Assessment2 Using Critical Digital Literacy Skills to Evaluate Online Information Related to Deep Fake Technology. Prakriti
SUNDAY
JULY 28 ACU |
VLOG-2 BISTA PRAKRITI (S00365886) |
|
|
||||||||
|
|||||||||||
|
|||||||||||
What
Are Deepfakes: Definition, Meaning, Technology, Types, & Examples
(scienceabc.com) Also
Read: How Does Face App Work? Defining Deepfake
Technology As synthetic
media that have been digitally altered to replace one person's likeness with
another creating realistic-looking content. -By john Bandon, Fox News, Feb 16, 2018 Terrifying
High-tech Porn Creepy ‘Deepfake’ Videos are on the rise. Terrifying high-tech porn: Creepy 'deepfake' videos
are on the rise | Fox News Joshua Watson, who runs the tech
company Ironrock
Solutions, |
|
![]() With the powerful language models and libraries, AI-powered software tools can now compose prose with humanlike. |
|||||||||
|
|
||||||||||
|
|||||||||||
Whose identities are manipulated,
leading to privacy invasion and reputation harm. there’s the potential for political abuse. Want
to discredit an enemy? Indian journalist Rana Ayyub knows how that works:
In April 2018, her face was in a deepfake porn video that went viral across
the subcontinent, apparently because she is an outspoken Muslim woman whose
investigations offended India’s ruling party. Rana Ayyub's Fight for Truth and Journalism in Modi's
India | TIME
|
Synthetic media: The real trouble with
deepfakes | Knowable Magazine |
||||||||||
The latest exploit? They are called deepfake, and they are speaking like Wildfire. |
|
||||||||||
Why Deepfake Matters? Significant issue: They can be misused to create child
sexual abuse material, revenge porn, fake news and financial Fraud. |
|||||||||||
Example of the real and fake news data
|
|||||||||||
|
|||||||||||
Deepfake involves two algorithms: -Generators- These create new image based on initial data. -Discriminators- They evaluate content for realism and refine it
iteratively. |
-
Erosion of trust in media and information. -Harm to individuals
and organization through potential defamation, manipulation and fraudulent
activities. -Invest in improving identify verification systems. -Biometric verification- using unique physical or
behavioral traits for authentication. Lifeless verification-
ensuring that the person is physically present during identify
verification. |
AN YOU BELIEVE THIS IS ME, Trying AI through Snapchat creepy RIGHT? |
|||||||||
|
. |
|
|||||||||
-This interplay
of AI technologies allows for the creation of highly convincing Synthetic
media What are deepfakes?
How they work + how to spot one - Norton |
|
|
|||||||||
|
|
||||||||||
|
|
||||||||||
|
Comments
Post a Comment