Google Creates Video Tools To Fight Deepfakes

Google has released a database of 3,000 deepfakes, which are videos that use artificial intelligence to alter faces, or to make people say things they never did. The videos are of actors and use a variety of publicly available tools to alter their faces. 

The search giant hopes it will help researchers build the tools needed to take down "harmful" fake videos. There are fears such videos could be used to promote false conspiracy theories and propaganda.

Deepfake technology takes video and audio clips of real people, often politicians or celebrities, and uses artificial-intelligence techniques to alter them in some way, for instance putting words in their mouth or transposing their head on to body of an actor in pornography.

Since their first appearance in 2017, many open-source methods of generating deepfake clips have emerged. Via  their AI Blog Google has said, "Since the field is moving quickly, we'll add to this dataset as deepfake technology evolves over time and we'll continue to work with partners in this space.... We firmly believe in supporting a thriving research community around mitigating potential harms from misuses of synthetic media."

The database will be incorporated into work to combat deepfakes, at the Technical University of Munich and the University of Naples Federico II. The universities have created a similar database using four common face-manipulation techniques on nearly 1,000 YouTube videos.

It is hoped both these databases will be used to train automated detection tools to spot fakery.Earlier this month, Facebook announced it had set up a $10m (£8.1m) fund to find better ways to detect deepfakes.Its own chief executive,

Mark Zuckerberg, has been a victim of such trickery, when a manipulated video appeared to show him credit a secretive organisation for the success of the social network. Deepfake technology hit the headlines in 2017, when University of Washington researchers released a paper describing how they had created a fake video of President Barack Obama.

Google Blog:        GitHub:          BBC:       

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

British Army Reshapes Itself To Fight Cyberwars:

 

« Police Location App Used By Hong Kong Protesters Deleted
Iranian Hackers Deploy New Spear-Phishing Techniques »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Business Hive Vilnius (BHV)

Business Hive Vilnius (BHV)

BHV is one of the oldest startup incubator and technology hubs in the Baltics, primarily focused on hardware, security, blockchain, AI, fintech and enterprise software.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.

Nyx Technology

Nyx Technology

Nyx Technology is your dedicated partner in navigating the intricate world of cyber security, providing you with cutting-edge threat intelligence to safeguard your digital assets.