Progress In Deepfake Detection

There has been significant growth in the use of deepfake technology which can create and use fake images, videos, and sounds that often seem completely authentic. Results that were once the preserve of Hollywood studios can now be achieved in minutes on a laptop or even a smartphone at almost zero cost.

Digital manipulations that can either alter or completely synthesise human faces are contributing to fake news and poisoning public trust in digital media.

Criminals  have been early adopters, with the potential for deepfakes  across a range of maliciOus activity, including  fraud, online child sexual exploitation and abuse, intimate image abuse, not to mention attempts at election interference.

The progress of generative AI technologies is getting more realistic and this fake technology is increasing in popularity and creativity and it has the potential of changing important aspects of politics. This growing use of deception has seen fake images and videos make the headlines, and though they are often identified quickly the damage can be done by the time they are taken down, especially in this age of online sharing.

Now, Researchers from China's Nanjing  University of Information Science and Technology have classified  deepfakes Into four main types, each posing a different threat:

  • Identity Swaps
  • Expression Swaps
  • Attribute Manipulations
  • Entire Face Synthesis

They emphasise that the most dangerous types are “identity swaps”, where a person’s face is imposed on another’s, and “expression swaps”, which transfer facial expressions from one individual to another, and that deepfakes, can cause serious harm to the reputation and perception of the person being “deepfaked”.

When it comes to detection, the usual approach is “binary classification”, but it can fail if the video or images are highly compressed or of poor quality that obfuscates facial features and reduces the chance of detection. 

However, even experts in deepfake generation struggle with matching the lighting perfectly to the original media, an issue the researchers focused on in their detection method, which uses a neural network to spot illumination discrepancies.

Not all use of the technology is malicious. In  2022, a video of Ukrainian President Volodymyr Zelensky requesting that his soldiers lay down their weapons in the face of a Russian invasion surfaced online. Today, the tables have been turned as Ukraine's government deploy an AI-generated artifical spokeswoman to deliver information on behalf of its Foreign Ministry. 

IEEE   |   I-HLS   |   Reuters Institute   |    Gov.UK   |    Medium   

Image: Nick Fancher

You Might Also Read:

Facts  About Fake Election Advertising:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Beware The Ghost Stories Of Cyber Space
Israel-Hamas Conflict: The Escalation Of Cyberwarfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.

Cyber Dagger

Cyber Dagger

Cyber Dagger is a cybersecurity company driven by a mission to protect digital infrastructures and close the cybersecurity skills gap.