Skip to content
deepfake

Apr 02, 2024

Understanding the Technology Behind Deepfake

How can deepfake mimic someone's face? Where does deepfake get the images or voices of someone?

Deepfake poses a new threat as it has the potential to be misused for spreading false information and violating privacy. Initially used for entertainment especially in movies, deepfake is a technique to mimic someone's image and voice using AI. The results of deepfake look very realistic, but they are entirely fake.

The question is, how can deepfake mimic someone's face? Where does deepfake get the images or voices of someone?

The process typically begins with compiling hundreds or even thousands of images, which serve to train the AI "muscles." Through this process, AI can understand complex facial features and expressions, enabling it to reconstruct and manipulate them.

The AI technology crucial to the development of deepfake is Generative Adversarial Networks (GANs). This system consists of two networks: the Generator and the Discriminator.

  1. Generator:

The generator network is responsible for creating synthetic data resembling real data (images, videos, and audio) from the given dataset. Initially, the generator produces random results. However, through continuous training, the system learns to produce realistic synthetic (artificial) data.

  1. Discriminator:

The discriminator's function is to differentiate between real data and synthetic data created by the generator. The more synthetic data produced by the generator, the harder the discriminator works to find the differences from real data.

In the context of deepfake, the generator and discriminator are designed to continuously compete. This training makes the generator more skilled at creating synthetic data and the discriminator smarter at distinguishing between real and synthetic data. The smarter the discriminator, the smarter the generator becomes in creating high-quality synthetic data. From this process, highly realistic deepfakes are born.

The Process of Creating Deepfake

  • Data Collection and Preprocessing:

The process of creating deepfake starts with collecting a large dataset containing images or videos of the target individual from various sources. Then, before processing, there is a process of standardizing the image quality to improve the quality of the resulting deepfake.

  • Training Deepfake Models:

Training deepfake models involves training GANs to capture facial expressions, lip movements, speech patterns, and other facial elements of the target individual. In this stage, the generator and discriminator are continuously trained to make the output more similar to the original.

In conclusion, the output of deepfake is the result of continuous training of the technology behind it. Understanding this technology is the first step in developing effective detection solutions and mitigating its negative impacts. One solution that can be used is Deepfake Shield. As part of the data protection solution, VIDA offers deepfake shield to strengthen and control the entire process towards access to biometric systems, so that any fraud loopholes can be prevented.

Download whitepaper VIDA "Are Indonesian Businesses Ready to Combat AI-Generated Fraud?" di sini 

VIDA - Verified Identity for All. VIDA provides a trusted digital identity platform.

Latest Articles

The Importance of Biometric Authentication in the Banking Sector
biometric authentication

The Importance of Biometric Authentication in the Banking Sector

The digital banking world requires high security and efficiency in its operations. One way to achieve this is by using biometric authentica...

July 18, 2024

Relying on PINs and OTPs? Discover Why It's Time to Upgrade
biometric authentication

Relying on PINs and OTPs? Discover Why It's Time to Upgrade

Authentication consists of various methods, such as PIN and OTP codes. But did you know that these authentication methods are no longer sec...

July 16, 2024

Understanding Injection Attacks: Camera API Modification and Emulator
deepfake

Understanding Injection Attacks: Camera API Modification and Emulator

Two types of injection attacks that threaten businesses are Camera API modification and emulator. How do these attacks work? Read more to f...

July 12, 2024