SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
DeepFake Detection
Challenges, Progress and
Hands-on Demonstration of Technology
Dr. Symeon (Akis) Papadopoulos – @sympap
Dr. Nikos Sarris - @nikossarris
MeVer Team @ Information Technologies Institute (ITI) /
Centre for Research & Technology Hellas (CERTH)
Online Webinar, Dec 16th 2021
Media Verification
(MeVer)
DeepFakes
Content, generated by deep neural
networks, that seems authentic to
human eye
Four main types of face DeepFakes:
a) Entire face synthesis, b) Attribute
manipulation, c) Identity swap,
d) Expression swap
Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake
Detection (Tolosana et al., 2020)
Tolosana, R., et al. (2020). Deepfakes and beyond: A
survey of face manipulation and fake detection.
Information Fusion, 64, 131-148.
Verdoliva, L. (2020). Media forensics and deepfakes:
an overview. IEEE Journal of Selected Topics in
Signal Processing, 14(5), 910-932.
Mirsky, Y., & Lee, W. (2021). The creation and
detection of deepfakes: A survey. ACM Computing
Surveys (CSUR), 54(1), 1-41.
reenactment
replacement
editing
generation
Gaining popularity
Nguyen, T. T., et al. (2019). Deep learning for
deepfakes creation and detection. arXiv preprint
arXiv:1909.11573, 1.
Ajder, H., et al. (2019).The State of DeepFakes:
Landscape, Threats and Impact. Report by
DeepTraceLabs/Sensity.
Potential Risks and Harms
Tackling deepfakes in European policy, Panel for the Future of Science and Technology,
Scientific Foresight Unit (STOA), July 2021
DeepFakes and Politics
One week after the video’s release, Gabon’s military
attempted an ultimately unsuccessful coup—the country’s
first since 1964—citing the video’s oddness as proof
something was amiss with the president.
https://www.motherjones.com/politics/2019/03/deepfake
-gabon-ali-bongo/
Mr Nguyen said he could not rule out the video being a
‘deepfake’, a term for the fairly new artificial intelligence
based technology which involves machine learning
techniques to superimpose a face on a video.
https://www.sbs.com.au/news/a-gay-sex-tape-is-threatening-
to-end-the-political-careers-of-two-men-in-malaysia
DeepFake Quality Rapidly Improving
https://twitter.com/goodfellow_ian/status/1084973596236144640
2021
Masood, M., Nawaz, M., Malik, K. M., Javed, A., & Irtaza, A. (2021). Deepfakes Generation and Detection: State-of-
the-art, open challenges, countermeasures, and way forward. arXiv preprint arXiv:2103.00484.
Karras, T., Aittala, M., Laine, S., Härkönen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021, May). Alias-free generative
adversarial networks. In Thirty-Fifth Conference on Neural Information Processing Systems.
A New Level of Realism
• Created by Chris Ume, a VFX specialist
• Not detected by any of the commercial
deepfake detection services
• Not discernible by human inspection
• Potential for misleading
but to date barriers are still high
• a lot of expertise, skill and time
• an impersonator who looks like the target
(Miles Fisher)
https://www.theverge.com/2021/3/5/22314980/tom-cruise-
deepfake-tiktok-videos-ai-impersonator-chris-ume-miles-fisher
Common DF Neural Network Architectures
Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41.
DeepFake Creation Pipeline and Tools
Mirsky, Y., & Lee, W. (2021). The Creation
and Detection of Deepfakes: A Survey. ACM
Computing Surveys, 54(1), 1-41.
faceswap.dev
https://github.com/iperov/DeepFaceLab
zaodownload.com malavida.com/en/soft/fakeapp
hey.reface.ai
facemagic.ai
https://generated.photos/face-generator
Signs of a DeepFake (in 2021)
• Different kinds of
artifacts
• Blurry areas around lips,
hair, earlobs
• Lack of symmetry
• Lighting inconsistencies
• Fuzzy background
• Flickering (in video)
https://apnews.com/article/bc2f19097a4c4fffaa00de6770b8a60d
DF Landscape: Detection Approaches
PHYSIOLOGICAL
SIGNALS
Blinking
information
Corneal specular
highlights
Photo-
plethysmography
ARTIFACT BASED
DETECTION
3D head pose
features
Limited resolution /
blurring
Local artifacts
(eyes, teeth, etc.)
Face X-Ray
(blending artifacts)
DEEP LEARNING
ARCHITECTURES
MesoNet XceptionNet
Capsule
Networks
Recurrent
Convolutions
FREQUENCY
DOMAIN
Local frequency
statistics
Spectral
distribution
Two-stream
approaches
Attention Nets
(Transformers)
The DF Battleground
• DeepFake generation and detection
offer a naturally adversarial setting.
• A recent survey (Feb 2021) analyzed
70 generation and 108 detection
methods and linked them if a
detection method tried to detect
media from a given generator.
• Analysis indicates the fast evolution
of this field.
Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., & Liu, Y.
(2021). Countering Malicious DeepFakes: Survey,
Battleground, and Horizon. arXiv preprint arXiv:2103.00218.
DF Landscape: Datasets
• Large-scale: DFDC, KoDF,
OpenForensics
• Realistic: WildDeepfake
• Classic: FaceForensics++
• Small/limited: UADFV, DF-TIMIT,
Google DFD, Celeb-DF
Open
Forensics
DeepFake Detection Challenge
• Goal: detect videos with facial or voice manipulations
• 2,114 teams participated in the challenge
• Log Loss error evaluation on public and private validation sets
• Public evaluation contained videos with similar transformations as the
training set
• Private evaluation contained organic videos and videos with unknown
transformations from the Internet
Source: https://www.kaggle.com/c/deepfake-detection-challenge
Performance of SotA methods on DFDC
The DFDC highlights the
generalization challenge
faced by SotA methods.
public set
hidden set
Kim, M., Tariq, S., & Woo, S. S. (2021). FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning. In
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1001-1012).
Accuracy in cross forgery experiments (FF++ HQ)
Method DF F2F FS NT
Xception (DF) 99.41 56.05 49.93 66.32
Xception (F2F) 68.55 98.64 50.55 54.81
Xception (FS) 49.89 54.15 98.36 50.74
Xception (NT) 50.05 57.49 50.01 99.88
Accuracy in cross dataset experiments
Method FF++ HQ CELEB-DF
Xception (FF++ HQ) 95.60 73.01
The MeVer DeepFake Detection Service
• R&D started in the end of 2019
• Participation in DeepFake Detection Challenge in Spring 2020
• Ranked among top 5% of solutions
• Alpha version internally released in Summer 2020
• Internally tested and evaluated by WeVerify partners in eight cycles
and continuously refined
• Version 1.0.0 released in November 2021
• Addition of network trained on more realistic datasets
• Available as a standalone service and via third party
applications: a) Truly Media, b) WeVerify plugin (soon)
Image Analysis
Video Analysis
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Shot segmentation
- 64 frames per shot
- Face detection
- Face filtering
- Face clustering per
shot and filtering
P. Charitidis, G. Kordopatis-Zilos, S. Papadopoulos and I. Kompatsiaris. “Investigating
the Impact of Pre-processing and Prediction Aggregation on the DeepFake Detection
Task”. In Proceedings of the Truth and Trust Online, 2020.
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Ensemble of models
(EfficientNet +
Transformers)
- Trained on DFDC
(120K videos) and
WildDeepFake (7314
videos) datasets
- BCE / InfoNCE loss
- DF scores per face
Overview of Service
Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
- Average DF scores
per face cluster
- Final prediction is
the maximum face
DF score
- Result preparation
Examples of Successful Image Detection
Limitations in Detection
Hard to spot very
realistic manipulations
from methods that
involve manual tuning
and post-processing.
Current version cannot
detect manipulations in fully
synthetic faces (e.g.
StyleGAN2,
thispersondoesnotexist.com).
Low resolution faces may be falsely
presumed as DeepFakes.
Challenges
• Computational resources (both for training and for serving requests)
• Making the User Interface easy to understand
• Defend against adversarial approaches
• Generalization!
• Keeping up-to-date with new generation models/methods/tools 
continuously enrich training dataset
Current Trends
Generate own DF and Use for
Training
Attention-based and Patch-
level Consistency Analysis
Metric and Contrastive
Learning
Domain Adaptation and
Knowledge Distillation
Next Steps
• New approaches
• Knowledge Distillation: from simple teacher-student pairs to group teaching setups
• Contrastive Learning: investigate decorrelated representations
• Practical considerations
• Usability
• Efficiency
• Maintenance (new training data, model adaptation, etc.)
• Transparency and Robustness
• Creating a model card for the service (modelcards.withgoogle.com)
• Benchmark service robustness with ART (github.com/Trusted-AI/adversarial-
robustness-toolbox)
Our DeepFake Detection Team
Akis: MeVer
leader
Nikos: MeVer senior
researcher
Panagiotis: service/API
development
Lazaros: front end
development
Spiros: DeepFake detection
and service development
Pantelis: GAN
detection
George: Deep Learning
research lead
Olga: technical
support
Thank you!
Dr. Symeon Papadopoulos
papadop@iti.gr
@sympap
Dr. Nikos Sarris
nsarris@iti.gr
@nikossarris
Media Verification (MeVer)
https://mever.iti.gr/
@meverteam

Contenu connexe

Tendances

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsCrystalHariga
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxNilayDeshmukh3
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Ian McCarthy
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...Edge AI and Vision Alliance
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...KIMMINHA3
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxswathiravishankar3
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 

Tendances (20)

Deepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their DetectionDeepfakes: An Emerging Internet Threat and their Detection
Deepfakes: An Emerging Internet Threat and their Detection
 
Deepfakes
DeepfakesDeepfakes
Deepfakes
 
Deep fakes and beyond
Deep fakes and beyondDeep fakes and beyond
Deep fakes and beyond
 
Deepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive UsDeepfake - Do Our Eyes Deceive Us
Deepfake - Do Our Eyes Deceive Us
 
Deep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptxDeep Fakes Artificial Intelligence.pptx
Deep Fakes Artificial Intelligence.pptx
 
ESE presentation.pptx
ESE presentation.pptxESE presentation.pptx
ESE presentation.pptx
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be..."Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
"Creating, Weaponizing,and Detecting Deep Fakes," a Presentation from U.C. Be...
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Deep Fake.pptx
Deep Fake.pptxDeep Fake.pptx
Deep Fake.pptx
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
 
The age of GANs
The age of GANsThe age of GANs
The age of GANs
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Similaire à DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology

Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection Weverify
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptxssusercec41e
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxShakas Technologies
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptxspchinchole20
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle MilosevicDataScienceConferenc1
 
Face recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingFace recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingChimi Wangmo
 
Msm2013challenge
Msm2013challengeMsm2013challenge
Msm2013challengefgodin
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) IT Arena
 
Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10Mario Cho
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptxjinaj2
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
Rise of AI through DL
Rise of AI through DLRise of AI through DL
Rise of AI through DLRehan Guha
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 

Similaire à DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology (20)

Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptx
 
Deep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docxDeep fake video detection using machine learning.docx
Deep fake video detection using machine learning.docx
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video Detection
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
A survey of deepfakes in terms of deep learning and multimedia forensics
A survey of deepfakes in terms of deep learning and multimedia  forensicsA survey of deepfakes in terms of deep learning and multimedia  forensics
A survey of deepfakes in terms of deep learning and multimedia forensics
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
[DSC Europe 22] Face Spoofing Detection: Theory and Practice - Pavle Milosevic
 
Face recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signingFace recogniton based digital signature for email encryption and signing
Face recogniton based digital signature for email encryption and signing
 
Msm2013challenge
Msm2013challengeMsm2013challenge
Msm2013challenge
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
 
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
 
Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10Koss 6 a17_deepmachinelearning_mariocho_r10
Koss 6 a17_deepmachinelearning_mariocho_r10
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptx
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
nn.pptx
nn.pptxnn.pptx
nn.pptx
 
Rise of AI through DL
Rise of AI through DLRise of AI through DL
Rise of AI through DL
 
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)Deep Learning for Computer Vision: Face Recognition (UPC 2016)
Deep Learning for Computer Vision: Face Recognition (UPC 2016)
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 

Plus de Symeon Papadopoulos

Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationSymeon Papadopoulos
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingSymeon Papadopoulos
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSymeon Papadopoulos
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualitySymeon Papadopoulos
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetSymeon Papadopoulos
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionSymeon Papadopoulos
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterSymeon Papadopoulos
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersSymeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Symeon Papadopoulos
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Symeon Papadopoulos
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceSymeon Papadopoulos
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Symeon Papadopoulos
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsSymeon Papadopoulos
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsSymeon Papadopoulos
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Symeon Papadopoulos
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015Symeon Papadopoulos
 
Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015Symeon Papadopoulos
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild WebSymeon Papadopoulos
 

Plus de Symeon Papadopoulos (20)

Knowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering LocalizationKnowledge-based Fusion for Image Tampering Localization
Knowledge-based Fusion for Image Tampering Localization
 
COVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact TracingCOVID-19 Infodemic vs Contact Tracing
COVID-19 Infodemic vs Contact Tracing
 
Similarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia contentSimilarity-based retrieval of multimedia content
Similarity-based retrieval of multimedia content
 
Twitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air QualityTwitter-based Sensing of City-level Air Quality
Twitter-based Sensing of City-level Air Quality
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
Learning to detect Misleading Content on Twitter
Learning to detect Misleading Content on TwitterLearning to detect Misleading Content on Twitter
Learning to detect Misleading Content on Twitter
 
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN LayersNear-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
Near-Duplicate Video Retrieval by Aggregating Intermediate CNN Layers
 
Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016Verifying Multimedia Use at MediaEval 2016
Verifying Multimedia Use at MediaEval 2016
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...Placing Images with Refined Language Models and Similarity Search with PCA-re...
Placing Images with Refined Language Models and Similarity Search with PCA-re...
 
In-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging PerformanceIn-depth Exploration of Geotagging Performance
In-depth Exploration of Geotagging Performance
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Web and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News ProfessionalsWeb and Social Media Image Forensics for News Professionals
Web and Social Media Image Forensics for News Professionals
 
Predicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online DiscussionsPredicting News Popularity by Mining Online Discussions
Predicting News Popularity by Mining Online Discussions
 
Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015Finding Diverse Social Images at MediaEval 2015
Finding Diverse Social Images at MediaEval 2015
 
CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015CERTH/CEA LIST at MediaEval Placing Task 2015
CERTH/CEA LIST at MediaEval Placing Task 2015
 
Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015Verifying Multimedia Use at MediaEval 2015
Verifying Multimedia Use at MediaEval 2015
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
 

Dernier

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Technology

  • 1. DeepFake Detection Challenges, Progress and Hands-on Demonstration of Technology Dr. Symeon (Akis) Papadopoulos – @sympap Dr. Nikos Sarris - @nikossarris MeVer Team @ Information Technologies Institute (ITI) / Centre for Research & Technology Hellas (CERTH) Online Webinar, Dec 16th 2021 Media Verification (MeVer)
  • 2. DeepFakes Content, generated by deep neural networks, that seems authentic to human eye Four main types of face DeepFakes: a) Entire face synthesis, b) Attribute manipulation, c) Identity swap, d) Expression swap Source: DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection (Tolosana et al., 2020) Tolosana, R., et al. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131-148. Verdoliva, L. (2020). Media forensics and deepfakes: an overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910-932. Mirsky, Y., & Lee, W. (2021). The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1), 1-41. reenactment replacement editing generation
  • 3. Gaining popularity Nguyen, T. T., et al. (2019). Deep learning for deepfakes creation and detection. arXiv preprint arXiv:1909.11573, 1. Ajder, H., et al. (2019).The State of DeepFakes: Landscape, Threats and Impact. Report by DeepTraceLabs/Sensity.
  • 4. Potential Risks and Harms Tackling deepfakes in European policy, Panel for the Future of Science and Technology, Scientific Foresight Unit (STOA), July 2021
  • 5. DeepFakes and Politics One week after the video’s release, Gabon’s military attempted an ultimately unsuccessful coup—the country’s first since 1964—citing the video’s oddness as proof something was amiss with the president. https://www.motherjones.com/politics/2019/03/deepfake -gabon-ali-bongo/ Mr Nguyen said he could not rule out the video being a ‘deepfake’, a term for the fairly new artificial intelligence based technology which involves machine learning techniques to superimpose a face on a video. https://www.sbs.com.au/news/a-gay-sex-tape-is-threatening- to-end-the-political-careers-of-two-men-in-malaysia
  • 6. DeepFake Quality Rapidly Improving https://twitter.com/goodfellow_ian/status/1084973596236144640 2021 Masood, M., Nawaz, M., Malik, K. M., Javed, A., & Irtaza, A. (2021). Deepfakes Generation and Detection: State-of- the-art, open challenges, countermeasures, and way forward. arXiv preprint arXiv:2103.00484. Karras, T., Aittala, M., Laine, S., Härkönen, E., Hellsten, J., Lehtinen, J., & Aila, T. (2021, May). Alias-free generative adversarial networks. In Thirty-Fifth Conference on Neural Information Processing Systems.
  • 7. A New Level of Realism • Created by Chris Ume, a VFX specialist • Not detected by any of the commercial deepfake detection services • Not discernible by human inspection • Potential for misleading but to date barriers are still high • a lot of expertise, skill and time • an impersonator who looks like the target (Miles Fisher) https://www.theverge.com/2021/3/5/22314980/tom-cruise- deepfake-tiktok-videos-ai-impersonator-chris-ume-miles-fisher
  • 8. Common DF Neural Network Architectures Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41.
  • 9. DeepFake Creation Pipeline and Tools Mirsky, Y., & Lee, W. (2021). The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 1-41. faceswap.dev https://github.com/iperov/DeepFaceLab zaodownload.com malavida.com/en/soft/fakeapp hey.reface.ai facemagic.ai https://generated.photos/face-generator
  • 10. Signs of a DeepFake (in 2021) • Different kinds of artifacts • Blurry areas around lips, hair, earlobs • Lack of symmetry • Lighting inconsistencies • Fuzzy background • Flickering (in video) https://apnews.com/article/bc2f19097a4c4fffaa00de6770b8a60d
  • 11. DF Landscape: Detection Approaches PHYSIOLOGICAL SIGNALS Blinking information Corneal specular highlights Photo- plethysmography ARTIFACT BASED DETECTION 3D head pose features Limited resolution / blurring Local artifacts (eyes, teeth, etc.) Face X-Ray (blending artifacts) DEEP LEARNING ARCHITECTURES MesoNet XceptionNet Capsule Networks Recurrent Convolutions FREQUENCY DOMAIN Local frequency statistics Spectral distribution Two-stream approaches Attention Nets (Transformers)
  • 12. The DF Battleground • DeepFake generation and detection offer a naturally adversarial setting. • A recent survey (Feb 2021) analyzed 70 generation and 108 detection methods and linked them if a detection method tried to detect media from a given generator. • Analysis indicates the fast evolution of this field. Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., & Liu, Y. (2021). Countering Malicious DeepFakes: Survey, Battleground, and Horizon. arXiv preprint arXiv:2103.00218.
  • 13. DF Landscape: Datasets • Large-scale: DFDC, KoDF, OpenForensics • Realistic: WildDeepfake • Classic: FaceForensics++ • Small/limited: UADFV, DF-TIMIT, Google DFD, Celeb-DF Open Forensics
  • 14. DeepFake Detection Challenge • Goal: detect videos with facial or voice manipulations • 2,114 teams participated in the challenge • Log Loss error evaluation on public and private validation sets • Public evaluation contained videos with similar transformations as the training set • Private evaluation contained organic videos and videos with unknown transformations from the Internet Source: https://www.kaggle.com/c/deepfake-detection-challenge
  • 15. Performance of SotA methods on DFDC The DFDC highlights the generalization challenge faced by SotA methods. public set hidden set Kim, M., Tariq, S., & Woo, S. S. (2021). FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 1001-1012). Accuracy in cross forgery experiments (FF++ HQ) Method DF F2F FS NT Xception (DF) 99.41 56.05 49.93 66.32 Xception (F2F) 68.55 98.64 50.55 54.81 Xception (FS) 49.89 54.15 98.36 50.74 Xception (NT) 50.05 57.49 50.01 99.88 Accuracy in cross dataset experiments Method FF++ HQ CELEB-DF Xception (FF++ HQ) 95.60 73.01
  • 16. The MeVer DeepFake Detection Service • R&D started in the end of 2019 • Participation in DeepFake Detection Challenge in Spring 2020 • Ranked among top 5% of solutions • Alpha version internally released in Summer 2020 • Internally tested and evaluated by WeVerify partners in eight cycles and continuously refined • Version 1.0.0 released in November 2021 • Addition of network trained on more realistic datasets • Available as a standalone service and via third party applications: a) Truly Media, b) WeVerify plugin (soon)
  • 19. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI
  • 20. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Shot segmentation - 64 frames per shot - Face detection - Face filtering - Face clustering per shot and filtering P. Charitidis, G. Kordopatis-Zilos, S. Papadopoulos and I. Kompatsiaris. “Investigating the Impact of Pre-processing and Prediction Aggregation on the DeepFake Detection Task”. In Proceedings of the Truth and Trust Online, 2020.
  • 21. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Ensemble of models (EfficientNet + Transformers) - Trained on DFDC (120K videos) and WildDeepFake (7314 videos) datasets - BCE / InfoNCE loss - DF scores per face
  • 22. Overview of Service Input Images/Videos Pre-Processing Deep Learning Post-Processing Results / UI - Average DF scores per face cluster - Final prediction is the maximum face DF score - Result preparation
  • 23. Examples of Successful Image Detection
  • 24. Limitations in Detection Hard to spot very realistic manipulations from methods that involve manual tuning and post-processing. Current version cannot detect manipulations in fully synthetic faces (e.g. StyleGAN2, thispersondoesnotexist.com). Low resolution faces may be falsely presumed as DeepFakes.
  • 25. Challenges • Computational resources (both for training and for serving requests) • Making the User Interface easy to understand • Defend against adversarial approaches • Generalization! • Keeping up-to-date with new generation models/methods/tools  continuously enrich training dataset
  • 26. Current Trends Generate own DF and Use for Training Attention-based and Patch- level Consistency Analysis Metric and Contrastive Learning Domain Adaptation and Knowledge Distillation
  • 27. Next Steps • New approaches • Knowledge Distillation: from simple teacher-student pairs to group teaching setups • Contrastive Learning: investigate decorrelated representations • Practical considerations • Usability • Efficiency • Maintenance (new training data, model adaptation, etc.) • Transparency and Robustness • Creating a model card for the service (modelcards.withgoogle.com) • Benchmark service robustness with ART (github.com/Trusted-AI/adversarial- robustness-toolbox)
  • 28. Our DeepFake Detection Team Akis: MeVer leader Nikos: MeVer senior researcher Panagiotis: service/API development Lazaros: front end development Spiros: DeepFake detection and service development Pantelis: GAN detection George: Deep Learning research lead Olga: technical support
  • 29. Thank you! Dr. Symeon Papadopoulos papadop@iti.gr @sympap Dr. Nikos Sarris nsarris@iti.gr @nikossarris Media Verification (MeVer) https://mever.iti.gr/ @meverteam