AI Can Turn Hollywood Stars Into Pornographic Actors

The sex industry is an early adpoter of new technololgy as it seeks out new distribution channels and effects. Now, advanced machine learning technology is being used to create fake pornography featuring real actors and pop stars, pasting their faces over existing performers in explicit movies.

The resulting clips, made without consent from the actors whose faces are used, are often indistinguishable from a real film, with only subtly uncanny differences suggesting something is amiss.

A community on the social news site Reddit has spent months creating and sharing the images, which were initially made by a solo hobbyist who went by the name “deepfake”.

When the technology site Motherboard first reported on the user in December last year, they had already made images featuring women including Wonder Woman star, Gal Gadot, Taylor Swift, Scarlett Johansson, and Game of Thrones actor Maisie Williams.

In the months since, videos featuring other celebrities including Star Wars lead Daisy Ridley, Game of Thrones’s Sophie Turner, and Harry Potter star Emma Watson have been posted on the site, which has become the main location for sharing the clips.

While simple face swaps can be done in real time using apps such as Snapchat, the quality of the work posted by deepfake required much more processing time, and a wealth of original material for the AI system to learn from.

But the computer science behind it is widely known, and a number of researchers have already demonstrated similar face swaps carried out using public figures from news footage.

The creation of face-swapped pornography rapidly scaled up in late December, when another Reddit user (going by the name “deepfaceapp”) released a desktop app designed to let consumers create their own clips. While not easy to use, the app takes eight to 12 hours of processing time to make one short clip, the release of the app galvanised the creation of many more images.

“I think the current version of the app is a good start, but I hope to streamline it even more in the coming days and weeks,” deepfakeapp told Motherboard.

“Eventually, I want to improve it to the point where prospective users can simply select a video on their computer, download a neural network correlated to a certain face from a publicly available library, and swap the video with a different face with the press of one button.”

The ease of making extremely plausible fake videos using neural network-based technology has concerned many observers, who fear that it heralds a coming era when even the basic reality of recorded film, image or sound can’t be trusted.

“We already see it doesn’t even take doctored audio or video to make people believe something that isn’t true,” Mandy Jenkins, from social news company Storyful, said and added, “This has the potential to make it worse.”

Guardian:     Deloitte:      CreativeBloq

You Might Also Read: 

Google’s AutoML Offers Machine Learning Models Without Having To Code:

Virtual Reality – Just Getting Started:

 

 

« Facebook & Google Are ‘A Menace to Society’
Spy vs Spy - Cozy Bear Hackers Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

CERT-GH

CERT-GH

CERT-GH is the national Computer Emergency Response Team for Ghana.

WhiteSource

WhiteSource

WhiteSource is the only all-in-one security, compliance, and reporting solution for managing open source components.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.