4

確認 Deepfake Video Call 的方式

 2 years ago
source link: https://blog.gslin.org/archives/2022/08/10/10835/%e7%a2%ba%e8%aa%8d-deepfake-video-call-%e7%9a%84%e6%96%b9%e5%bc%8f/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

確認 Deepfake Video Call 的方式

Hacker News 首頁上看到「To uncover a deepfake video call, ask the caller to turn sideways (metaphysic.ai)」這篇,講怎麼在 video call 的時候辨認是不是 deepfake 的人。原文在「To Uncover a Deepfake Video Call, Ask the Caller to Turn Sideways」這邊可以讀到。

文章裡面介紹一個很簡單的方式,就是轉頭拍側面,會看到明顯的缺陷:

VsrMQP9.jpg

這張 GIF 會更明顯:

5CnP9g7.gif

Hacker News 上的討論也有人提到這是目前的技術限制,所以這個方法算是有效的。但以現在各類 machine learning 成長的速度來看,可能沒多久後就會有新技術突破這個方法了。

Related

FBI 警告愈來愈多使用假身份與 Deepfake 技術應徵遠端工作的事件

在 Hacker News 上看到「FBI: Stolen PII and deepfakes used to apply for remote tech jobs (bleepingcomputer.com)」這個很「有趣」的文章,原報導在「FBI: Stolen PII and deepfakes used to apply for remote tech jobs」,另外 FBI 的公告在「Deepfakes and Stolen PII Utilized to Apply for Remote Work Positions」這邊。 The FBI Internet Crime Complaint Center (IC3) warns of an increase…

July 2, 2022

In "Computer"

HiNet 讓 YouTube 變快的方法:擋掉 210.71.222.0/24

在「How to stop TWC ISPs sucking at Youtube」這篇看到作者 (在美國) 抱怨時代華納 (Time Warner Cable,TWC) 連 YouTube 看影片的速度很慢,然後發現擋掉某個網段就快很多了... 看了 Hacker News 上的討論以及以前得知的架構,這些 IP 有可能是: YouTube 自己的 CDN 伺服器,以 appliance 的形式放到 TWC 內。 TWC 買 YouTube cache solution 丟自己機房。 如果要猜的話,我會猜前者... 然後同樣問題也在 HiNet 發生,實際測試後就找到 210.71.222.x 這個網段。 在 Linux 下是使用 iptables 擋,其他作業系統可以在原文裡找到說明:(我自己的 Linux 是放到 /etc/rc.local…

March 1, 2013

In "CDN"

V7Labs 提供的 Chrome Extension,偵測圖片是否為人工智慧生成的

寫完上一篇「可以看 Chrome Extension 程式碼的 Chrome extension source viewer」後就可以來提「Fake Profile Detector tells you if people are real or fake online」這個了,文章裡面在介紹 V7Labs 所提供的 Chrome Extension:「Fake Profile Detector (Deepfake, GAN)」。 從套件的名字可以看出來他主要是偵測 GAN (Generative adversarial network) 類的類神經網路,這點在套件裡面說明也可以看到: Right-click on a profile picture, our model will detect if that image contains a GAN generated or…

April 4, 2022

In "API"

a611ee8db44c8d03a20edf0bf5a71d80?s=49&d=identicon&r=gAuthor Gea-Suan LinPosted on August 10, 2022Categories Computer, Murmuring, Network, SecurityTags ai, call, deepfake, learning, machine, video

Leave a Reply

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Notify me of follow-up comments by email.

Notify me of new posts by email.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Learn More)

Post navigation


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK