There Are Ways You Can Detect A Deepfake

According to recent  research, just over half of Britons surveyed (53%) either haven't heard of the term deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them. Meanwhile, two in five have encountered at least one deepfake in the past six months, as recent reports reveal that over 4k celebrities have fallen victim to deepfakes, and 400 digitally altered images of UK female politicians have appeared on a sexually explicit website.

In light of this, the experts at AIPRM, a company which is focused on enabling users of Generative AI tools like ChatGPT,  have compiled five expert tips for spotting deepfakes and protecting yourself from falling for fabricated content.

1. Verify The Source & Context

Fake news often spreads quicker than true news on X (previously Twitter), a concerning trend given that almost two-thirds of young adults in the UK rely on social media as a regular news source.

Always examine the credibility of the sources behind the content you consume. Is this information coming from a reputable news outlet or a verified official account? If the source is unfamiliar or looks dubious, cross-check the content's authenticity using reliable news organisations or fact-checking platforms like Google Fact Check Tools.

Remember that misinformation often plays on emotional triggers like fear, anger, or outrage to cloud your judgement. When you encounter content that provokes strong emotions, pause and re-assess to ensure you are not being used as a pawn in someone’s game.

2. Observe Facial Expressions & Movements

Deepfakes often falter when trying to replicate the intricate details of facial expressions and natural movements. Key areas to scrutinise include microexpressions around the eyes and mouth. Look out for unnatural blinking patterns, disjointed eye movements, or jerky head motions, and check whether the facial expressions align with the conveyed emotions. Details like the uniformity of teeth, hair texture, and facial structure can also reveal deepfakes.

For example, Chris Umé’s viral deepfake of Tom Cruise performing a coin trick in 2021 was so convincing that 78% of viewers couldn’t distinguish it from real content.

A key give-away is the shape of the face and ears, deepfakes often have slightly off measurements in these areas, with ears being particularly difficult to replicate.

Pausing the video and examining the facial features can help you spot these irregularities. Just as with the infamous deepfake of Obama calling Trump ‘a total and complete dis**t’, how convincing does this look to you?

3. Use Reverse Image & Video Search Tools

Leverage reverse image and video search tools to trace the origins of visual content. Uploading an image to google Reverse Image Search can help identify if it’s AI-generated, manipulated, or being used out of context. For videos, tools like InVID can dissect footage and check for any modifications or previous appearances. These searches allow you to find other copies of the image online, helping you verify its authenticity and uncover potential misuses.

4. Look For Digital Artefacts & Inconsistencies

Deepfakes often reveal themselves through subtle digital flaws like blurriness or unnatural pixelation, especially around the edges of faces or objects. Pay attention to inconsistencies in lighting, shadows, reflections, or even an extra finger, that might indicate manipulation.

Don't forget to check the background for distortions or irregularities that throw off the scene’s overall coherence. The viral deepfake of Pope Francis in a Balenciaga puffer jacket from last year showed clear anomalies, like distorted glasses fused to his cheek and blurred fingers closed around thin air instead of the coffee cup he’s holding, yet still fooled many online.

One fun way to sharpen your detective skills is by practicing with the Which Face is Real game created by professors at the University of Washington. The more you play, the better you’ll become at recognising the patterns of AI-generated content.

5. Check For Audiovisual Synchronisation

Spotting a deepfake often comes down to watching the lips closely. Our mouths form specific shapes when pronouncing certain letters, and these movements are tricky for AI to replicate accurately - nearly a third of deepfake videos struggle to match sounds like M, B and P.  If you notice the speaker’s lip movements don’t quite align with the sounds they’re making, or if there are oddities in tone or pitch, it’s a red flag. A notable example is a deepfake video of Mark Zuckerberg, where subtle mismatches between his speech and lip movements exposed the manipulation.

AI expert and founder of AIPRM, Christoph Cemper, commented "The World Economic Forum has flagged disinformation as a top risk for 2024, with deepfakes emerging as one of the most alarming uses of AI. If you come across a potential deepfake, the best course of action is to refrain from sharing it... The power of a deepfake lies in its ability to spread, and its impact diminishes if it doesn't disseminate widely. If you see someone else sharing it, take a moment to courteously inform them and point them to reliable fact-checking resources, especially if the fake has been debunked. Additionally, leverage reporting features on social media platforms to limit its reach.

“It’s vital that we all play a role in raising awareness - share your experience and insights on how you recognised deepfakes to help others counteract similar threats... y staying vigilant about the content we consume online, we can collectively fight misinformation and safeguard the integrity of our digital environment.”

AIPRM     |     Google

Image: Ideogram

You Might Also Read: 

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Higher Education In Artificial Intelligence & Quantum Computing
AI Is No Substitute For Cyber Experts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

Adsigo

Adsigo

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security.