search
HomeTechnology peripheralsAI'AI face-changing' defrauds millions in nine seconds? How to use technology to counter AI abuse?

AI face-changing defrauds millions in nine seconds? How to use technology to counter AI abuse?

Produced by Sohu Technology

Author|Zheng Songyi

Editor|Yang Jin

Recently, AI face-changing scams have occurred frequently, and the confirmation of "Musk's prediction" has come earlier than expected. Two months ago, Musk and thousands of others signed a joint letter calling for a six-month suspension of training of more powerful AI systems. The reason was that they were worried that more powerful AI systems would pose potential risks to society and humans. They never imagined that risks had already invaded human life. .

On May 22, the topic "AI fraud is breaking out across the country" rushed to the hot search list. After the owner of a technology company in Fujian was defrauded out of 4.3 million yuan in 10 minutes by a scammer who pretended to be a friend through AI face-changing technology, another Anhui man was defrauded out of 1.32 million yuan in just 9 seconds by a scammer using AI face-changing technology. , netizens called it "impossible to guard against."

Xia Bohan, a lawyer at Beijing Huarang Law Firm, told Sohu Technology, "This behavior constitutes a crime of fraud, which can be punished with up to life imprisonment depending on the amount of fraud. For deep synthesis service providers, according to the "Internet Information Services Deep Synthesis Management" "Provisions", complete management rules and platform conventions should be formulated and disclosed, management responsibilities should be performed in accordance with the law, and technical or manual methods should be used to review the input data and synthesis results of deep synthesis service users."

It is reported that in addition to AI face-changing video fraud, some e-commerce anchors use AI face-changing technology to disguise themselves as celebrities such as "Jackie Chan" and "Yang Mi" to deliver goods live, thereby attracting traffic and saving live broadcast costs. Relevant personnel of the Douyin platform told Sohu Technology, “The platform does not allow face-swapping live broadcasts. If found, the broadcast will be stopped directly, and credit points will be deducted from the infringing merchants. Accounts that still change their faces for live broadcasts after being disposed of will be restricted. Its live broadcast permission."

Risk problems caused by technology will ultimately need to be remedied by technical means. Fortunately, as AI face-changing is increasingly abused, new models for identifying AI face-changing technology have also been applied.

How is "AI face changing" implemented?

The original intention of the research and development of AI face-changing technology is to be used in film and television entertainment, game development and other fields, aiming to provide users with a more realistic viewing experience.

It is understood that the implementation principles of AI face-changing technology mainly include face detection, face alignment, feature extraction, feature fusion, and image reconstruction.

Among them, face detection technology is used to detect the face position and facial features in the input image; face alignment technology uses techniques such as affine changes to make the facial feature points of different faces the same; feature extraction technology uses deep learning Models, such as convolutional neural networks (CNN), extract facial shape, texture, color and other features; feature fusion technology uses linear interpolation or non-linear interpolation transformation methods to fuse the facial features of two different faces to generate new facial features ; Finally, the reconstructed image technology is used to map the new facial features back into the image space to generate a new image with a face-changing effect.

Sohu Technology selected a currently popular "Tencent Cloud AI Face Fusion" application as a test software to see how far "AI face-changing" technology can achieve in reshaping portraits.

Sohu Technology randomly selected a man's picture as a template, and used Daniel Wu's picture as a face selection. The test results showed that the AI-processed man's portrait showed the characteristics of Daniel Wu between his eyebrows and eyes, but the hairstyle and other features other than the face were Parts have not changed.

AI face-changing defrauds millions in nine seconds? How to use technology to counter AI abuse?

According to Baotou police disclosure, on April 20, a friend of Mr. Guo, the legal representative of a technology company in Fuzhou, suddenly contacted him via WeChat video. After the two chatted briefly, the friend told Mr. Guo that his friend was bidding in other places. , a deposit of 4.3 million yuan is required, and a public-to-public account transfer is required, so I want to borrow Mr. Guo’s company’s account to make the payment. The friend asked Mr. Guo for his bank card number and claimed that the money had been transferred to Mr. Guo’s account. He also sent a screenshot of the bank transfer receipt to Mr. Guo via WeChat. Based on the trust of the video chat, Mr. Guo did not verify whether the money had arrived, and transferred 4.3 million yuan to the other party in two installments. After the money was transferred, Mr. Guo sent a message to his friend on WeChat saying that the matter had been settled. But what he didn't expect was that the news that his friend came back turned out to be a question mark.

Mr. Guo called his friend, but the other party said that there was no such thing. Only then did he realize that he had encountered a "high-end" scam. The other party used intelligent AI face-changing technology to pretend to be a friend and defrauded him.

IT technicians analyzed from Sohu Technology that there are hackers who specialize in developing AI real-time face-changing tools, which is similar to the current real-time beautification implanted in mobile phones. Criminals may use loopholes to steal the WeChat accounts of the victim's friends, obtain photos or videos of the victim's friends through social platforms, capture their own facial features with cameras, and then use real-time AI face-changing tools to fuse the victim's friends' facial features with their own , Pretending to be a friend of the victim to have a conversation, in order to achieve the purpose of fraud.

What is the progress of technology to counter AI abuse?

There are always people who better than you. In 2020, Microsoft Research Asia and Peking University jointly published the paper "Face X-ray for More General Face Forgery Detection". Face X-Ray, a new model used to identify AI face-changing technology, has two major attributes: it can generalize To unknown face-swapping algorithms, it can provide explainable face-swapping boundaries.

Guo Baining, one of the main authors of the paper and executive vice president of Microsoft Research Asia, said, "During the image collection process, each image has its own unique characteristics, which may come from the shooting hardware or processing software. As long as The images are not generated in one piece. They will leave clues during the fusion process. These clues are invisible to the human eye, but can be captured by deep learning."

The paper demonstrates image noise analysis and error level analysis technology. It can be seen that real images show consistent noise patterns, but face replacement will obviously be different (group a pictures are real faces, group b pictures are synthetic images , the middle column is the noise analysis image, and the right column is the error level analysis image).

AI face-changing defrauds millions in nine seconds? How to use technology to counter AI abuse?

It can be seen that effective identification of "AI face-changing" has a technical basis and is not an unsolvable problem. Domestic technology companies represented by Tencent Cloud are using "Anti-Deepfake (ATDF)" technology to develop "face-changing screening" applications, aiming to use AI technology to counter the abuse of AI technologies such as face-changing.

According to reports, Anti-Deepfake is divided into two categories: passive detection and active defense. Passive detection technology focuses on post-event evidence collection, that is, detecting videos that have been produced and disseminated to determine whether they are fake face videos; Another type of active defense technology focuses on prior defense, that is, adding hidden information, such as watermarks, anti-noise, etc., before the face data is released and disseminated, to actively trace the source or prevent malicious users from using face videos with noise added for forgery. , thereby achieving the purpose of protecting the human face and achieving active defense.

Article 6 of the "Regulations on the Management of Deep Synthesis of Internet Information Services" jointly issued by the Cyberspace Administration of China, the Ministry of Industry and Information Technology, and the Ministry of Public Security clearly stipulates that "No organization or individual may use deep synthesis services to produce, copy, publish, or disseminate legal, administrative For information prohibited by regulations, deep synthesis services shall not be used to engage in activities prohibited by laws and administrative regulations such as endangering national security and interests, damaging the country's image, infringing on social and public interests, disrupting economic and social order, infringing on the legitimate rights and interests of others, etc."

Xia Bohan emphasized, “In addition to AI face-changing video fraud, many mobile applications currently require face-swiping authentication. Criminals may use AI face-changing technology to impersonate themselves as real rights holders. This requires us to strictly protect it. To prevent leakage of personal information, it is also recommended to set up multiple other identity verification methods. On the other hand, software vendors also need to further develop technology to improve security and prevent criminals from taking advantage of the situation."

The above is the detailed content of 'AI face-changing' defrauds millions in nine seconds? How to use technology to counter AI abuse?. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:搜狐. If there is any infringement, please contact admin@php.cn delete
Can't use ChatGPT! Explaining the causes and solutions that can be tested immediately [Latest 2025]Can't use ChatGPT! Explaining the causes and solutions that can be tested immediately [Latest 2025]May 14, 2025 am 05:04 AM

ChatGPT is not accessible? This article provides a variety of practical solutions! Many users may encounter problems such as inaccessibility or slow response when using ChatGPT on a daily basis. This article will guide you to solve these problems step by step based on different situations. Causes of ChatGPT's inaccessibility and preliminary troubleshooting First, we need to determine whether the problem lies in the OpenAI server side, or the user's own network or device problems. Please follow the steps below to troubleshoot: Step 1: Check the official status of OpenAI Visit the OpenAI Status page (status.openai.com) to see if the ChatGPT service is running normally. If a red or yellow alarm is displayed, it means Open

Calculating The Risk Of ASI Starts With Human MindsCalculating The Risk Of ASI Starts With Human MindsMay 14, 2025 am 05:02 AM

On 10 May 2025, MIT physicist Max Tegmark told The Guardian that AI labs should emulate Oppenheimer’s Trinity-test calculus before releasing Artificial Super-Intelligence. “My assessment is that the 'Compton constant', the probability that a race to

An easy-to-understand explanation of how to write and compose lyrics and recommended tools in ChatGPTAn easy-to-understand explanation of how to write and compose lyrics and recommended tools in ChatGPTMay 14, 2025 am 05:01 AM

AI music creation technology is changing with each passing day. This article will use AI models such as ChatGPT as an example to explain in detail how to use AI to assist music creation, and explain it with actual cases. We will introduce how to create music through SunoAI, AI jukebox on Hugging Face, and Python's Music21 library. Through these technologies, everyone can easily create original music. However, it should be noted that the copyright issue of AI-generated content cannot be ignored, and you must be cautious when using it. Let’s explore the infinite possibilities of AI in the music field together! OpenAI's latest AI agent "OpenAI Deep Research" introduces: [ChatGPT]Ope

What is ChatGPT-4? A thorough explanation of what you can do, the pricing, and the differences from GPT-3.5!What is ChatGPT-4? A thorough explanation of what you can do, the pricing, and the differences from GPT-3.5!May 14, 2025 am 05:00 AM

The emergence of ChatGPT-4 has greatly expanded the possibility of AI applications. Compared with GPT-3.5, ChatGPT-4 has significantly improved. It has powerful context comprehension capabilities and can also recognize and generate images. It is a universal AI assistant. It has shown great potential in many fields such as improving business efficiency and assisting creation. However, at the same time, we must also pay attention to the precautions in its use. This article will explain the characteristics of ChatGPT-4 in detail and introduce effective usage methods for different scenarios. The article contains skills to make full use of the latest AI technologies, please refer to it. OpenAI's latest AI agent, please click the link below for details of "OpenAI Deep Research"

Explaining how to use the ChatGPT app! Japanese support and voice conversation functionExplaining how to use the ChatGPT app! Japanese support and voice conversation functionMay 14, 2025 am 04:59 AM

ChatGPT App: Unleash your creativity with the AI ​​assistant! Beginner's Guide The ChatGPT app is an innovative AI assistant that handles a wide range of tasks, including writing, translation, and question answering. It is a tool with endless possibilities that is useful for creative activities and information gathering. In this article, we will explain in an easy-to-understand way for beginners, from how to install the ChatGPT smartphone app, to the features unique to apps such as voice input functions and plugins, as well as the points to keep in mind when using the app. We'll also be taking a closer look at plugin restrictions and device-to-device configuration synchronization

How do I use the Chinese version of ChatGPT? Explanation of registration procedures and feesHow do I use the Chinese version of ChatGPT? Explanation of registration procedures and feesMay 14, 2025 am 04:56 AM

ChatGPT Chinese version: Unlock new experience of Chinese AI dialogue ChatGPT is popular all over the world, did you know it also offers a Chinese version? This powerful AI tool not only supports daily conversations, but also handles professional content and is compatible with Simplified and Traditional Chinese. Whether it is a user in China or a friend who is learning Chinese, you can benefit from it. This article will introduce in detail how to use ChatGPT Chinese version, including account settings, Chinese prompt word input, filter use, and selection of different packages, and analyze potential risks and response strategies. In addition, we will also compare ChatGPT Chinese version with other Chinese AI tools to help you better understand its advantages and application scenarios. OpenAI's latest AI intelligence

5 AI Agent Myths You Need To Stop Believing Now5 AI Agent Myths You Need To Stop Believing NowMay 14, 2025 am 04:54 AM

These can be thought of as the next leap forward in the field of generative AI, which gave us ChatGPT and other large-language-model chatbots. Rather than simply answering questions or generating information, they can take action on our behalf, inter

An easy-to-understand explanation of the illegality of creating and managing multiple accounts using ChatGPTAn easy-to-understand explanation of the illegality of creating and managing multiple accounts using ChatGPTMay 14, 2025 am 04:50 AM

Efficient multiple account management techniques using ChatGPT | A thorough explanation of how to use business and private life! ChatGPT is used in a variety of situations, but some people may be worried about managing multiple accounts. This article will explain in detail how to create multiple accounts for ChatGPT, what to do when using it, and how to operate it safely and efficiently. We also cover important points such as the difference in business and private use, and complying with OpenAI's terms of use, and provide a guide to help you safely utilize multiple accounts. OpenAI

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment