There Are Ways You Can Detect A Deepfake

According to recent  research, just over half of Britons surveyed (53%) either haven't heard of the term deepfake or have misunderstood its meaning, with only 17% feeling confident in their ability to spot them. Meanwhile, two in five have encountered at least one deepfake in the past six months, as recent reports reveal that over 4k celebrities have fallen victim to deepfakes, and 400 digitally altered images of UK female politicians have appeared on a sexually explicit website.

In light of this, the experts at AIPRM, a company which is focused on enabling users of Generative AI tools like ChatGPT,  have compiled five expert tips for spotting deepfakes and protecting yourself from falling for fabricated content.

1. Verify The Source & Context

Fake news often spreads quicker than true news on X (previously Twitter), a concerning trend given that almost two-thirds of young adults in the UK rely on social media as a regular news source.

Always examine the credibility of the sources behind the content you consume. Is this information coming from a reputable news outlet or a verified official account? If the source is unfamiliar or looks dubious, cross-check the content's authenticity using reliable news organisations or fact-checking platforms like Google Fact Check Tools.

Remember that misinformation often plays on emotional triggers like fear, anger, or outrage to cloud your judgement. When you encounter content that provokes strong emotions, pause and re-assess to ensure you are not being used as a pawn in someone’s game.

2. Observe Facial Expressions & Movements

Deepfakes often falter when trying to replicate the intricate details of facial expressions and natural movements. Key areas to scrutinise include microexpressions around the eyes and mouth. Look out for unnatural blinking patterns, disjointed eye movements, or jerky head motions, and check whether the facial expressions align with the conveyed emotions. Details like the uniformity of teeth, hair texture, and facial structure can also reveal deepfakes.

For example, Chris Umé’s viral deepfake of Tom Cruise performing a coin trick in 2021 was so convincing that 78% of viewers couldn’t distinguish it from real content.

A key give-away is the shape of the face and ears, deepfakes often have slightly off measurements in these areas, with ears being particularly difficult to replicate.

Pausing the video and examining the facial features can help you spot these irregularities. Just as with the infamous deepfake of Obama calling Trump ‘a total and complete dis**t’, how convincing does this look to you?

3. Use Reverse Image & Video Search Tools

Leverage reverse image and video search tools to trace the origins of visual content. Uploading an image to google Reverse Image Search can help identify if it’s AI-generated, manipulated, or being used out of context. For videos, tools like InVID can dissect footage and check for any modifications or previous appearances. These searches allow you to find other copies of the image online, helping you verify its authenticity and uncover potential misuses.

4. Look For Digital Artefacts & Inconsistencies

Deepfakes often reveal themselves through subtle digital flaws like blurriness or unnatural pixelation, especially around the edges of faces or objects. Pay attention to inconsistencies in lighting, shadows, reflections, or even an extra finger, that might indicate manipulation.

Don't forget to check the background for distortions or irregularities that throw off the scene’s overall coherence. The viral deepfake of Pope Francis in a Balenciaga puffer jacket from last year showed clear anomalies, like distorted glasses fused to his cheek and blurred fingers closed around thin air instead of the coffee cup he’s holding, yet still fooled many online.

One fun way to sharpen your detective skills is by practicing with the Which Face is Real game created by professors at the University of Washington. The more you play, the better you’ll become at recognising the patterns of AI-generated content.

5. Check For Audiovisual Synchronisation

Spotting a deepfake often comes down to watching the lips closely. Our mouths form specific shapes when pronouncing certain letters, and these movements are tricky for AI to replicate accurately - nearly a third of deepfake videos struggle to match sounds like M, B and P.  If you notice the speaker’s lip movements don’t quite align with the sounds they’re making, or if there are oddities in tone or pitch, it’s a red flag. A notable example is a deepfake video of Mark Zuckerberg, where subtle mismatches between his speech and lip movements exposed the manipulation.

AI expert and founder of AIPRM, Christoph Cemper, commented "The World Economic Forum has flagged disinformation as a top risk for 2024, with deepfakes emerging as one of the most alarming uses of AI. If you come across a potential deepfake, the best course of action is to refrain from sharing it... The power of a deepfake lies in its ability to spread, and its impact diminishes if it doesn't disseminate widely. If you see someone else sharing it, take a moment to courteously inform them and point them to reliable fact-checking resources, especially if the fake has been debunked. Additionally, leverage reporting features on social media platforms to limit its reach.

“It’s vital that we all play a role in raising awareness - share your experience and insights on how you recognised deepfakes to help others counteract similar threats... y staying vigilant about the content we consume online, we can collectively fight misinformation and safeguard the integrity of our digital environment.”

AIPRM     |     Google

Image: Ideogram

You Might Also Read: 

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Higher Education In Artificial Intelligence & Quantum Computing
AI Is Not a Substitute For Cyber Experts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

Cyber@StationF

Cyber@StationF

Cyber@StationF is an up to 6 months international startup acceleration programme, whose members provide solutions for the Cybersecurity industry.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.