The practice of technological deception in videoconferencing systems for distance learning and ways to counter it
This article raises the problem of high-tech deception using video conferencing means during distance learning, which is of increased relevance due to the digitalization of the educational process, with the growth of digital literacy of young people. The article presents some methods of fraud, including a relatively new technology that is very popular: Deepfake. The article details two popular tools for replacing faces, each of which provides step-by-step instructions on how to create, configure and apply in life. The organizational methods that are presented will help teachers detect even the most disguised forgery, including future voice spoofing, and stop any attempt at deception. At the end of the article, the system is described with the help of the technologies that used to combat deepfakes, and an assessment of the danger of existing tools is given. The objectives of this article are to raise public interest in the problem of face substitution and high-tech deception in general, to create grounds for discussing the need to switch to a remote format of events, to broaden the horizons of the reader and provide him with an area for further work and research.
Borshigov, K. (2018). Generative adversarial network (GAN). Beginner's Guide. Neurohive Retrieved at: https://neurohive.io/ru/osnovy-data-science/gan-rukovodstvo-dlja-novichkov/
Future2day (2020). Neural networks. Retrieved at: https://future2day.ru/nejronnye-seti/
Github (2020a). FaceIT_Live. Retrieved from: https://github.com/alew3/faceit_live
Github (2020b). DeepFaceLab. Retrived from: https://github.com/iperov/DeepFaceLab
Github (2020c). FaceSwap. Retrieved from: https://github.com/MarekKowalski/FaceSwap/
Github (2020d). Avatarify. Retrieved from: https://github.com/alievk/avatarify/blob/master/README.md#install
Gottfredson, M. R., & Hirschi, T. (1990). A General Theory of Crime. Stanford: Stanford University Press
HSE (2020). Experience of onlineization of exams in foreign educational organizations and systems. Retrieved from: https://ioe.hse.ru/sao_exams?fbclid=IwAR34sr_byDe4av8LkGIS5ianKYPsv1C02LEw-kjCK5I9IC-tfXjTTLwAy0s
Kireev, M. (2019). Speech to speech. Create a neural network that falsifies the voice. Retrieved from: https://xakep.ru/2019/10/03/real-time-voice-cloning/
Kumar, A. (2019). Ethics in Generative AI: Detecting Fake Faces in Videos. Towardsdatascience. Retrieved from: https://towardsdatascience.com/ethics-in-generative-ai-detecting-fake-videos-93b69fcbabc7
Lobachevsky. N.I. (2020). The basics of error-correcting coding. Nizhny Novgorod State University named after N.I. Lobachevsky. Retrieved from: http://hpc-education.unn.ru/files/5-100-Materials/7.1.1_Courses/15/Лекции_ДС.05.09.pdf
Myownconference (2019). Advantages and Disadvantages of Video Conferencing. Retrieved from: https://myownconference.com/blog/en/index.php/advantages-disadvantages-video-conferencing/
Panasenko, A. (2020). Deepfake technologies as a threat to information security. Anti-malware.ru Retrieved from: https://www.anti-malware.ru/analytics/Threats_Analysis/Deepfakes-as-a-information-security-threat
Pandasecurity (2019). Fraud with a deepfake: the dark side of artificial intelligence. Retrieved from: https://www.pandasecurity.com/mediacenter/news/deepfake-voice-fraud/
Pindrop (2018). Pindrop 2018 voice intelligence report. Retrieved from: https://www.pindrop.com/2018-voice-intelligence-report/
Proglib (2020). DeepFake Tutorial: Create Your Own Deepfake in DeepFaceLab. Retrieved from: https://proglib.io/p/deepfake-tutorial-sozdaem-sobstvennyy-dipfeyk-v-deepfacelab-2019-11-16
Purwins, H., Li, B., Virtanen, T., Schlüter, J., Chang, S. Y., & Sainath, T. (2019). Deep learning for audio signal processing. IEEE Journal of Selected Topics in Signal Processing, 13(2), 206-219.
Rojas Bahamón, M., Arbeláez-Campillo, D. F., & Prieto, J. D. (2019). The investigation as an environmental education strategy. Revista De La Universidad Del Zulia, 9(25), 89-97. Recuperado a partir de https://www.produccioncientificaluz.org/index.php/rluz/article/view/29743
Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nießner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. Proceedings of the IEEE International Conference on Computer Vision, 1-11.
Simon, H. A. (1982). Models of bounded rationality. Volume 2: Behavioural economics and business organization. Cambridge: MIT Press
Westerlund, M. (2019). The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39-52.