A white paper published by cybersecurity firm Nisos, sketches five incidents involving deepfake audio attacks
Category: 2D Face
There is also a positive side to the difficulty in recognizing masked people. The problem faced by authentication services is to be solved by facial recognition software
Of course, we sent out a link to Product Hunt to everyone we know. I asked the guys on Mesto social network and Silicon Pravda Telegram chat to support us. But most of the voices came from strangers, which was very encouraging
Thanks to the development of artificial intelligence, it is becoming more difficult to understand where is reality and where is fake. If last year deepfake technology caused concern, now there is a fake face phenomenon, that is, the creation of images of non-existent people indistinguishable from real images. According to experts, this technology is actively used for political propaganda
The developers claim that the accuracy of the instrument can reach 99.9%, but the detector is not in all cases “sure” almost 100% in its decision. Also in the future, it is planned to train the system to distinguish whether other objects have changed in the video or photo
“Don’t talk to strangers,” our parents advised us. In an era of double life: real and virtual, someone must also tell us, “Don’t share everything on Facebook!”
В основу представленного VIEN сервиса легла технология Fake Video Detection Service (FVDS), работающая, в свою очередь, с помощью моделей компьютерного зрения, позволяющего покадрово оценить и классифицировать все присутствующие на видеозаписях объекты
In the 1359th issue of “Evening Urgant”, Nadezhda Mikhalkova and Maxim Marinin were asked to determine which images of two famous people were combined in one photograph
Deepfake authors can blackmail the CEOs of large companies by threatening to publish a fake video that could undermine their reputation if they do not pay compensation. Fraudsters can also, for example, infiltrate your network by faking a call from the CIO and tricking employees into providing passwords and access privileges, after which your confidential data will be at the complete disposal of hackers
Neural networks have become a revolution, it is a fact. There is a neural network that identifies drunks from a forehead photo, for example. And that .. is just the beginning