There Are Ways You Can Detect A Deepfake

According to recent  research, just over half of Britons surveyed (53%) either haven't heard of the term deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them. Meanwhile, two in five have encountered at least one deepfake in the past six months, as recent reports reveal that over 4k celebrities have fallen victim to deepfakes, and 400 digitally altered images of UK female politicians have appeared on a sexually explicit website.

In light of this, the experts at AIPRM, a company which is focused on enabling users of Generative AI tools like ChatGPT,  have compiled five expert tips for spotting deepfakes and protecting yourself from falling for fabricated content.

1. Verify The Source & Context

Fake news often spreads quicker than true news on X (previously Twitter), a concerning trend given that almost two-thirds of young adults in the UK rely on social media as a regular news source.

Always examine the credibility of the sources behind the content you consume. Is this information coming from a reputable news outlet or a verified official account? If the source is unfamiliar or looks dubious, cross-check the content's authenticity using reliable news organisations or fact-checking platforms like Google Fact Check Tools.

Remember that misinformation often plays on emotional triggers like fear, anger, or outrage to cloud your judgement. When you encounter content that provokes strong emotions, pause and re-assess to ensure you are not being used as a pawn in someone’s game.

2. Observe Facial Expressions & Movements

Deepfakes often falter when trying to replicate the intricate details of facial expressions and natural movements. Key areas to scrutinise include microexpressions around the eyes and mouth. Look out for unnatural blinking patterns, disjointed eye movements, or jerky head motions, and check whether the facial expressions align with the conveyed emotions. Details like the uniformity of teeth, hair texture, and facial structure can also reveal deepfakes.

For example, Chris Umé’s viral deepfake of Tom Cruise performing a coin trick in 2021 was so convincing that 78% of viewers couldn’t distinguish it from real content.

A key give-away is the shape of the face and ears, deepfakes often have slightly off measurements in these areas, with ears being particularly difficult to replicate.

Pausing the video and examining the facial features can help you spot these irregularities. Just as with the infamous deepfake of Obama calling Trump ‘a total and complete dis**t’, how convincing does this look to you?

3. Use Reverse Image & Video Search Tools

Leverage reverse image and video search tools to trace the origins of visual content. Uploading an image to google Reverse Image Search can help identify if it’s AI-generated, manipulated, or being used out of context. For videos, tools like InVID can dissect footage and check for any modifications or previous appearances. These searches allow you to find other copies of the image online, helping you verify its authenticity and uncover potential misuses.

4. Look For Digital Artefacts & Inconsistencies

Deepfakes often reveal themselves through subtle digital flaws like blurriness or unnatural pixelation, especially around the edges of faces or objects. Pay attention to inconsistencies in lighting, shadows, reflections, or even an extra finger, that might indicate manipulation.

Don't forget to check the background for distortions or irregularities that throw off the scene’s overall coherence. The viral deepfake of Pope Francis in a Balenciaga puffer jacket from last year showed clear anomalies, like distorted glasses fused to his cheek and blurred fingers closed around thin air instead of the coffee cup he’s holding, yet still fooled many online.

One fun way to sharpen your detective skills is by practicing with the Which Face is Real game created by professors at the University of Washington. The more you play, the better you’ll become at recognising the patterns of AI-generated content.

5. Check For Audiovisual Synchronisation

Spotting a deepfake often comes down to watching the lips closely. Our mouths form specific shapes when pronouncing certain letters, and these movements are tricky for AI to replicate accurately - nearly a third of deepfake videos struggle to match sounds like M, B and P.  If you notice the speaker’s lip movements don’t quite align with the sounds they’re making, or if there are oddities in tone or pitch, it’s a red flag. A notable example is a deepfake video of Mark Zuckerberg, where subtle mismatches between his speech and lip movements exposed the manipulation.

AI expert and founder of AIPRM, Christoph Cemper, commented "The World Economic Forum has flagged disinformation as a top risk for 2024, with deepfakes emerging as one of the most alarming uses of AI. If you come across a potential deepfake, the best course of action is to refrain from sharing it... The power of a deepfake lies in its ability to spread, and its impact diminishes if it doesn't disseminate widely. If you see someone else sharing it, take a moment to courteously inform them and point them to reliable fact-checking resources, especially if the fake has been debunked. Additionally, leverage reporting features on social media platforms to limit its reach.

“It’s vital that we all play a role in raising awareness - share your experience and insights on how you recognised deepfakes to help others counteract similar threats... y staying vigilant about the content we consume online, we can collectively fight misinformation and safeguard the integrity of our digital environment.”

AIPRM     |     Google

Image: Ideogram

You Might Also Read: 

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Higher Education In Artificial Intelligence & Quantum Computing
AI Is No Substitute For Cyber Experts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.