real time using apps such as Snapchat, the quality of the work posted by deepfake required much more processing time, and a wealth of original material for the AI system to learn from.

But the computer science behind it is widely known, and a number of researchers have already demonstrated similar face swaps carried out using public figures from news footage.

The creation of face-swapped pornography rapidly scaled up in late December, when another Reddit user (going by the name “deepfaceapp”) released a desktop app designed to let consumers create their own clips. While not easy to use, the app takes eight to 12 hours of processing time to make one short clip, the release of the app galvanised the creation of many more images.

“I think the current version of the app is a good start, but I hope to streamline it even more in the coming days and weeks,” deepfakeapp told Motherboard.

“Eventually, I want to improve it to the point where prospective users can simply select a video on their computer, download a neural network correlated to a certain face from a publicly available library, and swap the video with a different face with the press of one button.”

The ease of making extremely plausible fake videos using neural network-based technology has concerned many observers, who fear that it heralds a coming era when even the basic reality of recorded film, image or sound can’t be trusted.

“We already see it doesn’t even take doctored audio or video to make people believe something that isn’t true,” Mandy Jenkins, from social news company Storyful, said and added, “This has the potential to make it worse.”

Guardian:     Deloitte:      CreativeBloq

You Might Also Read: 

Google’s AutoML Offers Machine Learning Models Without Having To Code:

Virtual Reality – Just Getting Started:

 

 

« Facebook & Google Are ‘A Menace to Society’
Spy vs Spy - Cozy Bear Hackers Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.