Progress In Deepfake Detection

There has been significant growth in the use of deepfake technology which can create and use fake images, videos, and sounds that often seem completely authentic. Results that were once the preserve of Hollywood studios can now be achieved in minutes on a laptop or even a smartphone at almost zero cost.

Digital manipulations that can either alter or completely synthesise human faces are contributing to fake news and poisoning public trust in digital media.

Criminals  have been early adopters, with the potential for deepfakes  across a range of maliciOus activity, including  fraud, online child sexual exploitation and abuse, intimate image abuse, not to mention attempts at election interference.

The progress of generative AI technologies is getting more realistic and this fake technology is increasing in popularity and creativity and it has the potential of changing important aspects of politics. This growing use of deception has seen fake images and videos make the headlines, and though they are often identified quickly the damage can be done by the time they are taken down, especially in this age of online sharing.

Now, Researchers from China's Nanjing  University of Information Science and Technology have classified  deepfakes Into four main types, each posing a different threat:

  • Identity Swaps
  • Expression Swaps
  • Attribute Manipulations
  • Entire Face Synthesis

They emphasise that the most dangerous types are “identity swaps”, where a person’s face is imposed on another’s, and “expression swaps”, which transfer facial expressions from one individual to another, and that deepfakes, can cause serious harm to the reputation and perception of the person being “deepfaked”.

When it comes to detection, the usual approach is “binary classification”, but it can fail if the video or images are highly compressed or of poor quality that obfuscates facial features and reduces the chance of detection. 

However, even experts in deepfake generation struggle with matching the lighting perfectly to the original media, an issue the researchers focused on in their detection method, which uses a neural network to spot illumination discrepancies.

Not all use of the technology is malicious. In  2022, a video of Ukrainian President Volodymyr Zelensky requesting that his soldiers lay down their weapons in the face of a Russian invasion surfaced online. Today, the tables have been turned as Ukraine's government deploy an AI-generated artifical spokeswoman to deliver information on behalf of its Foreign Ministry. 

IEEE   |   I-HLS   |   Reuters Institute   |    Gov.UK   |    Medium   

Image: Nick Fancher

You Might Also Read:

Facts  About Fake Election Advertising:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Beware The Ghost Stories Of Cyber Space
Israel-Hamas Conflict: The Escalation Of Cyberwarfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.

SquareX

SquareX

Squarex secures your online activities without compromising productivity.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.