Progress In Deepfake Detection

There has been significant growth in the use of deepfake technology which can create and use fake images, videos, and sounds that often seem completely authentic. Results that were once the preserve of Hollywood studios can now be achieved in minutes on a laptop or even a smartphone at almost zero cost.

Digital manipulations that can either alter or completely synthesise human faces are contributing to fake news and poisoning public trust in digital media.

Criminals  have been early adopters, with the potential for deepfakes  across a range of maliciOus activity, including  fraud, online child sexual exploitation and abuse, intimate image abuse, not to mention attempts at election interference.

The progress of generative AI technologies is getting more realistic and this fake technology is increasing in popularity and creativity and it has the potential of changing important aspects of politics. This growing use of deception has seen fake images and videos make the headlines, and though they are often identified quickly the damage can be done by the time they are taken down, especially in this age of online sharing.

Now, Researchers from China's Nanjing  University of Information Science and Technology have classified  deepfakes Into four main types, each posing a different threat:

  • Identity Swaps
  • Expression Swaps
  • Attribute Manipulations
  • Entire Face Synthesis

They emphasise that the most dangerous types are “identity swaps”, where a person’s face is imposed on another’s, and “expression swaps”, which transfer facial expressions from one individual to another, and that deepfakes, can cause serious harm to the reputation and perception of the person being “deepfaked”.

When it comes to detection, the usual approach is “binary classification”, but it can fail if the video or images are highly compressed or of poor quality that obfuscates facial features and reduces the chance of detection. 

However, even experts in deepfake generation struggle with matching the lighting perfectly to the original media, an issue the researchers focused on in their detection method, which uses a neural network to spot illumination discrepancies.

Not all use of the technology is malicious. In  2022, a video of Ukrainian President Volodymyr Zelensky requesting that his soldiers lay down their weapons in the face of a Russian invasion surfaced online. Today, the tables have been turned as Ukraine's government deploy an AI-generated artifical spokeswoman to deliver information on behalf of its Foreign Ministry. 

IEEE   |   I-HLS   |   Reuters Institute   |    Gov.UK   |    Medium   

Image: Nick Fancher

You Might Also Read:

Facts  About Fake Election Advertising:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Beware The Ghost Stories Of Cyber Space
Israel-Hamas Conflict: The Escalation Of Cyberwarfare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.