| . | ![]() |
. |
|
by AFP Staff Writers San Francisco (AFP) June 16, 2021
Facebook scientists on Wednesday said they developed artificial intelligence software to not only identify "deepfake" images but to figure out where they came from. Deepfakes are photos, videos or audio clips altered using artificial intelligence to appear authentic, which experts have warned can mislead or be completely false. Facebook research scientists Tal Hassner and Xi Yin said their team worked with Michigan State University to create software that reverse engineers deepfake images to figure out how they were made and where they originated. "Our method will facilitate deepfake detection and tracing in real-world settings, where the deepfake image itself is often the only information detectors have to work with," the scientists said in a blog post. "This work will give researchers and practitioners tools to better investigate incidents of coordinated disinformation using deepfakes, as well as open up new directions for future research," they added. Facebook's new software runs deepfakes through a network to search for imperfections left during the manufacturing process, which the scientists say alter an image's digital "fingerprint." "In digital photography, fingerprints are used to identify the digital camera used to produce an image," the scientists said. "Similar to device fingerprints, image fingerprints are unique patterns left on images... that can equally be used to identify the generative model that the image came from." "Our research pushes the boundaries of understanding in deepfake detection," they said. Microsoft late last year unveiled software that can help spot deepfake photos or videos, adding to an arsenal of programs designed to fight the hard-to-detect images ahead of the US presidential election. The company's Video Authenticator software analyzes an image or each frame of a video, looking for evidence of manipulation that could be invisible to the naked eye.
Risky undercover work key in ANOM police coup Paris (AFP) June 10, 2021 In bamboozling criminal networks into embracing a bogus encrypted messaging app, police relied on cutting-edge tech to outflank gangsters in the sting that has become known as ANOM. In the operation some 12,000 phones were turned into listening devices, resulting in stunning success with more than 800 arrests worldwide so far. But none of it could have worked without the oldest of law enforcement ruses: An inside man tasked with winning the trust of a suspicious and ruthless underworld. "Hum ... read more
|
|||||||||||||
|
|
| The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |