Detecting Deep-Fake Videos from Phoneme-Viseme Mismatches
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hany Farid [email protected]
Hany Farid [email protected] APPOINTMENTS University of California, Berkeley 2019 – Professor, Electrical Engineering and Computer Sciences (50%) Professor, School of Information (50%) Member, Berkeley Artificial Intelligence Lab Member, Center for Innovation in Vision and Optics Member, Vision Science Program Dartmouth College, Department of Computer Science 1999 – 2019 Albert Bradley 1915 Third Century Professor 2016 – 2019 Professor 2011 – 2016 William H. Neukom 1964 Distinguished Professor of Computational Science 2008 – 2011 David T. McLaughlin Distinguished Professor of Computer Science 2007 – 2008 Professor 2006 – 2007 Associate Professor 2004 – 2006 Assistant Professor 1999 – 2004 Dartmouth College, Tuck School of Business 2016 – 2019 Adjunct Professor of Business Administration Dartmouth College, Neukom Institute for Computational Science 2008 – 2011 Director PROFESSIONAL AI Foundation 2019 – present Board of Directors & Global AI Council Center for Investigative Reporting 2020 – present Advisory Committee Counter Extremism Project 2016 – present Senior Advisor Cyber Civil Rights Initiative 2019 – present Advisory Committee Fourandsix Technologies, Inc. 2011 – 2018 Chief Technology Officer & Co-founder Human Rights Center, University of California, Berkeley, School of Law 2019 – present Advisory Board Office of the Prosecutor, International Criminal Court 2018 – present Technology Advisory Board TikTok 2020 – present Content Advisory Council Truepic, Inc. 2018 – present Senior Advisor & Board of Advisors EDUCATION Massachusetts Institute of Technology 1997 – 1999 Postdoctoral Fellow, Brain and Cognitive Sciences (advisor: Ted Adelson) University of Pennsylvania 1993 – 1997 Ph.D., Computer Science (advisor: Eero Simoncelli) State University of New York at Albany 1990 – 1992 M.S., Computer Science University of Rochester 1984 – 1988 B.S., Computer Science with Applied Mathematics AWARDS National Academy of Inventors (NAI), Fellow, 2016 John Simon Guggenheim Fellowship, 2006 Alfred P. -
Learning to Infer Implicit Surfaces Without 3D Supervision
Learning to Infer Implicit Surfaces without 3D Supervision , , , , Shichen Liuy x, Shunsuke Saitoy x, Weikai Chen (B)y, and Hao Liy x z yUSC Institute for Creative Technologies xUniversity of Southern California zPinscreen {liushichen95, shunsuke.saito16, chenwk891}@gmail.com [email protected] Abstract Recent advances in 3D deep learning have shown that it is possible to train highly effective deep models for 3D shape generation, directly from 2D images. This is particularly interesting since the availability of 3D models is still limited compared to the massive amount of accessible 2D images, which is invaluable for training. The representation of 3D surfaces itself is a key factor for the quality and resolution of the 3D output. While explicit representations, such as point clouds and voxels, can span a wide range of shape variations, their resolutions are often limited. Mesh-based representations are more efficient but are limited by their ability to handle varying topologies. Implicit surfaces, however, can robustly handle complex shapes, topologies, and also provide flexible resolution control. We address the fundamental problem of learning implicit surfaces for shape inference without the need of 3D supervision. Despite their advantages, it remains nontrivial to (1) formulate a differentiable connection between implicit surfaces and their 2D renderings, which is needed for image-based supervision; and (2) ensure precise geometric properties and control, such as local smoothness. In particular, sampling implicit surfaces densely is also known to be a computationally demanding and very slow operation. To this end, we propose a novel ray-based field probing technique for efficient image-to-field supervision, as well as a general geometric regularizer for implicit surfaces, which provides natural shape priors in unconstrained regions. -
CEO & Co-Founder, Pinscreen, Inc. Distinguished Fellow, University Of
HaoLi CEO & Co-Founder, Pinscreen, Inc. Distinguished Fellow, University of California, Berkeley Pinscreen, Inc. Email [email protected] 11766 Wilshire Blvd, Suite 1150 Home page http://www.hao-li.com/ Los Angeles, CA 90025, USA Facebook http://www.facebook.com/li.hao/ PROFILE Date of birth 17/01/1981 Place of birth Saarbrücken, Germany Citizenship German Languages German, French, English, and Mandarin Chinese (all fluent and no accents) BIO I am CEO and Co-Founder of Pinscreen, an LA-based Startup that builds the world’s most advanced AI-driven virtual avatars, as well as a Distinguished Fellow of the Computer Vision Group at the University of California, Berkeley. Before that, I was an Associate Professor (with tenure) in Computer Science at the University of Southern California, as well as the director of the Vision & Graphics Lab at the USC Institute for Creative Technologies. I work at the intersection between Computer Graphics, Computer Vision, and AI, with focus on photorealistic human digitization using deep learning and data-driven techniques. I’m known for my work on dynamic geometry processing, virtual avatar creation, facial performance capture, AI-driven 3D shape digitization, and deep fakes. My research has led to the Animoji technology in Apple’s iPhone X, I worked on the digital reenactment of Paul Walker in the movie Furious 7, and my algorithms on deformable shape alignment have improved the radiation treatment for cancer patients all over the world. I have been keynote speaker at numerous major events, conferences, festivals, and universities, including the World Economic Forum (WEF) in Davos 2020 and Web Summit 2020. -
Innovations Dialogue. DEEPFAKES, TRUST & INTERNATIONAL SECURITY 25 AUGUST 2021 | 09:00-17:30 CEST
the 2021 innovations dialogue. DEEPFAKES, TRUST & INTERNATIONAL SECURITY 25 AUGUST 2021 | 09:00-17:30 CEST WELCOME AND OPENING REMARKS 09:00 Robin Geiss United Nations Institute for Disarmament Research KEYNOTE ADDRESS: TRUST AND INTERNATIONAL SECURITY IN THE ERA 09:10 OF DEEPFAKES Nina Schick Tamang Ventures The scene-setting keynote address will explore the importance of trust for international security and stability and shed light on the extent to which the growing deepfake phenomenon could undermine this trust. UNPACKING DEEPFAKES – CREATION AND DISSEMINATION OF DEEPFAKES 09:40 MODERATED BY: Giacomo Persi Paoli United Nations Institute for Disarmament Research FEATURING: Ashish Jaiman Microsoft Hao Li Pinscreen and University of California, Berkeley Katerina Sedova Center for Security and Emerging Technology, Georgetown University This panel will provide a technical overview of how visual, audio and textual deepfakes are generated and disseminated. The key questions it will seek to address include: what are the underlying technologies of deepfakes? How are deepfakes disseminated, particularly on social media and communication platforms? What types of deepfakes currently exist and what is on the horizon? Which actors currently have the means to create and disseminate them? COFFEE BREAK 11:15 UNDERSTANDING THE IMPLICATIONS FOR INTERNATIONAL SECURITY 11:30 AND STABILITY MODERATED BY: Kerstin Vignard United Nations Institute for Disarmament Research FEATURING: Saiffudin Ahmed Nanyang Technological University Alexi Drew RAND Europe Anita Hazenberg INTERPOL Innovation Centre Moliehi Makumane United Nations Institute for Disarmament Research Carmen Valeria Solis Rivera Ministry of Foreign Affairs of Mexico Petr Topychkanov Stockholm International Peace Research Institute This panel will examine the uses of deepfakes and the extent to which they could erode trust and present novel risks for international security and stability. -
Employing Optical Flow on Convolutional Recurrent Structures for Deepfake Detection
Rochester Institute of Technology RIT Scholar Works Theses 6-13-2020 Employing optical flow on convolutional recurrent structures for deepfake detection Akash Chintha [email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Chintha, Akash, "Employing optical flow on convolutional recurrent structures for deepfake detection" (2020). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Employing optical flow on convolutional recurrent structures for deepfake detection by Akash Chintha June 13, 2020 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Engineering Department of Computer Engineering Kate Gleason College of Engineering Rochester Institute of Technology Approved By: Dr. Raymond Ptucha Date Primary Advisor - RIT Dept. of Computer Engineering Dr. Matthew Wright Date Secondary Advisor - RIT Dept. of Computing and Information Sciences Dr. Shanchieh Yang Date Secondary Advisor - RIT Dept. of Computer Engineering Akash Chintha's Masters Thesis Document 1 ACKNOWLEDGEMENTS I would like to take this opportunity to thank Dr. Raymond Ptucha and Dr. Matthew Wright for continuous guidance and support in my research. I am also thankful to Dr. Shanchieh Yang for showing interest in my work and being a part of the thesis committee. I would like to thank my coresearchers Saniat Sohrawardi, Aishwarya Rao, Bao Thai, Akhil Santha, and Kartavya Bhatt for assisting me with my thesis research. -
(Literary) Special Effect: (Inter)Mediality in the Contemporary US-American Novel and the Digital Age
The (Literary) Special Effect: (Inter)Mediality in the Contemporary US-American Novel and the Digital Age Dissertation zur Erlangung des philosophischen Doktorgrades an der Philosophischen Fakultät der Georg-August-Universität Göttingen vorgelegt von Bogna Kazur aus Lodz, Polen Göttingen 2018 Contents 1 Introduction ......................................................................................................................... 3 2 The Question of Medium Specificity in the Digital Age .................................................. 29 3 House of Leaves (2000) and the Uncanny Dawn of the Digital........................................ 39 3.1 Digital Paranoia: Arriving on Ash Tree Lane ........................................................... 39 3.2 Writing about House of Leaves ................................................................................. 43 3.3 Intermedial Overabundance: Taming House of Leaves ............................................. 49 3.4 An “Explicit” Approach to the Digital Age ............................................................... 54 3.5 What Kind of Movie is THE NAVIDSON RECORD? ..................................................... 68 4 In the Midst of the Post-Cinematic Age: Marisha Pessl’s Night Film (2013) .................. 88 4.1 Meant for Adaptation: Night Film and the Fallacy of First Impressions ................... 88 4.2 The Post-Cinematic Reception of Film ..................................................................... 96 4.3 The Last Enigma: Cordova’s Underworld .............................................................. -
Attribute-Based, Usefully Secure Email
Dartmouth College Dartmouth Digital Commons Dartmouth College Ph.D Dissertations Theses and Dissertations 8-1-2008 Attribute-Based, Usefully Secure Email Christopher P. Masone Dartmouth College Follow this and additional works at: https://digitalcommons.dartmouth.edu/dissertations Part of the Computer Sciences Commons Recommended Citation Masone, Christopher P., "Attribute-Based, Usefully Secure Email" (2008). Dartmouth College Ph.D Dissertations. 26. https://digitalcommons.dartmouth.edu/dissertations/26 This Thesis (Ph.D.) is brought to you for free and open access by the Theses and Dissertations at Dartmouth Digital Commons. It has been accepted for inclusion in Dartmouth College Ph.D Dissertations by an authorized administrator of Dartmouth Digital Commons. For more information, please contact [email protected]. Attribute-Based, Usefully Secure Email A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science by Christopher P. Masone DARTMOUTH COLLEGE Hanover, New Hampshire August, 2008 Examining Committee: (chair) Sean W. Smith, Ph.D. David F. Kotz, Ph.D. Christopher J. Bailey-Kellogg, Ph.D. Denise L. Anthony, Ph.D. M. Angela Sasse, Ph.D. Charles K. Barlowe, PhD Dean of Graduate Studies Abstract A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer Interaction and Security (HCISEC) refutes this assumption. All researchers in this field agree that focusing on aligning usability and security goals can enable the design of systems that will be more secure under actual usage. -
Rapid Avatar Capture and Simulation Using Commodity Depth Sensors
Rapid Avatar Capture and Simulation using Commodity Depth Sensors Ari Shapiro∗1, Andrew Feng†1, Ruizhe Wang‡2, Hao Li§2, Mark Bolas¶1, Gerard Medionik2, and Evan Suma∗∗1 1Institute for Creative Technologies, University of Southern California 2University of Southern California Abstract objects into a virtual environment in 3D. For ex- We demonstrate a method of acquiring a 3D ample, a table, a room, or work of art can be model of a human using commodity scanning quickly scanned, modeled and displayed within hardware and then controlling that 3D figure in a virtual world with a handheld, consumer scan- a simulated environment in only a few minutes. ner. There is great value to the ability to quickly The model acquisition requires 4 static poses and inexpensively capture real-world objects taken at 90 degree angles relative to each and create their 3D counterparts. While numer- other. The 3D model is then given a skeleton ous generic 3D models are available for low- and smooth binding information necessary for or no-cost for use in 3D environments and vir- control and simulation. The 3D models that tual worlds, it is unlikely that such acquired 3D are captured are suitable for use in applications model matches the real object to a reasonable where recognition and distinction among char- extent without individually modeling the object. acters by shape, form or clothing is important, In addition, the ability to capture specific ob- such as small group or crowd simulations, or jects that vary from the generic counterparts is other socially oriented applications. Due to the valuable for recognition, interaction and com- speed at which a human figure can be captured prehension within a virtual world. -
ARCH: Animatable Reconstruction of Clothed Humans
ARCH: Animatable Reconstruction of Clothed Humans Zeng Huang1,2,∗ Yuanlu Xu1, Christoph Lassner1, Hao Li2, Tony Tung1 1Facebook Reality Labs, Sausalito, USA 2University of Southern California, USA [email protected], [email protected], [email protected], [email protected], [email protected] Canonical Reconstructed Abstract Input Reposed Reconstruction 3D Avatar In this paper, we propose ARCH (Animatable Recon- struction of Clothed Humans), a novel end-to-end frame- work for accurate reconstruction of animation-ready 3D clothed humans from a monocular image. Existing ap- proaches to digitize 3D humans struggle to handle pose variations and recover details. Also, they do not produce models that are animation ready. In contrast, ARCH is a learned pose-aware model that produces detailed 3D rigged full-body human avatars from a single unconstrained RGB image. A Semantic Space and a Semantic Deformation Field are created using a parametric 3D body estimator. They allow the transformation of 2D/3D clothed humans into a canonical space, reducing ambiguities in geometry caused by pose variations and occlusions in training data. Figure 1. Given an image of a subject in arbitrary pose (left), Detailed surface geometry and appearance are learned us- ARCH creates an accurate and animatable avatar with detailed ing an implicit function representation with spatial local clothing (center). As rigging and albedo are estimated, the avatar can be reposed and relit in new environments (right). features. Furthermore, we propose additional per-pixel su- pervision on the 3D reconstruction using opacity-aware dif- Moreover, the lack of automatic rigging prevents animation- ferentiable rendering. Our experiments indicate that ARCH based applications. -
Headphones Needed: ☒ YES ☐ NO
Erik Amerikaner.guru Tech In The News Headphones Needed: ☒ YES ☐ NO Step One: Watch this video Step Two: Read the story at the bottom of this document Step Three: Navigate to this website and review the information Step Four: Create a Word document, and list the five W’s (Who,What,Where,When,Why) of the story. Why is this technology potentially so important to society? What are the pros/cons of this technology? Can it be used for good and/or evil? What should a ‘consumer’ of this technology be aware of? If you were showing this technology to a young person, how would you describe it? Do you think this technology should be developed? Why/why not? Submit Your PinScreen_your name Assignment : To Mr. Amerikaner Gdrive Using: 2/19/2018 Fake videos are on the rise. As they become more realistic, seeing shouldn't always be believing ADVERTISEMENT 12 WEEKS FOR 99¢ TOPICS LOG IN Sale ends 2/28 SPECIAL OFFER | 12 WEEKS FOR 99¢ Former Trump aide Richard Netanyahu in deeper peril as L.A. County's homeless problem Toyota Prius so Gates to plead guilty; agrees to more Israeli officials are arrested is worsening despite billions reduce fuel effi TECHNOLOGY BUSINESS LA TIMES testify against Manafort, sourc… on corruption charges from tax measures say Fake videos are on the rise. As they become more realistic, seeing shouldn't always be believing By DAVID PIERSON FEB 19, 2018 | 4:00 AM 12 WEEKS FOR ONLY 99¢ SPECIAL OFFER SAVE NOW Hurry, offer ends 2/28 Pinscreen, a Los Angeles start-up, uses real-time capture technology to make photorealistic avatars. -
Chloe A. Legendre E-Mail: [email protected] Cell: (443) 690-6924
Chloe A. LeGendre E-mail: [email protected] Cell: (443) 690-6924 www.chloelegendre.com RESEARCH I develop and apply computer vision and computational photography techniques to STATEMENT solve problems in computer graphics, towards the goal of creating compelling, photo- realistic content for people to enjoy. RESEARCH Computational Photography, Appearance Capture, Lighting Capture, Color Imaging & INTERESTS Measurement, Computer Vision for Computer Graphics EDUCATION University of Southern California, Los Angeles, CA August 2015 - May 2019 Ph.D., Computer Science; GPA: 3.82 Dissertation: ”Compositing Real and Virtual Objects with Realistic, Color-Accurate Illumination” Stevens Institute of Technology, Hoboken, NJ September 2012 - May 2015 M.S., Computer Science; GPA: 4.00 University of Pennsylvania, Philadelphia, PA September 2005 - May 2009 B.S. in Engineering; GPA: 3.69 PROFESSIONAL Google Research, Los Angeles, CA EXPERIENCE Senior Software Engineer - Computational Photography June 2020 - present • Core technology research and development for computational photography. • Developed machine learning based lighting estimation module for the Portrait Light feature, a hero launch for the Google Pixel 2020 phone in both Google Camera and Google Photos. Google Daydream (VR/AR), Los Angeles, CA Software Engineer - Augmented Reality June 2019 - June 2020 • Core technology research and development for mobile AR. Student Researcher - Augmented Reality December 2017 - May 2019 • ML-based lighting estimation technique was published at CVPR 2019 and shipped as the Environmental HDR Lighting Estimation module for ARCore in June 2019. • Trained ML models using distributed Tensorflow environment. Software Engineering Intern - Augmented Reality June 2017 - August 2017 • Developed mobile AR lighting estimation techniques for Google Pixel Phone’s AR Stickers camera mode (Playground). -
Building Realistic Forensic Corpora to Enable Undergraduate Education and Research
Building Realistic Forensic Corpora to Enable Undergraduate Education and Research Simson L. Garfinkel Associate Professor, Naval Postgraduate School July 27, 2010 — 9:00am - 9:45am http://digitalcorpora.org/ NSF Award DUE-0919593: "Creating Realistic Forensic Corpora for Undergraduate Education and Research" 1 NPS is the Navyʼs Research University. Location: !Monterey, CA Campus Size: !627 acres Students: 1500 . US Military (All 5 services) . US Civilian (Scholarship for Service & SMART) . Foreign Military (30 countries) Digital Evaluation and Exploitation: . Research computer forensics. Develop “corpora” for use in research & education. Identify limitations of current tools & opportunities for improvement. http://domex.nps.edu/deep/ “The views expressed in this presentation are those of the author and do not necessarily reflect those of the Department of Defense or the US Government.” 2 Digital Forensics Research is at a turning point. Yesterdayʼs work was primarily reverse engineering. Key technical challenges: . Evidence preservation. File recovery (file system support); Undeleting files . Encryption cracking. Keyword search. 3 Digital Forensics Research is at a turning point. Todayʼs work is increasingly scientific. Evidence Reconstruction . Files (fragment recovery carving) . Timelines (visualization) Clustering and data mining Social network analysis Same Community College Drives #74 x #77 25 CCNS in common Same Car Dealership Sense-making Drives #179 & #206 Drives #171 & #172 13 CCNS 13 CCNS in common in common Same Medical Center 4 Science requires the scientific process. Hallmarks of Science: . Controlled and repeatable experiments. No privileged observers. Why repeat some other scientist"s experiment? . Validate that an algorithm is properly implemented. Determine if your new algorithm is better than someone elseʼs old one.