Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Ideas for defeating Anti-Deep-Fakes

Ren Kimura
November 14, 2024

Ideas for defeating Anti-Deep-Fakes

Ren Kimura

November 14, 2024
Tweet

More Decks by Ren Kimura

Other Decks in Programming

Transcript

  1. 2 whoami Founder & CEO of Ricerca Security, Inc. Product

    Manager (PdM) Ren Kimura (X: @RKX1209) Interested in : Bizdev and Vulnerability Research (VR)
  2. Face Synthesis 3 What is the “Deep Fake” = Techniques

    to generate fake media (video, image, voice…) Face manipulation techniques for generating fake videos/images. Face Swap Attribute Manipulation Expression Swap
  3. Name cosine dist login Admin’s voice 0.0 N/A Text to

    Speach 0.08 ✔ Another person’s voice 0.69 ☓ 4 DeepFake demo Login_With_Voice_Verification Voice Cloning
  4. 6 Verification methods Detection Science & Tech Spotlight: Combating Deepfakes

    (GAO-24-107292) Authentication • Bit patterns • Color abnormalities • Facial/Vocal inconsistencies “Recorded by camera.”
  5. 7 C2PA (Coalition for Content Provenance and Authenticity) original.jpg •

    2024-09-04 21:00 • Created: Canon EOS R1 … C2PA meta data c2pa.actions hash function encrypt function encrypted hash Private key in EOS R1
  6. 8 edited.jpg C2PA meta data c2pa.actions c2pa.ingredients • original.jpg hash

    function encrypt function encrypted hash Private key in Adobes account • 2024-09-10 12:54 • Edited: Adobe Photoshop • Actions: Crop, Frame… … Chain of metadata
  7. 9 Chain of trust original.jpg edited.jpg C2PA metadata “Recorded by

    Canon EOS R1“ X.509 certificate chain “Edited by Adobe Photoshop“ parent Editor (adobe account)
  8. 10 C2PA signing by Generative AI services image.webp image.webp C2PA

    metadata “Created by DALL-E“ X.509 certificate chain “Use original one as an ingredient“ parent
  9. 11 "Captured with a camera" (~2024.10.15) “I am really at

    the zoo” https://www.youtube.com/watch?v=gfjgRHtDa38
  10. 12 Guessing from their official help page. original.mp4 “Recorded by

    Canon EOS R1“ upload ・・・・ Whitelist “They are cameras” How does it work
  11. 13 ❌ Generative AI: “No camera” gen_by_sora.mp4 “Created by OpenAIs

    SORA“ upload C2PA metadata X.509 certificate chain ・・・・ Whitelist “They are cameras” Not matched!
  12. 14 ✔"Captured with a camera" “Recorded by Canon EOS R1

    “ “Edited by Adobe Premiere Pro“ ・・・・ Whitelist “They are cameras” upload Get original mp4 by social engineering, crawling…
  13. 15 Air gapping scenario edited.mp4 faked.mp4 C2PA metadata “Recorded by

    Canon EOS R1 “ X.509 certificate chain Record over the air
  14. 16 ❌ “No camera” edited.mp4 faked.mp4 C2PA metadata “Recorded by

    Sony α7 IV “ X.509 certificate chain SONY metadata “It may record 2D flattened area“ Record 3d-depth over the air
  15. 19 What should Blue/White-team do? “A Guide to Preparing and

    Responding to Deepfake Events” OWASP TOP10 LLM App&GenAI (2024.10)
  16. 20 What should Blue/White-team do? Financial gain through fraud by

    impersonation. Impersonation for cyberattacks Job Interview Fraud Mis/Dis/Mal Information
  17. 21 Conclusion Detection and Authentication methods are not perfect Proposed

    a new technique to bypass C2PA authentication Defense-in-depth and layered controls are required.