The endless game of deepfake, anti-deepfake and anti-anti-deepfake.

Quick read :

What is deepfake ?
What are the investigative tools for anti-deepfake ?
Anti-deepfake approach #1: searching for the original work
Anti-deepfake approach #2: Active forensic

What is deepfake ?

Deepfake is the contraction of "deep learning" and "fake news". It refers to the creation of false multimedia content (images, video, sound). Content that is not recordings of real physical scenes or events. It used to be called special effects or computer-generated images. However, to make new with old, its name was changed to give it a more trendy appeal, while including the much apprehended "Artificial Intelligence".

Nothing new under the sun, then ?

Yes, two critical points.


The tools are democratized and are easily found on the Internet

Extremely complicated and precise algorithms have been developed in the laboratory and are now available as open-source. Moving David Beckham's lips to synchronize them with a text, making Barack Obama say anything and animating still images to revive Marylin Monroe is now accessible to almost anyone.

Moreover, if it remains too complicated, one can easily hire deepfakers on the Internet who will do the job at $20 per video.


The process is above all non-collaborative

Hollywood special effects have the immense advantage of being produced in a collaborative environment. Sensors are placed on the bodies of the actors who have been scanned to have the most faithful 3D model possible. In short, everything is done to facilitate the post-production task.

Obviously, Vladimir Putin never consented to the making of the deepfakes where he appears.

Experts can still discern imperfections in these deepfakes, but their realism is improving at high speed. It is no longer enough to see it to believe it; you can no longer trust what you see on the Internet. Journalists are petrified by the idea of relaying deepfakes without their knowledge, which would ruin their credibility. Some predict the apocalypse in the media world.


ūüí° Download our Guide to select your Digital Watermark solution

What are the investigative tools for anti-deepfake ?

Media Forensics is the investigation of digital content: are they real or fake ? Like Sherlock Holmes, sometimes all you need is a magnifying glass: Why does Barack Obama never blink on this video ? Why are the edges of his eyes and mouth blurred when the rest of his face is clear ? Even when the editing and special effects cannot be seen with the naked eye, digital imaging tools can identify marks invisible to the naked eye. Specific ways of generating deepfakes leave characteristic patterns in the pixel values, or on the contrary, not leave the same traces as a digital camera sensor.

Anti-anti-deepfake, how far will the response go ?

It is an endless game of cat and mouse, police, and thief: If I know that your forensics tool detects the presence or the absence of such and such traces in my deepfakes, I will pass them in my anti-anti-deepfake tool to remove / insert them artificially. And so on ... long series of scientific articles are to be expected where one will block the advances of the other, which blocked the previous results and so on. It will not be fascinating (opinion of the scientist here).

Who of the cat or the mouse will win in the end ?

That is the question! We don't know it yet, and will we ever know it for that matter ?

Focus on two anti-deepfake approaches

Let us illustrate two particular anti-deepfake approaches that we like :


The search for the original work

Some deep-fakes and especially photo-montages, use and divert original content. The manipulations are apparent when we have before us original content and manipulated content. Hence the idea of ‚Äč‚Äčfinding original content with a search engine like Google Image.

Yes, but how can I certify that I have found the original image correctly?

This is where invisible watermarking acts as a seal to attest to the originality of the content. Who creates it and when ? It is done by trusted and accredited news agencies (Associated Press, Reuters, NY Times, etc.) after thoroughly vetting the content. Others offer certified authentic image repository. Add to that the idea of ‚Äč‚Äča decentralized registry and another buzzword pops up : blockchain.


Active forensics

Recreating the creation chain of an image from the passage of light through the lens of a camera to the final jpg file is complicated.

Especially since each manufacturer has its own cooking recipe, each camera model or processing software has its settings and so on.

And finally, artificial intelligence and its deep neural networks have recently replaced processing chains with somewhat opaque processes.

It is challenging to know if it is normal or not to note the presence or absence of traces, especially when the EXIF ‚Äč‚Äčmetadata has been deleted. Unless you deliberately create them in "official" processing chains. This is the key idea of ‚Äč‚Äča scientific article to be presented next week at the IEEE International Conference on Computer Vision (ICCV 2019) conference by Pawel Korus and Nasir Memon, Tandon School of Engineering, New York University. This article is currently buzzing on the web.

The authors propose to train two deep neural networks: the first converts a 'raw sensor' image (RAW format) into a good quality image so that traces of manipulation (JPEG compression, rescaling, etc.) will be detectable by the second network.

The first network facilitates the forensic task of the second: A good academic idea which assumes that camera manufacturers will all implement this algorithm. Furthermore, that deep fakers will not be able to train a neural network that could destroy this ongoing forensics work. The game of cat and mouse, police and thief, continues ...


deepfake forensics

Download our E-Book "Guide to select a Digital Watermark Solution"

Learn about the main criteria for selecting a   forensics technology in your business.

Download e-book
Teddy Furon

Teddy Furon

Scientific expert in watermarking, senior researcher at Inria in multimedia security. Formerly a member of the IEEE Information and Security Technical Committee, Principal Investigator at Technicolor R&I and consultant for the Hollywood film industry. Co-author of more than 50 scientific publications and 9 patents.

These articles may also interest you

3 Key Requirements When Selecting a Digital Asset Management Solution

3 Key Requirements When Selecting a Digital Asset Management Solution

Digital Asset Management systems allow businesses to manage and ...

The Role of a Digital Asset Manager in Brand Content Protection
Brand content protection |

The Role of a Digital Asset Manager in Brand Content Protection

Digital asset managers are responsible for a company's digital ...

The Top 5 Marketing Content Types And Their Value In Your Marketing Mix

The Top 5 Marketing Content Types And Their Value In Your Marketing Mi...

As a marketer, your job is to engage your target audiences by ...