Progress In Deepfake Detection

There has been significant growth in the use of deepfake technology which can create and use fake images, videos, and sounds that often seem completely authentic. Results that were once the preserve of Hollywood studios can now be achieved in minutes on a laptop or even a smartphone at almost zero cost.

Digital manipulations that can either alter or completely synthesise human faces are contributing to fake news and poisoning public trust in digital media.

Criminals  have been early adopters, with the potential for deepfakes  across a range of maliciOus activity, including  fraud, online child sexual exploitation and abuse, intimate image abuse, not to mention attempts at election interference.

The progress of generative AI technologies is getting more realistic and this fake technology is increasing in popularity and creativity and it has the potential of changing important aspects of politics. This growing use of deception has seen fake images and videos make the headlines, and though they are often identified quickly the damage can be done by the time they are taken down, especially in this age of online sharing.

Now, Researchers from China's Nanjing  University of Information Science and Technology have classified  deepfakes Into four main types, each posing a different threat:

  • Identity Swaps
  • Expression Swaps
  • Attribute Manipulations
  • Entire Face Synthesis

They emphasise that the most dangerous types are “identity swaps”, where a person’s face is imposed on another’s, and “expression swaps”, which transfer facial expressions from one individual to another, and that deepfakes, can cause serious harm to the reputation and perception of the person being “deepfaked”.

When it comes to detection, the usual approach is “binary classification”, but it can fail if the video or images are highly compressed or of poor quality that obfuscates facial features and reduces the chance of detection. 

However, even experts in deepfake generation struggle with matching the lighting perfectly to the original media, an issue the researchers focused on in their detection method, which uses a neural network to spot illumination discrepancies.

Not all use of the technology is malicious. In  2022, a video of Ukrainian President Volodymyr Zelensky requesting that his soldiers lay down their weapons in the face of a Russian invasion surfaced online. Today, the tables have been turned as Ukraine's government deploy an AI-generated artifical spokeswoman to deliver information on behalf of its Foreign Ministry. 

IEEE   |   I-HLS   |   Reuters Institute   |    Gov.UK   |    Medium   

Image: Nick Fancher

You Might Also Read:

Facts  About Fake Election Advertising:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Beware The Ghost Stories Of Cyber Space
Israel-Hamas Conflict: The Escalation Of Cyberwarfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.