Skip to main content

The new face of fake video is Deep fake ?

Today we are learn about something new.
So let's know about it.


If you going somewhere like saloon in small cities and villages you see many posters like actors and actress but those pictures are not right it made from high end software but now video are make fake. You see a video of BRACK Obama whose are abusing Donald trump but it not right and this is the example of deep fake videos.

  1. What is Deep fake?
The name of fake is showing us that the things is duplicate of recreated which is created with the help of Artificial intelligence. which has intelligent to change the human image. other people image mixed with another video and you can't guess that the video is fake and in this video person's voice, expression will look like real. You see the video in YouTube, Facebook and other social sites.

2. When the fake contents get in trade?

The fake content trend in not new trend even before in pictures of Bollywood and Hollywood the face of heroines set to the another body and this technique is known as MARF of MARFING. In 90's the Photoshop was in trade but it is very difficult to change the face or voice of person in video but now we can change anything in the video like face, voice, skin tone and many more. In 2D video's the help of face gesture's we can't guess which is real and which is fake. The beginning of Deep fake videos was in 2016 but the people know about in 2017. One Reddit user publish the video which was based on Hollywood actress like Emma Watson and Tailor swift etc. In this videos you can't guess which is right or wrong.

TYPES OF DEEP FAKE
  1. 2017 PORN SCANDAL
In autumn 2017, an anonymous Reddit user under the pseudonym "Deepfakes" posted several porn videos on the Internet. One was a Deepfake simulation of Wonder Woman actress Gal Gadot having sex with her step-brother, while others were of actresses like Emma Watson, Katy Perry, Taylor Swift or Scarlett Johansson. The scenes were not real, having been created with an artificial intelligence. They were debunked a short time later. As time went on, the Reddit community fixed many bugs in the faked videos, making it increasingly difficult to distinguish fake from true content. As training data for the software, Reddit users used records from sex films and the respective actress. The Deepfake phenomenon was first reported in December 2017 in the technical and scientific section of the magazine Vice, leading to its widespread reporting in other media.[12][13]



2. DEEPFAKE APP

In January 2018, a desktop application called FakeApp was launched. The app allows users to easily create and share videos where the faces had been swapped. The app uses an artificial neural network and the power of the graphics processor and three to four gigabytes of storage space to generate the fake video. For detailed information, the program needs a lot of visual material from the person to be inserted in order to learn which image aspects have to be exchanged, using the previously mentioned deep learning algorithm based on the video sequences and images. The software uses the AI-Framework TensorFlow of Google, which among other things was already used for the program DeepDream. Celebrities are the main targets of such fake sex videos, but some individuals are also affected.[17][18][19]

3. DEEPFAKES IN POLITICS

Deepfakes have been used to misrepresent well-known politicians on video portals or chatrooms. For example, the face of the Argentine President Mauricio Macri was replaced by the face of Adolf Hitler, and Angela Merkel's face was replaced with Donald Trump's.[14][15] In April 2018, Jordan Peele and Jonah Peretti created a deepfake using Barack Obama as a public service announcement about the danger of deepfakes.[16]

THANKS FRIENDS TO READ THIS ARTICLE

NEW TIPS FOR TECH


  


Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet