AI Can Turn Hollywood Stars Into Pornographic Actors

The sex industry is an early adpoter of new technololgy as it seeks out new distribution channels and effects. Now, advanced machine learning technology is being used to create fake pornography featuring real actors and pop stars, pasting their faces over existing performers in explicit movies.

The resulting clips, made without consent from the actors whose faces are used, are often indistinguishable from a real film, with only subtly uncanny differences suggesting something is amiss.

A community on the social news site Reddit has spent months creating and sharing the images, which were initially made by a solo hobbyist who went by the name “deepfake”.

When the technology site Motherboard first reported on the user in December last year, they had already made images featuring women including Wonder Woman star, Gal Gadot, Taylor Swift, Scarlett Johansson, and Game of Thrones actor Maisie Williams.

In the months since, videos featuring other celebrities including Star Wars lead Daisy Ridley, Game of Thrones’s Sophie Turner, and Harry Potter star Emma Watson have been posted on the site, which has become the main location for sharing the clips.

While simple face swaps can be done in real time using apps such as Snapchat, the quality of the work posted by deepfake required much more processing time, and a wealth of original material for the AI system to learn from.

But the computer science behind it is widely known, and a number of researchers have already demonstrated similar face swaps carried out using public figures from news footage.

The creation of face-swapped pornography rapidly scaled up in late December, when another Reddit user (going by the name “deepfaceapp”) released a desktop app designed to let consumers create their own clips. While not easy to use, the app takes eight to 12 hours of processing time to make one short clip, the release of the app galvanised the creation of many more images.

“I think the current version of the app is a good start, but I hope to streamline it even more in the coming days and weeks,” deepfakeapp told Motherboard.

“Eventually, I want to improve it to the point where prospective users can simply select a video on their computer, download a neural network correlated to a certain face from a publicly available library, and swap the video with a different face with the press of one button.”

The ease of making extremely plausible fake videos using neural network-based technology has concerned many observers, who fear that it heralds a coming era when even the basic reality of recorded film, image or sound can’t be trusted.

“We already see it doesn’t even take doctored audio or video to make people believe something that isn’t true,” Mandy Jenkins, from social news company Storyful, said and added, “This has the potential to make it worse.”

Guardian:     Deloitte:      CreativeBloq

You Might Also Read: 

Google’s AutoML Offers Machine Learning Models Without Having To Code:

Virtual Reality – Just Getting Started:

 

 

« Facebook & Google Are ‘A Menace to Society’
Spy vs Spy - Cozy Bear Hackers Hacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Tundra Managed Solutions

Tundra Managed Solutions

Tundra Managed Solutions is a comprehensive IT services division offering a wide range of managed solutions designed to meet the diverse needs of businesses.