Presentation 2

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Understanding

Deepfake
Technology
Introduction to Deepfake
• Deepfake technology refers to the use of
artificial intelligence to create or manipulate
videos, images, or audios to make them
appear real but are actually fake. It has
gained significant attention due to its
potential for misuse and its impact on various
industries.
• Deepfake technology uses machine learning
algorithms to analyze, map, and imitate a
person's voice or facial expressions captured
in source media, such as a video or image.
APPLICATIONS OF DEEPFAKES
Entertainment
 Deepfakes can be used for entertainment purposes, such as creating
realistic visual effects in movies.
 Some of common examples are:
 Movies , Videos , Virtual Advertisement
 Doctored videos have been one of the key weapons used in
propaganda battles. Donald Trump Taunting Belgium for remaining in
the Paris climate agreement, David Beckham speaking fluently in nine
languages,… all these videos have gone viral.
Perfect Example of DeepFake
• https://this-person-does-not-exist.com/en
"thispersondoesnotexist.com" website is a
platform that showcases the capabilities of
generative adversarial networks (GANs) in
creating realistic-looking fake faces. It
generates images of fictional people who do
not actually exist. The website refreshes with
a new face each time you reload the page.
How Deepfake Works
Machine Learning Algorithms
Deepfake technology uses machine
learning algorithms to analyze and
manipulate data.
Training a Deep Learning Model
The technology involves training a deep
learning model on a large dataset of real
and fake media to learn patterns.
Generating Realistic Fake Media
The trained model can then generate
realistic fake media by applying the
learned patterns to new data.
WHAT ARE THREATS POSED BY DEEPFAKE VIDEOS
• Misinformation • Privacy Invasion • Fraud
Deepfakes pose Deepfakes raise Deepfakes can be
significant risks in concerns about used for fraudulent
the area of privacy invasion, as activities, such as
misinformation, as they can be used to impersonating
they can be used create fake videos someone to gain
to create or images that can access to sensitive
convincing fake harm an individual's information or
reputation or commit financial
news and
personal life. crimes.
manipulate public
opinion.
QUESTIONS?
THANKYOU!

You might also like