Deep Fake Creation by Deep Learning
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Xinggan for Person Image Generation
XingGAN for Person Image Generation Hao Tang1;2, Song Bai2, Li Zhang2, Philip H.S. Torr2, and Nicu Sebe1;3 1University of Trento ([email protected]) 2University of Oxford 3Huawei Research Ireland Abstract. We propose a novel Generative Adversarial Network (Xing- GAN or CrossingGAN) for person image generation tasks, i.e., translat- ing the pose of a given person to a desired one. The proposed Xing gener- ator consists of two generation branches that model the person's appear- ance and shape information, respectively. Moreover, we propose two novel blocks to effectively transfer and update the person's shape and appear- ance embeddings in a crossing way to mutually improve each other, which has not been considered by any other existing GAN-based image genera- tion work. Extensive experiments on two challenging datasets, i.e., Market- 1501 and DeepFashion, demonstrate that the proposed XingGAN ad- vances the state-of-the-art performance both in terms of objective quan- titative scores and subjective visual realness. The source code and trained models are available at https://github.com/Ha0Tang/XingGAN. Keywords: Generative Adversarial Networks (GANs), Person Image Generation, Appearance Cues, Shape Cues 1 Introduction The problem of person image generation aims to generate photo-realistic per- son images conditioned on an input person image and several desired poses. This task has a wide range of applications such as person image/video genera- tion [41,9,2,11,19] and person re-identification [45,28]. Exiting methods such as [21,22,31,45,35] have achieved promising performance on this challenging task. -
Artificial Intelligence in Health Care: the Hope, the Hype, the Promise, the Peril
Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril Michael Matheny, Sonoo Thadaney Israni, Mahnoor Ahmed, and Danielle Whicher, Editors WASHINGTON, DC NAM.EDU PREPUBLICATION COPY - Uncorrected Proofs NATIONAL ACADEMY OF MEDICINE • 500 Fifth Street, NW • WASHINGTON, DC 20001 NOTICE: This publication has undergone peer review according to procedures established by the National Academy of Medicine (NAM). Publication by the NAM worthy of public attention, but does not constitute endorsement of conclusions and recommendationssignifies that it is the by productthe NAM. of The a carefully views presented considered in processthis publication and is a contributionare those of individual contributors and do not represent formal consensus positions of the authors’ organizations; the NAM; or the National Academies of Sciences, Engineering, and Medicine. Library of Congress Cataloging-in-Publication Data to Come Copyright 2019 by the National Academy of Sciences. All rights reserved. Printed in the United States of America. Suggested citation: Matheny, M., S. Thadaney Israni, M. Ahmed, and D. Whicher, Editors. 2019. Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril. NAM Special Publication. Washington, DC: National Academy of Medicine. PREPUBLICATION COPY - Uncorrected Proofs “Knowing is not enough; we must apply. Willing is not enough; we must do.” --GOETHE PREPUBLICATION COPY - Uncorrected Proofs ABOUT THE NATIONAL ACADEMY OF MEDICINE The National Academy of Medicine is one of three Academies constituting the Nation- al Academies of Sciences, Engineering, and Medicine (the National Academies). The Na- tional Academies provide independent, objective analysis and advice to the nation and conduct other activities to solve complex problems and inform public policy decisions. -
Real Vs Fake Faces: Deepfakes and Face Morphing
Graduate Theses, Dissertations, and Problem Reports 2021 Real vs Fake Faces: DeepFakes and Face Morphing Jacob L. Dameron WVU, [email protected] Follow this and additional works at: https://researchrepository.wvu.edu/etd Part of the Signal Processing Commons Recommended Citation Dameron, Jacob L., "Real vs Fake Faces: DeepFakes and Face Morphing" (2021). Graduate Theses, Dissertations, and Problem Reports. 8059. https://researchrepository.wvu.edu/etd/8059 This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected]. Real vs Fake Faces: DeepFakes and Face Morphing Jacob Dameron Thesis submitted to the Benjamin M. Statler College of Engineering and Mineral Resources at West Virginia University in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering Xin Li, Ph.D., Chair Natalia Schmid, Ph.D. Matthew Valenti, Ph.D. Lane Department of Computer Science and Electrical Engineering Morgantown, West Virginia 2021 Keywords: DeepFakes, Face Morphing, Face Recognition, Facial Action Units, Generative Adversarial Networks, Image Processing, Classification. -
Synthetic Video Generation
Synthetic Video Generation Why seeing should not always be believing! Alex Adam Image source https://www.pocket-lint.com/apps/news/adobe/140252-30-famous-photoshopped-and-doctored-images-from-across-the-ages Image source https://www.pocket-lint.com/apps/news/adobe/140252-30-famous-photoshopped-and-doctored-images-from-across-the-ages Image source https://www.pocket-lint.com/apps/news/adobe/140252-30-famous-photoshopped-and-doctored-images-from-across-the-ages Image source https://www.pocket-lint.com/apps/news/adobe/140252-30-famous-photoshopped-and-doctored-images-from-across-the-ages Image Tampering Historically, manipulated Off the shelf software (e.g imagery has deceived Photoshop) exists to do people this now Has become standard in Public have become tabloids/social media somewhat numb to it - it’s no longer as impactful/shocking How does machine learning fit in? Advent of machine learning Video manipulation is now has made image also tractable with enough manipulation even easier data and compute Can make good synthetic Public are largely unaware of videos using a gaming this and the danger it poses! computer in a bedroom Part I: Faceswap ● In 2017, reddit (/u/deepfakes) posted Python code that uses machine learning to swap faces in images/video ● ‘Deepfake’ content flooded reddit, YouTube and adult websites ● Reddit since banned this content (but variants of the code are open source https://github.com/deepfakes/faceswap) ● Autoencoder concepts underlie most ‘Deepfake’ methods Faceswap Algorithm Image source https://medium.com/@jonathan_hui/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9 Inference Image source https://medium.com/@jonathan_hui/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9 ● Faceswap model is an autoencoder. -
Video and Audio Deepfakes: What Lawyers Need to Know by Sharon D
Video and Audio Deepfakes: What Lawyers Need to Know by Sharon D. Nelson, Esq., and John W. Simek © 2020 Sensei Enterprises, Inc. If some nefarious person has decent photos of your face, you too (like so many unfortunate Hollywood celebrities) could appear to be the star of a pornographic video. If someone has recordings of your voice (from your website videos, CLEs you have presented, speeches you’ve given, etc.), they can do a remarkably good job of simulating your spoken words and, just as an example, call your office manager and authorize a wire transfer – something the office manager may be willing to do because of “recognizing” your voice. Unnerving? Yes, but it is the reality of today. And if you don’t believe how “white hot” deepfakes are, just put a Google alert on that word and you’ll be amazed at the volume of daily results. Political and Legal Implications We have already seen deepfakes used in the political area (the “drunk” Nancy Pelosi deepfake, a reference to which was tweeted by the president), and many commentators worry that deepfake videos will ramp up for the 2020 election. Some of them, including the Pelosi video, are referred to as “cheapfakes” because they are so poorly done (basically running the video at 75 percent speed to simulate drunkenness), but that really doesn’t matter if large numbers of voters believe it’s real. And the days when you could tell a deepfake video by the fact that the person didn’t blink are rapidly vanishing as the algorithms have gotten smarter. -
Neural Rendering and Reenactment of Human Actor Videos
Neural Rendering and Reenactment of Human Actor Videos LINGJIE LIU, University of Hong Kong, Max Planck Institute for Informatics WEIPENG XU, Max Planck Institute for Informatics MICHAEL ZOLLHÖFER, Stanford University, Max Planck Institute for Informatics HYEONGWOO KIM, FLORIAN BERNARD, and MARC HABERMANN, Max Planck Institute for Informatics WENPING WANG, University of Hong Kong CHRISTIAN THEOBALT, Max Planck Institute for Informatics (real) Driving motion (synth.) Output Fig. 1. We propose a novel learning-based approach for the animation and reenactment of human actor videos. The top row shows some frames of the video from which the source motion is extracted, and the bottom row shows the corresponding synthesized target person imagery reenacting the source motion. We propose a method for generating video-realistic animations of real hu- images are then used to train a conditional generative adversarial network mans under user control. In contrast to conventional human character render- that translates synthetic images of the 3D model into realistic imagery of ing, we do not require the availability of a production-quality photo-realistic the human. We evaluate our method for the reenactment of another person 3D model of the human, but instead rely on a video sequence in conjunction that is tracked in order to obtain the motion data, and show video results with a (medium-quality) controllable 3D template model of the person. With generated from artist-designed skeleton motion. Our results outperform the that, our approach significantly reduces production cost compared to conven- state-of-the-art in learning-based human image synthesis. tional rendering approaches based on production-quality 3D models, and can CCS Concepts: • Computing methodologies → Computer graphics; also be used to realistically edit existing videos. -
Complement the Broken Pose in Human Image Synthesis
Focus and retain: Complement the Broken Pose in Human Image Synthesis Pu Ge†, Qiushi Huang†, Wei Xiang‡, Xue Jing, Yule Li, Yiyong Li, Zhun Sun Bigo Technology PTE. LTD, Singapore {gepu,huangqiushi,xiangwei1}@bigo.sg Abstract Given a target pose, how to generate an image of a spe- cific style with that target pose remains an ill-posed and thus complicated problem. Most recent works treat the human pose synthesis tasks as an image spatial transformation prob- lem using flow warping techniques. However, we observe that, due to the inherent ill-posed nature of many compli- cated human poses, former methods fail to generate body parts. To tackle this problem, we propose a feature-level flow attention module and an Enhancer Network. The flow attention module produces a flow attention mask to guide the combination of the flow-warped features and the structural pose features. Then, we apply the Enhancer Network to re- fine the coarse image by injecting the pose information. We present our experimental evaluation both qualitatively and quantitatively on DeepFashion, Market-1501, and Youtube dance datasets. Quantitative results show that our method has 12.995 FID at DeepFashion, 25.459 FID at Market-1501, 14.516 FID at Youtube dance datasets, which outperforms some state-of-the-arts including Guide-Pixe2Pixe, Global- Flow-Local-Attn, and CocosNet. 1. Introduction Figure 1: (a) The inputs of the task: a reference image with a target pose. (b) The outputs of the task: a generated human in Conditional image generation and synthesis becomes a the target pose. From left to right: the ground truth, results popular computer vision task recent years [29]. -
Exposing Deepfake Videos by Detecting Face Warping Artifacts
Exposing DeepFake Videos By Detecting Face Warping Artifacts Yuezun Li, Siwei Lyu Computer Science Department University at Albany, State University of New York, USA Abstract sibility to large-volume training data and high-throughput computing power, but more to the growth of machine learn- In this work, we describe a new deep learning based ing and computer vision techniques that eliminate the need method that can effectively distinguish AI-generated fake for manual editing steps. videos (referred to as DeepFake videos hereafter) from real In particular, a new vein of AI-based fake video gen- videos. Our method is based on the observations that cur- eration methods known as DeepFake has attracted a lot rent DeepFake algorithm can only generate images of lim- of attention recently. It takes as input a video of a spe- ited resolutions, which need to be further warped to match cific individual (’target’), and outputs another video with the original faces in the source video. Such transforms leave the target’s faces replaced with those of another individ- distinctive artifacts in the resulting DeepFake videos, and ual (’source’). The backbone of DeepFake are deep neu- we show that they can be effectively captured by convo- ral networks trained on face images to automatically map lutional neural networks (CNNs). Compared to previous the facial expressions of the source to the target. With methods which use a large amount of real and DeepFake proper post-processing, the resulting videos can achieve a generated images to train CNN classifier, our method does high level of realism. not need DeepFake generated images as negative training In this paper, we describe a new deep learning based examples since we target the artifacts in affine face warp- method that can effectively distinguish DeepFake videos ing as the distinctive feature to distinguish real and fake from the real ones. -
JCS Deepfake
Don’t Believe Your Eyes (Or Ears): The Weaponization of Artificial Intelligence, Machine Learning, and Deepfakes Joe Littell 1 Agenda ØIntroduction ØWhat is A.I.? ØWhat is a DeepFake? ØHow is a DeepFake created? ØVisual Manipulation ØAudio Manipulation ØForgery ØData Poisoning ØConclusion ØQuestions 2 Introduction Deniss Metsavas, an Estonian soldier convicted of spying for Russia’s military intelligence service after being framed for a rape in Russia. (Picture from Daniel Lombroso / The Atlantic) 3 What is A.I.? …and what is it not? General Artificial Intelligence (AI) • Machine (or Statistical) Learning (ML) is a subset of AI • ML works through the probability of a new event happening based on previously gained knowledge (Scalable pattern recognition) • ML can be supervised, leaning requiring human input into the data, or unsupervised, requiring no input to the raw data. 4 What is a Deepfake? • Deepfake is a mash up of the words for deep learning, meaning machine learning using a neural network, and fake images/video/audio. § Taken from a Reddit user name who utilized faceswap app for his own ‘productions.’ • Created by the use of two machine learning algorithms, Generative Adversarial Networks, and Auto-Encoders. • Became known for the use in underground pornography using celebrity faces in highly explicit videos. 5 How is a Deepfake created? • Deepfakes are generated using Generative Adversarial Networks, and Auto-Encoders. • These algorithms work through the uses of competing systems, where one creates a fake piece of data and the other is trained to determine if that datatype is fake or not • Think of it like a counterfeiter and a police officer. -
Deepfakes 2020 the Tipping Point, Sentinel
SENTINEL DEEPFAKES 2020: THE TIPPING POINT The Current Threat Landscape, its Impact on the U.S 2020 Elections, and the Coming of AI-Generated Events at Scale. Sentinel - 2020 1 About Sentinel. Sentinel works with governments, international media outlets and defense agencies to help protect democracies from disinformation campaigns, synthetic media and information operations by developing a state-of-the-art AI detection platform. Headquartered in Tallinn, Estonia, the company was founded by ex-NATO AI and cybersecurity experts, and is backed by world-class investors including Jaan Tallinn (Co-Founder of Skype & early investor in DeepMind) and Taavet Hinrikus (Co-Founder of TransferWise). Our vision is to become the trust layer for the Internet by verifying the entire critical information supply chain and safeguard 1 billion people from information warfare. Acknowledgements We would like to thank our investors, partners, and advisors who have helped us throughout our journey and share our vision to build a trust layer for the internet. Special thanks to Mikk Vainik of Republic of Estonia’s Ministry of Economic Affairs and Communications, Elis Tootsman of Accelerate Estonia, and Dr. Adrian Venables of TalTech for your feedback and support as well as to Jaan Tallinn, Taavet Hinrikus, Ragnar Sass, United Angels VC, Martin Henk, and everyone else who has made this report possible. Johannes Tammekänd CEO & Co-Founder © 2020 Sentinel Contact: [email protected] Authors: Johannes Tammekänd, John Thomas, and Kristjan Peterson Cite: Deepfakes 2020: The Tipping Point, Johannes Tammekänd, John Thomas, and Kristjan Peterson, October 2020 Sentinel - 2020 2 Executive Summary. “There are but two powers in the world, the sword and the mind. -
Unpaired Pose Guided Human Image Generation
Research Collection Conference Paper Unpaired Pose Guided Human Image Generation Author(s): Chen, Xu; Song, Jie; Hilliges, Otmar Publication Date: 2019 Permanent Link: https://doi.org/10.3929/ethz-b-000396290 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library Unpaired Pose Guided Human Image Generation Xu Chen Jie Song Otmar Hilliges AIT Lab, ETH Zurich {xuchen,jsong,otmarh}@inf.ethz.ch Abstract This paper studies the task of full generative modelling of realistic images of humans, guided only by coarse sketch of the pose, while providing control over the specific instance or type of outfit worn by the user. This is a difficult prob- lem because input and output domain are very different and direct image-to-image translation becomes infeasible. We propose an end-to-end trainable network under the gener- ative adversarial framework, that provides detailed control over the final appearance while not requiring paired train- ing data and hence allows us to forgo the challenging prob- lem of fitting 3D poses to 2D images. The model allows to generate novel samples conditioned on either an image taken from the target domain or a class label indicating the style of clothing (e.g., t-shirt). We thoroughly evaluate the architecture and the contributions of the individual compo- nents experimentally. Finally, we show in a large scale per- ceptual study that our approach can generate realistic look- Figure 1: Generating humans in clothing: Our network ing images and that participants struggle in detecting fake takes a pose sketch as input and generates realistic images, images versus real samples, especially if faces are blurred. -
CNN-Generated Images Are Surprisingly Easy to Spot... for Now
CNN-generated images are surprisingly easy to spot... for now Sheng-Yu Wang1 Oliver Wang2 Richard Zhang2 Andrew Owens1,3 Alexei A. Efros1 UC Berkeley1 Adobe Research2 University of Michigan3 synthetic real ProGAN [19] StyleGAN [20] BigGAN [7] CycleGAN [48] StarGAN [10] GauGAN [29] CRN [9] IMLE [23] SITD [8] Super-res. [13] Deepfakes [33] Figure 1: Are CNN-generated images hard to distinguish from real images? We show that a classifier trained to detect images generated by only one CNN (ProGAN, far left) can detect those generated by many other models (remaining columns). Our code and models are available at https://peterwang512.github.io/CNNDetection/. Abstract are fake [14]. This issue has started to play a significant role in global politics; in one case a video of the president of In this work we ask whether it is possible to create Gabon that was claimed by opposition to be fake was one a “universal” detector for telling apart real images from factor leading to a failed coup d’etat∗. Much of this con- these generated by a CNN, regardless of architecture or cern has been directed at specific manipulation techniques, dataset used. To test this, we collect a dataset consisting such as “deepfake”-style face replacement [2], and photo- of fake images generated by 11 different CNN-based im- realistic synthetic humans [20]. However, these methods age generator models, chosen to span the space of com- represent only two instances of a broader set of techniques: monly used architectures today (ProGAN, StyleGAN, Big- image synthesis via convolutional neural networks (CNNs).