Deepfake Technology
Deepfake Technology
net/publication/382493119
Deepfake Technology
CITATIONS READS
0 135
1 author:
SEE PROFILE
All content following this page was uploaded by Udari Eranga Harshani on 24 July 2024.
Deepfake Technology
S. U. E. Harshani
IT22903624
Y2.S1.WE.CS.01
MALABE CAMPUS few steps to make a face-swap video. First, you run thousands of ace shot
1|Page
Table of Content
3.4 What Are the Best Deepfake Apps and Websites? ............................................................. 13
3.8 Examples for deepfakes from the current and past few years ............................................. 19
2|Page
01.Abstract
Deepfake threats have become as a severe problem within the area of cyber security in a period
characterized by unsurpassed
technical breakthroughs. Deepfake
threats use artificial
intelligence/machine learning
(AI/ML) to create credible, realistic
movies, photos, audio, and text of
events that never happened.
Deepfakes, deceptive synthetic media
produced through the power of
artificial intelligence, have rapidly
evolved to pose a multifaceted threat
to individuals, organizations, and
society at large. In this report I
decided to describe the emerging cybersecurity threat posed by deepfake technology historical
development of deepfake technology, its current impact on cyber security, and predict future
developments. I describe to the complex architecture of GANs - a key topic in computer science
and a cornerstone of AI face swap technologies under the deepfake technology. From
understanding the adversarial competition between the generator and discriminator in neural
networks to discussing the broad applications of GANs.
3|Page
02.Introduction
Deepfakes' greatest threat is their capacity to share misleading information that looks to come
from sources that are trustworthy. For example, in 2022, a deepfake video of Ukrainian
President Volodymyr Zelenskyy pleading with his forces to surrender was published.Concerns
were also raised about the possibility of election meddling and political misinformation. While
deepfakes stand for major security risks, they also have legal applications, such as video game
audio and entertainment, as well as customer care and caller response applications, such as call
forwarding and receptionist services.
The name "deepfake" is formed from the terms "deep learning" and, of course, "fake". Deepfake
is an amalgamation of the words "deep" and "fake." It involves phoney material that is so
identical to the real thing that it cannot be distinguished.
4|Page
2.1 What is deepfake technology?
Technology has made our lives easier, but it additionally brought about a number of unintended
effects, one of which is deepfake technology. Deepfake technology is a type of artificial
intelligence (AI) that use machine learning algorithms to generate realistic digital media with the
intent of deceiving viewers. Deepfakes entail the use of algorithms to edit or substitute existing
information, such as images, videos, or audio recordings, to create a false appearance of reality.
Deepfakes can be made for a variety of reasons, including amusement, political propaganda, and
criminality.
Deepfake technology, may be used to make lifelike films of individuals doing or saying things
they never actually did or said. This is accomplished by analyzing and mimicking the motions
and facial expressions of the individual in the original video, and then modifying the film to
generate a new, synthetic version that looks to be real.
For many years, people have been experimenting with video and audio editing. For example,
graphic editing techniques are used in films to smooth over flaws and people have been using
picture editing tools to create memes since the internet's beginning. Deepfakes are an AI-
powered extension of this that can be used to deceive clients.
They may also employ modern innovations such as auto encoders and synthetic adversarial
systems. Deep learning algorithms can be applied by threat actors to target specific
characteristics of a person's resemblance, such as their facial structure or body language. It
produces extremely convincing impersonations that hackers are attempting to exploit.
5|Page
03.Evolution of the topic
Photo manipulation was invented in the nineteenth century and quickly adapted to motion films.
Technology advanced steadily during the twentieth century, and even faster with the introduction
of digital video. Beginning in the 1990s, researchers at academic institutions and then amateurs
in internet forums developed deepfake technology. Deepfakes evolved in early 2010s academic
research on neural networks and Generative Adversarial Networks (GANs).
One of the key milestones in the evolution of deepfake technology was the emergence of face-
swapping applications, which allowed users to superimpose faces onto video clips with relative
ease. Face-swapping applications, which let users effortlessly superimpose faces onto video
material, were a significant step forward in the development of deepfake technology. This
increased the technology's popularity while also raising concerns about its potential misuse.
Deepfake applications quickly developed to include vocal synthesis and full-body manipulation,
making fake film more difficult to detect.
Deepfake technology has grown to the point that it can convincingly impersonate anybody,
particularly famous people, and leaders, prompting concerns about the technology's potential for
disinformation campaigns, fraud, and data breaches.
In the evolution of deepfake technology we can consider Initial Limitations, Advancements in
AI, the development of open-source tools and datasets, the emergence of face transfer
applications, the expansion to voice synthesis, full body manipulation, current status and
concerns.
Deepfake technology has various constraints in its early stages. Quality and technical knowledge
is an example of that. Early deepfakes were of inferior quality and usually consisted of visible
artefacts, which made them less convincing. In the past, deepfakes required advanced technical
knowledge in machine learning and deep neural networks, limiting the amount of people who
could create them.
6|Page
Considering the advancement of AI, fake technology has rapidly advanced due to significant
progress in artificial intelligence and deep learning. Researchers developed more sophisticated
algorithms, improved neural network architectures, and refined training methods, leading to the
highest quality deepfakes.
Considering the open-source tools and emergence of face-swapping applications, the availability
of open-source deepfake technologies and access to massive datasets of genuine photos and
videos aided the advancement of the technology. Open-source initiatives let a greater spectrum
of people explore the deepfake generation. The development of user-friendly face-swapping
applications was a huge step forward in the growth of deepfake technology. These programs
allowed users to easily superimpose one person's face over another's in video footage without
requiring substantial technological knowledge. The ease of use of these tools helped with the
quick spread of fake technology.
Considering voice synthesis and full body manipulation, deepfake applications include speech
synthesis in addition to visual manipulation. This advancement allowed the construction of
convincing fake sounds. Deepfakes using voice synthesis might resemble the speech patterns and
intonations of real people, further blurring the borders between proper and fake information.
Attention to full-body manipulation: Deepfake technology grew to encompass full-body
manipulation capabilities as it progressed. This breakthrough made it possible to change a
complete person's look and motions in recordings, making it increasingly challenging to detect
fake content.
Today, deepfake technology has reached a level of sophistication where it can convincingly
impersonate individuals, including public figures and leaders. Deepfakes may be used in
disinformation campaigns to convey misleading information and alter public opinion. Fraud,
malicious actors can use fakes to commit financial fraud and impersonation. Breach of privacy:
creating false pornographic content depicting unknowing persons has major privacy
consequences.
Deepfake technology has progressed from its academic roots to its current stage thanks to
advances in AI, the availability of tools and datasets, and the extension of capabilities beyond
face swapping to encompass voice synthesis and full-body manipulation. Deepfakes are
becoming more convincing and difficult to detect as technology advances, creating significant
cybersecurity and social dangers.
7|Page
3.2 What is GANs?
Ph.D. graduate student, Ian Goodfellow, invented Generative Adversarial Networks (GAN),
which are a key component of today's deep fakes. An anonymous Reddit user known as
"deepfakes" began posting deepfake videos of celebrities in 2017, as well as a GAN tool that
allowed users to swap faces in videos, in 2017. These quickly became popular on the internet and
social media.
GANs consist of two neural networks, a generator, and a discriminator, which work in tandem
to create synthetic data that is increasingly indistinguishable from real data.
The generator generates the fake digital objects and asks the discriminator to determine if it is
real or fabricated. Each time the discriminator properly determines whether the material is real or
fake, it sends that knowledge to the generator in order to enhance the next deepfake.
8|Page
A generator is fed data indicating the types of content to be developed so that it may 'learn' the
features of that type of material. The generator then attempts to generate new samples of that
data that have the same properties as the original data. These created instances are then fed into
the discriminator, which has likewise been taught to 'learn' to recognize the properties of that sort
of data.
The discriminator looks for errors in every instance provided and rejects those that do not
display the same features as the original data, classifying them as "fakes." These scams are then
returned to the generator so that it may learn how to improve its data generation process. This
cycle continues until the generator generates fake material that the opponent detects as genuine.
9|Page
3.3 The process of creating a deepfake
In just a few years, these initially lighthearted spoof videos have evolved into something
considerably more dangerous, with people seeking to accuse politicians and celebrities of
imitating celebrity faces to market their businesses.
Deepfake technology use machine learning algorithms to generate realistic digital media
intended to trick consumers. Deepfake technology needs only a few steps to create a face-swap
video. First, you put countless images of the two people's faces through an AI system known as
an encoder. The encoder detects and learns similarities between the two faces, reducing them to
their shared common characteristics while compressing the pictures. After that, a second AI
system known as a decoder is trained to extract the faces from the compressed pictures. Due to
the differences in the faces, you train one decoder to recover the first person's face and another
decoder to retrieve the second person's face. Simply feed encoded photos into the "wrong"
decoder to achieve the face swap.
The first stage in creating an authentic fake is collecting data, such as images and videos of
relevant people, which will be utilized to build the false material. This information may be
obtained from a variety of sources, such as social media accounts, public documents, and
private archives.
10 | P a g e
01. Face Mapping
After collecting the data, the deepfake algorithm will analyze it to produce a 3D
model of the target person's face. This entails tracing the individual's facial traits,
such as facial emotions, gestures, and speech patterns.
This data is then used to train the deepfake algorithm, which uses machine learning
techniques to learn how to replicate the target person's face and actions.
This data is then used to train the deepfake algorithm, which learns how to reproduce
the target person's face and behaviors using machine learning techniques.
After creating the first deepfake, it may be modified and changed to increase its
quality or accuracy. This could involve changing the lighting or color balance, as well
as fine-tuning the target person's facial motions and expressions.
11 | P a g e
12 | P a g e
3.4 What Are the Best Deepfake Apps and Websites?
There are a few applications that allow people to make deepfakes. FakeApp was the first app we
know of that aimed at supplying ordinary people a chance to generate deepfake product. This
website is no longer active. Deepfake creators have mostly moved on to DeepFacelab, which is
hosted on GitHub and has created an endless stream of tutorials on sites like Reddit.
Many apps are used to deepfake and there are some of the most popular apps in 2023.There are
lensa AI, my heritage, face swap live, deepfakes web, wombo , zao , reface and deep art .
1. Lensa AI
Lensa AI is the latest software for creating AI images of yourself or others. The program
can generate portraits in a variety of genres, such as superheroes, anime, and others. It's
not that deep a fake in the sense that it will put your face on other people's bodies or in
movies.
2. My Heritage
Another popular deep fake program is My Heritage. Deep nostalgia, program function
that allows you to animate old photos, has gained popularity among social media users.
To use the service, upload a picture and click on the animation button.
13 | P a g e
3. Face Swap Live
Face switch is not fully deepfake software, but it does let you switch faces from real
people or picture films, making it one of the greatest swapping applications available.
You can video, shoot stickers, and snap photographs, all of which may be promptly
uploaded to social media.
4. DeepFakes Web
Deepfakes Web is a web-based service that allows you to generate deepfake videos. Deep
learning is used to absorb the various the complexity of face data.
5. Wombo
Wombo is an AI-powered lip sync mobile device software. That transforms selfies into
deep lip syncs. All that is required is to upload a selfie and choose a music and the app
will handle the rest.
6. Zao
This app allows two different people to exchange faces, but it also adds your own face to
any video. This app is most viral in the last period.
7. Reface
Reface is one of the world's most well-known deepfake applications.
Artificial intelligence is used to superimpose your face on photos, memes, and GIFs.
8. Deep Art
Deep Art is another app that has lately gone viral. It is not a deepfake video application.
It can produce deepfake visuals based on art, old architecture, and paintings.
14 | P a g e
3.5 Disadvantages of deepfake technology
Deepfake technology can be used criminally for a variety of targets. Deepfakes pose
significant dangers despite being largely legal. Some of them are:
15 | P a g e
3.6 Types of Deepfake Frauds
Deepfakes can be used for financial fraud by impersonating individuals in video or audio
communications.
Below mention main deepfake frauds.
1. Textual deepfakes
2. Deepfake videos
3. Deepfake audios
4. Deepfakes on social media
5. Real-time or live deepfakes
Now we discuss them one by one.
Modern video-generating AI is more capable than natural language AI and may be more
dangerous. The major tool of deepfake hackers is the production of fake images and
videos.
Artificial intelligence can handle of far more than just text, images, and video. They can
also clone human voices. All that is required is a data repository with an audiotape of an
individual whose voice must be reproduced. Deepfake algorithms will be able to learn
from this data and recreate the prosody of an individual's voice.
16 | P a g e
04. Deepfakes on social media
Deepfake technology has been used to construct fake personal identities and social media
accounts, which are then exploited to defraud individuals of their money or personal
information.
Real-time audio and video clones that duplicate someone's identity may be created. Using
this technique, threat actors can circumvent security measures such as voice-based
authentication.
17 | P a g e
3.7 How to detect deepfake?
Some deepfakes are easier to identify than others. It all relies on the faked material's quality and
complexity. Some deepfakes contain filters that make artificial faces look less clear in certain
places. Others show minor flaws in balance, color, light, sharpness, or texture. Because these
discrepancies "blend" from frame to frame, some deep false films can shimmer or flare. Early in
2019, USC and UC Berkeley researchers published a study in which AI was trained to identify
patterns of posture and gesture changes associated with the information that individuals were
delivering.
In the below some of the things to look for while identifying deepfake.
1. Pay attention to the face: Look at someone's face and identify they are saying
something without blinking and it is a very good sign to spot a deep fake. Some deep
fakes are based on lip syncing. Lip movements do not look natural. Pay attention to
the shape of the eyes and eyebrows.
2. Pay attention to the audio: Deepfakes spend more time to video pictures than to audio
correction. Look for unusual word pronunciation, digital background noise, or even the
absence of noise.
3. Images that look unnatural as you zoom in or slow down: If you watch the large
screen any video you can identify fake lip movements and fake eye movements.
4. Pay attention to the body movements : looks like distorted, or their movements are
fast and disjointed.
18 | P a g e
3.8 Examples for deepfakes from the current and past few years
❖ In 2020, US President Joe Biden was the target of multiple deepfakes showing him in
exaggerated phases of cognitive impairment to influence the presidential election.
Several deepfake films of Joe Biden falling asleep, getting lost, and misspeaking
surfaced during the election campaign. These films were made to fuel the rumor that he
was suffering from cognitive deterioration because of his age.
❖ Deepfake movies have also been used to propagate disinformation and as satire and
laughter by Presidents Barack Obama and Donald Trump. Deepfake films have also
targeted Presidents Barack Obama and Donald Trump, with some intended to
disseminate disinformation and others for parody and fun.
❖ Deepfake images of female celebrities have also been utilized to make pornography.
19 | P a g e
❖ In March 2023, an anonymous construction worker from Chicago used deepfake
technology to create a fake image of Pope Francis in a white Balenciaga puffer jacket.
The image went viral, receiving over twenty million views.
20 | P a g e
3.9 Deepfake Threats
Deepfake technology can erode trust in media, leading to increased skepticism about the
validity of films and audio recordings, making it harder to distinguish fact from fiction.
Deepfake technology raises national security concerns as it allows malevolent actors to create
convincing movies of political leaders or military personnel, potentially causing international
crises or weakening diplomatic ties.
Deepfake aspects may be used in cyberattacks, such as employing a fake CEO's voice to
authorize bank transactions or producing fake video proof to blackmail individuals or
organizations.
05. Misinformation
Deepfake movies and audio recordings have the potential to spread false information,
manipulate public opinion, and generate damage. Because bogus information may influence
elections and public conversation, this poses a severe danger to democracy.
21 | P a g e
06. Privacy Violations.
22 | P a g e
04.Future Developments
The future of deepfake technology will attempt to build increasingly intricate and convincing
deepfakes. Advances in artificial intelligence, particularly in natural language processing and
computer vision, will enable the fabrication of deepfakes that are practically indistinguishable
from genuine material. This is a severe threat to a wide range of businesses, including politics,
entertainment, and cybersecurity. Future developments in deepfake detection and authentication
methods are expected to combat this growing threat. AI-powered deepfake detection solutions
will become more robust, relying on sophisticated machine learning models and behavioral
analysis. Furthermore, blockchain technology has the potential to be utilized to create immutable
records of legal material, improving trust in digital media.
Deepfake technology, which uses artificial intelligence (AI) to generate realistic-looking fake
films and audio recordings, has already had a substantial influence on a variety of businesses and
society. As technology continues to evolve, several potential developments can be anticipated in
the future. Some of them are voice cloning, mitigating and detection, applications beyond media,
accessibility, and improved realism.
● Voice Deepfakes, also known as voice cloning, will continue to evolve. This technology may
have both beneficial and harmful consequences. It might be used for voice assistants, dubbing, or
assisting those with speech disorders. It does, however, raise worries about identity theft and
phone-based frauds.
● Mitigation and detection, in response to the rising threat of deepfakes, efforts will be made to
improve detection and mitigation strategies. This involves using AI and machine.
● While deepfake technology is most linked with modified movies and audio, its uses are
expected to increase. Deepfakes may be used in industries such as entertainment, gaming, and
advertising to provide people with interactive and personalized experiences. Deepfake avatars in
virtual reality and augmented reality applications may also become increasingly common.
● Accessibility, Deepfake tools, like many other technologies, are expected to become more
widely available to the general population. User-friendly programs may emerge, allowing
anyone with little technical knowledge to produce convincing deepfakes. As harmful usage
grows more common, this might present ethical and security problems.
23 | P a g e
● Improved Realism, improving realism is one of the most apparent applications of deepfake
technology. AI algorithm and computer power advancements will enable increasingly more
convincing deepfake material. Faces and voices may become indistinguishable from actual
individuals, making it more difficult to spot forgeries.
Deepfake technology has found applications across a wide range of industries, and its usage is
expected to grow in the future. Below, I will explain some of the industries that currently use
deepfake technology and provide example.
• Dubbing and Localization: Deepfake technology can be used to dub movies and TV
shows into multiple languages while retaining the lip sync and facial expressions of the
original actors.
24 | P a g e
02. News and Media
• News Presenters: Some news organizations employ deepfake technology to create
virtual presenters that can present the news 24 hours a day, seven days a week without
tiring.
• Interviews: Deepfake technology may be used to mimic interviews or debates with
historical people, specialists, or fictitious characters.
03. Gaming
• Character Animation: Deepfake technology may be used in video games to
animate character faces in real-time, creating a more immersive gaming
experience.
• Voice Acting: Deepfake technology allows game makers to produce realistic
character voices, decreasing the need for human voice actors.
25 | P a g e
05. Education and Training
• Virtual Instructors: To give lectures and tutorials, educational institutions can
build virtual instructors with lifelike looks and voices.
• Language Learning: Deepfake technology can assist language learners practice
their pronunciation and fluency by simulating native speakers.
06. Healthcare
• Therapeutic Applications: Deepfake avatars with compassionate emotions can
be utilized in therapy to help clients with mental health difficulties.
• Medical Training: Deepfake technology may be used by medical personnel to
imitate patient interactions and operations, providing for realistic training without
putting actual patients at danger.
26 | P a g e
Now let's discuss the expected consequences of deepfake technology. When speaking like that,
special attention can be paid to the following points.
27 | P a g e
03. Threats to Various Sectors
Deepfakes may be used to make convincing fake speeches and interviews with politicians,
possibly destabilizing governments and influencing elections. Deepfake technology may
provide issues to the entertainment business, such as the unauthorized use of actors'
likenesses in films or the development of faked celebrity material. Deepfakes may be used to
launch cyberattacks, such as authorizing financial transactions or gaining unauthorized
access to secure systems.
As the threat of malicious deepfakes grows, governments and regulatory agencies may adopt
and enforce legal frameworks to combat their development and spread. Individuals or
organizations involved in the development and spread of damaging deepfake content may
face sanctions under these rules.
Raising public awareness of the presence and dangers of deepfake technology will continue
to be critical. Educational programs can help people become more discriminating digital
media consumers and identify possible deepfake material.
Educational initiatives, for example, might teach people how to check the validity of digital
media by searching for tiny anomalies, utilizing verification tools, or depending on
trustworthy sources when reading news.
28 | P a g e
05.Conclusion
The development of deepfake technology marked a new period of cybersecurity risks and
chances. This research delves into the complex world of deepfakes, identifying possible hazards
as well as opportunities for improving security procedures. The development of deepfake
technology and anticipated future advancements underscore the need of addressing this
cybersecurity problem. Governments, organizations, and researchers must collaborate to develop
effective protections as deepfake technology becomes more accessible and convincing. Finally,
this article stresses the importance of ongoing research on deepfake detection and prevention
methods. It also advises that industry standards and rules be implemented to combat the use of
deepfake technology. Furthermore, increasing public awareness of the prevalence and dangers of
deepfakes is crucial. The ability to adapt and innovate in the face of ever-changing deepfake
threats will define cybersecurity's future.
Individuals, organizations, and society are all in peril from deepfakes. Because they may be used
for identity theft, misinformation campaigns, and other harmful actions, cybersecurity
professionals must be diligent and aggressive in their attempts to detect and neutralize these
risks.
However, it is important to understand that deepfake technology is a double-edged sword. When
used responsibly, it can be a useful tool to strengthen your cybersecurity defenses. Deepfakes
offer new ways to improve digital security measures, from biometric authentication to
identifying vulnerabilities in security systems.
As we move forward, politicians, researchers, and cybersecurity experts must work together to
stay ahead of the curve in the ongoing fight against deep-pocketed threats. Strong detection
algorithms, user education, and regulatory frameworks are essential to harnessing the potential of
powerful counterfeiting technologies while mitigating their harm.
Finally, deepfake technology has fundamentally altered the landscape of cybersecurity,
demanding constant adaptation and innovation. By understanding the risks and opportunities it
presents, we can continue to fortify our digital defenses and navigate the evolving challenges of
the digital age.
29 | P a g e
06.References
• https://www.american.edu/sis/centers/security-
technology/deepfake_technology_assessing_security_risk.cfm
• https://interestingengineering.com/culture/deepfake-technology-how-work
• https://www.geeksforgeeks.org/10-best-deepfake-apps-and-websites-you-can-try-for-fun/
• https://inspiredelearning.com/blog/the-biggest-trends-in-deepfake-detection-in-2022/
• https://www.dhs.gov/sites/default/files/publications/increasing_threats_of_deepfake_iden
tities_0.pdf
• https://www.tripwire.com/state-of-security/deepfakes-what-they-are-and-tips-spot-them
• https://www.brookings.edu/articles/artificial-intelligence-deepfakes-and-the-uncertain-
future-of-truth/
• https://www.theguardian.com/technology/2020/jan/13/what-are-deepfakes-and-how-can-
you-spot-them
• https://www.pcmag.com/news/what-is-a-deepfake
• https://en.wikipedia.org/wiki/Deepfake
• https://www.businessinsider.com/guides/tech/what-is-deepfake
• https://www.discoverdatascience.org/articles/everything-you-need-to-know-about-how-
to-use-deepfake/
• https://mitsloan.mit.edu/ideas-made-to-matter/deepfakes-explained
• https://www.techtarget.com/whatis/definition/deepfake
• https://www.forbes.com/sites/davidbalaban/2023/05/18/the-battle-against-fake-news-
enters-the-age-of-deepfakes/?sh=2fbeb09e67ca
30 | P a g e
• https://link.springer.com/article/10.1007/s13735-022-00241-w
• https://www.britannica.com/technology/deepfake
• https://www.researchgate.net/publication/337644519_The_Emergence_of_Deepfake_Tec
hnology_A_Review
• https://link.springer.com/article/10.1007/s00500-023-08605-y
• https://www.forbes.com/sites/bernardmarr/2019/07/22/the-best-and-scariest-examples-of-
ai-enabled-deepfakes/?sh=7d527c852eaf
• https://www.forbes.com/sites/bernardmarr/2019/07/22/the-best-and-scariest-examples-of-
ai-enabled-deepfakes/?sh=7d527c852eaf
31 | P a g e
32 | P a g e