Abstract
The core of the deepfake technology is based on a generative-adversarial network built on a combination of two neural networks: a generative network (network G) creates samples, a discriminative network (network D) tries to distinguish correct («genuine») samples from incorrect ones. Networks G and D compete with each other thousands or even millions of times until network G improves its performance. Thus, the network D will no longer be able to distinguish real data from fake data. With the development of big data and machine learning technologies, the scenario for using deepfake technology has gradually changed from creating sound models and imitating text to deep video forgery. For a long time, images modified using traditional Photoshop and other technologies were easily recognized. Deepfake technology changed this situation, making it more difficult to identify fakes. As an important technological innovation in the field of artificial intelligence, deepfake technology is widely used in various areas of society, creating enormous applied value. However, any technology is a double-edged sword. The use of deepfake technology poses a great threat to personal privacy, property security and even national security. In order to find a balance between technological innovation and risk prevention and control, countries around the world are actively exploring various ways to manage. The paper describes the main risks posed by modern deepfake technology, provides an overview of legal regulation in this area in China and offers an effective way to solve problems.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.