Google Creates Video Tools To Fight Deepfakes

Google has released a database of 3,000 deepfakes, which are videos that use artificial intelligence to alter faces, or to make people say things they never did. The videos are of actors and use a variety of publicly available tools to alter their faces. 

The search giant hopes it will help researchers build the tools needed to take down "harmful" fake videos. There are fears such videos could be used to promote false conspiracy theories and propaganda.

Deepfake technology takes video and audio clips of real people, often politicians or celebrities, and uses artificial-intelligence techniques to alter them in some way, for instance putting words in their mouth or transposing their head on to body of an actor in pornography.

Since their first appearance in 2017, many open-source methods of generating deepfake clips have emerged. Via  their AI Blog Google has said, "Since the field is moving quickly, we'll add to this dataset as deepfake technology evolves over time and we'll continue to work with partners in this space.... We firmly believe in supporting a thriving research community around mitigating potential harms from misuses of synthetic media."

The database will be incorporated into work to combat deepfakes, at the Technical University of Munich and the University of Naples Federico II. The universities have created a similar database using four common face-manipulation techniques on nearly 1,000 YouTube videos.

It is hoped both these databases will be used to train automated detection tools to spot fakery.Earlier this month, Facebook announced it had set up a $10m (£8.1m) fund to find better ways to detect deepfakes.Its own chief executive,

Mark Zuckerberg, has been a victim of such trickery, when a manipulated video appeared to show him credit a secretive organisation for the success of the social network. Deepfake technology hit the headlines in 2017, when University of Washington researchers released a paper describing how they had created a fake video of President Barack Obama.

Google Blog:        GitHub:          BBC:       

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

British Army Reshapes Itself To Fight Cyberwars:

 

« Police Location App Used By Hong Kong Protesters Deleted
Iranian Hackers Deploy New Spear-Phishing Techniques »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Persona Identities

Persona Identities

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.