{"id":100,"date":"2022-05-03T06:01:23","date_gmt":"2022-05-03T06:01:23","guid":{"rendered":"https:\/\/synthesys.io\/blog\/?p=100"},"modified":"2024-02-01T11:44:17","modified_gmt":"2024-02-01T11:44:17","slug":"what-is-deepfake","status":"publish","type":"post","link":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/","title":{"rendered":"What is a Deepfake?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"100\" class=\"elementor elementor-100\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88726c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88726c3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0c152e3\" data-id=\"0c152e3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b07c7e6 elementor-widget elementor-widget-heading\" data-id=\"b07c7e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is a Deepfake?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-18798ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18798ab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-168fc9e\" data-id=\"168fc9e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d8633c elementor-widget elementor-widget-text-editor\" data-id=\"9d8633c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>by <strong>Oliver Goodwin <\/strong>| May 3, 2022<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ed9b1b8\" data-id=\"ed9b1b8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2875eb elementor-widget elementor-widget-text-editor\" data-id=\"a2875eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reading Time: <span class=\"span-reading-time rt-reading-time\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 10<\/span> <span class=\"rt-label rt-postfix\"><\/span><\/span> minutes<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0590dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0590dc\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba48401\" data-id=\"ba48401\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62d757e elementor-widget elementor-widget-image\" data-id=\"62d757e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"853\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp\" class=\"attachment-full size-full wp-image-855\" alt=\"What is a Deepfake\" srcset=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp 1280w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake-300x200.webp 300w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake-1024x682.webp 1024w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake-768x512.webp 768w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake-350x233.webp 350w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-522e487 elementor-widget elementor-widget-text-editor\" data-id=\"522e487\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Does the possibility of actors being present on set despite temporal and\/or spatial gaps ever bewilder you? For instance, after the demise of Paul Walker in 2013, we got to understand that he&#8217;d left behind incomplete scenes. Yet, upon the release of Fast &amp; Furious 7 in 2015, his scenes had been \u201cmiraculously\u201d <\/span><a href=\"https:\/\/www.hollywoodreporter.com\/movies\/movie-news\/how-furious-7-brought-late-845763\/\"><span style=\"font-weight: 400;\"><u>stitched to completion<\/u><\/span><\/a><span style=\"font-weight: 400;\"><u>.<\/u>\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Are you wondering now how this \u201cmagic\u201d, which does not obey time, physical distance, or mental proximity, was conjured? Well, it shouldn&#8217;t come as a surprise that daily, technology keeps breeding newer, faster, and more productive means to endless ends, and this technology\u2013Deepfake Technology\u2013that we&#8217;re being particular about here is one of such means.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e55fb1c elementor-widget elementor-widget-heading\" data-id=\"e55fb1c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Deepfake Technology? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e79e72e elementor-widget elementor-widget-image\" data-id=\"e79e72e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/What-is-Deepfake-Technology.webp\" class=\"attachment-large size-large wp-image-1282\" alt=\"What is Deepfake Technology?\" srcset=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/What-is-Deepfake-Technology.webp 900w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/What-is-Deepfake-Technology-300x169.webp 300w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/What-is-Deepfake-Technology-768x432.webp 768w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/What-is-Deepfake-Technology-350x197.webp 350w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f030ad1 elementor-widget elementor-widget-text-editor\" data-id=\"f030ad1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">To explain Deepfake technology, we must begin with the elementary &#8211; Synthetic Media.<\/span><\/p><p><span style=\"font-weight: 400;\">When <\/span><a href=\"https:\/\/www.ibm.com\/topics\/artificial-intelligence\"><span style=\"font-weight: 400;\">Artificial Intelligence (AI)<\/span><\/a><span style=\"font-weight: 400;\"> is used to generate, manipulate, or modify media varieties such as videos, audio recordings, and images, the resulting aggregate is synthetic media. In furtherance to this, synthetic media comes with its subsets, each defined based on its use and impacts. Deepfake technology happens to be one of these subsets.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Deepfake is a portmanteau word that melds &#8220;Deep&#8221; from the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_learning\"><span style=\"font-weight: 400;\">deep learning<\/span><\/a><span style=\"font-weight: 400;\"> branch of artificial intelligence technology and &#8220;Fake&#8221;. It&#8217;s a technology that leverages artificial intelligence to create falsified but realistic or near-realistic media content such as video and audio files.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">To better understand this concept, consider the scenario of two fictitious men, Harry and Nick: You want to create a video of Harry singing the England National Anthem without making him do it because of his unavailability. Deepfake technology makes this a reality by superimposing a video of Nick\u2013who is available\u2013singing the National Anthem on random videos of Harry. This manipulation results in a falsified video in which Harry appears to sing the National Anthem.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In essence, deepfake technology is a branch of synthetic media used to deceive or mislead by concocting visuals or acoustics that never happened. This specific negative tag draws its source from the origin of the name &#8220;deepfake&#8221; itself when a Reddit user monikered &#8220;deepfakes&#8221; <\/span><a href=\"https:\/\/www.techslang.com\/what-is-deepfake-technology\/\"><span style=\"font-weight: 400;\">proclaimed in 2017 that he had built a machine-learning algorithm<\/span><\/a><span style=\"font-weight: 400;\"> that could superimpose celebrity faces onto any porn clip of his choice. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87144d2 elementor-widget elementor-widget-heading\" data-id=\"87144d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Does Deepfake Technology Work? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a97f3bb elementor-widget elementor-widget-text-editor\" data-id=\"a97f3bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">To make deepfakes, one needs to possess at least three molecular components of the technology&#8217;s functionality:\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the target media,\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the artificial neural networks,\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">and the source media.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">The target media is that which one intends to manipulate. For example, in the case of a video file, the target video is one upon which the transposition occurs.<\/span><\/p><p><span style=\"font-weight: 400;\">On the other hand, the AI algorithm studies the source media to transpose it onto the target media easily. In the examples cited above, the target is the existing video footage of Nick singing the national anthem: in this case, he&#8217;s the actor whose voice is used to underpin Harry&#8217;s face.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Conversely, the source is a medley of different and multiple clips of Harry performing random actions from different angles, <a href=\"https:\/\/synthesys.io\/blog\/create-text-to-speech-with-emotion\/\">wearing different emotions<\/a>, posturing in different light weights, etc. The AI algorithm studies these clips to master nearly every aspect of Harry&#8217;s physical appearance to flawlessly stitch these aspects onto Nick&#8217;s corresponding features.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We shall discuss the third essential component, Artificial Neural Network, in more detail below.\u00a0<\/span><\/p><p><strong style=\"font-weight: bold;\">Related Article<\/strong>: <a href=\"https:\/\/synthesys.io\/blog\/what-is-voice-cloning\/\">What is Voice Cloning?<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0705dc5 elementor-widget elementor-widget-heading\" data-id=\"0705dc5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Are Neural Networks?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb76a4 elementor-widget elementor-widget-image\" data-id=\"7eb76a4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"405\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/09\/neutral-network-diagram.webp\" class=\"attachment-large size-large wp-image-1276\" alt=\"neutral network diagram\" srcset=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/09\/neutral-network-diagram.webp 820w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/09\/neutral-network-diagram-300x152.webp 300w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/09\/neutral-network-diagram-768x389.webp 768w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/09\/neutral-network-diagram-350x177.webp 350w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abfe620 elementor-widget elementor-widget-text-editor\" data-id=\"abfe620\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.ibm.com\/topics\/neural-networks\"><span style=\"font-weight: 400;\">Artificial Neural Networks (ANN)<\/span><\/a><span style=\"font-weight: 400;\"> or Neural Networks (NN) are a variety of deep learning and, consequently, AI and are a composition of hardware and\/or software units modeled after the workings of neurons in the human brain.<\/span><\/p><p><span style=\"font-weight: 400;\">ANNs have been applied in variegated commercial ends by generally focusing on unraveling complex signal processing or pattern recognition challenges. These commercial outputs include, but are not limited to, face recognition for security systems, handwriting recognition used in the processing of checks, <\/span><a href=\"https:\/\/synthesys.io\/ai-voice-generator\/\"><span style=\"font-weight: 400;\">AI-voice generators<\/span><\/a><span style=\"font-weight: 400;\">, weather prediction, etc.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d68848f elementor-widget elementor-widget-heading\" data-id=\"d68848f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How Do Artificial Neural Networks Contribute to the Creation of Deepfakes?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3a3f31 elementor-widget elementor-widget-text-editor\" data-id=\"f3a3f31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">ANN systems and the human nervous system function similarly, and this shouldn&#8217;t come as a surprise since the former is patterned after the latter. The system involves many processors that operate in parallel formations or tiers.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The incepting tier\u2013which can be likened to the human optic nerve\u2013receives the raw data (retina information, for example) and passes it on to the next tier\u2013similar to how neurons from the optic nerve receive signals from those close to it.<\/span><\/p><p><span style=\"font-weight: 400;\">These networks are then trained on pieces of unified information we need to recognize. For instance, if we wanted to train our ANN on the visual information of Chris Evans, we&#8217;d initially feed into a series of fragmented as well as whole images of the actor from multiple angles, then tell the system what each fragment is and what the output should be.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The algorithm is programmed with specific instructions on how each piece of information is handled. And because ANNs are known to be <\/span><a href=\"https:\/\/www.techtarget.com\/searchenterpriseai\/definition\/assistive-technology-adaptive-technology\"><span style=\"font-weight: 400;\">adaptive<\/span><\/a><span style=\"font-weight: 400;\">, they can self-adjust to accommodate and strengthen their knowledge based on the information fed into them. If, in the process of training the system on the visuals of Chris Evans, we told specified specific parts to be identified as &#8220;Chris Evans&#8217; lips&#8221; and any other part as &#8220;not Chris Evans&#8217; lips&#8221;, then it would obey this instruction unless different nodes repeatedly tell it this is not the case.<\/span><\/p><p><span style=\"font-weight: 400;\">With this understanding, we can safely circle back to our first instance of Harry and Nick as source and target, respectively. The deepfake of Harry singing the national anthem can be implemented using either or both of these different machine learning programs: autoencoders and Generative Adversarial Networks (GANs).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71b980a elementor-widget elementor-widget-heading\" data-id=\"71b980a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Autoencoders<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27bd254 elementor-widget elementor-widget-text-editor\" data-id=\"27bd254\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.jeremyjordan.me\/autoencoders\/\"><span style=\"font-weight: 400;\">Autoencoders<\/span><\/a><span style=\"font-weight: 400;\"> are a variant of neural networks that create deepfakes by compressing inputs into littler representations of themselves and regenerating these original inputs of these representations or encoding. A practical parallel would be a student comprehending their homework rather than simply memorising the solution. Consider two students who have been given homework. Student A memorises the solution to the homework without grasping how to solve the assignment. Student B takes their time to study the homework, breaks it down into simpler terms, and pits the fragments back together without reaching into memory, thereby exercising perfection. If they were given similar questions in a test, with the parameters slightly altered, it&#8217;s quite obvious that Student B would ace and Student A would be more likely to fail.<\/span><\/p><p><span style=\"font-weight: 400;\">Autoencoders work just like Student B above. Trained to not just repeat the media files injected into them, but to recognise each detail and be able to stitch each detail decoded to any target. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de86e3 elementor-widget elementor-widget-heading\" data-id=\"4de86e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Generative Adversarial Networks (GANs)                 <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-998dd5e elementor-widget elementor-widget-text-editor\" data-id=\"998dd5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.cvisionlab.com\/cases\/deepfake-gan\/#:~:text=GANs%20set%20two%20neural%20networks,components%20stay%20in%20constant%20interaction.\"><span style=\"font-weight: 400;\">Generative Adversarial Networks (GANs)<\/span><\/a><span style=\"font-weight: 400;\"> are another subsumption of neural networks that run unsupervised polar submodels: the generator and the discriminator. The generator creates fake visual or acoustic outputs from the source it is trained on. The discriminator determines whether these outputs are legitimate and either admit these outputs or rejects them based on its legitimacy judgment.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The cycle continues until the generator develops output legitimate enough to bypass the discriminator&#8217;s measures. In summary, the GAN models exist to correct the flaws that may be present in autoencoders.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a73513 elementor-widget elementor-widget-heading\" data-id=\"4a73513\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are Deepfakes Only Videos?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38d2e1d elementor-widget elementor-widget-text-editor\" data-id=\"38d2e1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The assumption that deepfakes exist only in video content is plausible since most<\/span><a href=\"https:\/\/www.aicpa-cima.com\/news\/article\/deepfakes-emerge-as-real-cybersecurity-threat\"><span style=\"font-weight: 400;\"> cybercrimes involving deepfakes are videos.<\/span><\/a><\/p><p><span style=\"font-weight: 400;\">There, however, exist other sides to visual modification and falsification. But, as you can guess, the AI audio deepfakes are ostensibly widely overlooked in the survey and study of media manipulation.<\/span><\/p><p><span style=\"font-weight: 400;\">Audio deepfakes, essentially, are the cloning of a person&#8217;s voice to generate synthetic audio. In most cases, this cloned voice is indistinguishable from the original voice. Audio deepfakes can be achieved using replay attacks, speech synthesis, voice conversion and manipulation.<\/span><\/p><p><span style=\"font-weight: 400;\">Besides audio deepfakes, some other forms of deepfakes, which aren&#8217;t exactly prominent but are nevertheless existent, should be considered and offered some degrees of legitimacy: <\/span><a href=\"https:\/\/arxiv.org\/abs\/2111.14203#:~:text=Deepfake%20is%20content%20or%20material,%2C%20image%2C%20and%20text%20synthesis.\"><span style=\"font-weight: 400;\">text deepfakes which use exposed fabrication, humorous fakes, and hoax fakes<\/span><\/a><span style=\"font-weight: 400;\">; and image deepfakes such as <\/span><a href=\"https:\/\/synthesys.io\/ai-avatars\/\"><span style=\"font-weight: 400;\">AI avatar<\/span><\/a><span style=\"font-weight: 400;\">, face swap, synthesis, and editing\u2013photoshop, essentially.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2959f4b elementor-widget elementor-widget-heading\" data-id=\"2959f4b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Deepfake Videos Are Made?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b268f94 elementor-widget elementor-widget-text-editor\" data-id=\"b268f94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Deepfake videos are made using, majorly, machine learning. As we&#8217;ve explained earlier, the creator of the deepfakes trains a neural network on many hours of actual videos of the person (the source) as required. The neural network, having been trained to recognise the source in whatever lighting and angular condition using either the autoencoders or GANs, is then trusted to reproduce any video given the separate details of the source video. The reproduction is then transposed onto the target&#8217;s actions, resulting in a falsified deepfake video document of one person who seems to say or do things that another person said or did.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-598f578 elementor-widget elementor-widget-heading\" data-id=\"598f578\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What Technology Do You Need To Create Deepfakes?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72fd8b3 elementor-widget elementor-widget-text-editor\" data-id=\"72fd8b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The technology behind creating deepfakes includes the two subsets of neural networks: autoencoders and GANs. These systems, including the wireframe of their parent network, that is, the neural systems, were heavily <\/span><a href=\"https:\/\/en.m.wikipedia.org\/wiki\/Geoffrey_Hinton\"><span style=\"font-weight: 400;\">researched by Geoffrey Hinton<\/span><\/a><span style=\"font-weight: 400;\">\u2013 who made significant contributions to the advancement of AI\u2013and the neural networks, it turns out, were designed to mimic the human brain. That is, these two do not run on simply memory and submission of results but on the ability to make meanings of tiny details similar to fragments of their memories\u2013the way the human brain does it.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a94cbb0 elementor-widget elementor-widget-heading\" data-id=\"a94cbb0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How Do You Detect Deepfakes?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eea198 elementor-widget elementor-widget-text-editor\" data-id=\"1eea198\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Deepfakes are created by tools that aim to perfect face or voice recognition and recreation using decoding and encoding means such as the generative adversarial networks. These networks take time, thousands of data files, and manual expert contributions to yield the desired results. The effort, the measures taken against detection, and the corresponding quality of work generated determine the ease or difficulty with which deepfakes can be spotted.<\/span><\/p><p><span style=\"font-weight: 400;\">There are two prominent means of detecting deepfakes:\u00a0<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">manually studying the suspicious deepfake or\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the use of Deepfake detection software or tools.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">The chirality of events and possibilities powers technological advancements. The sustenance of these signs of progress relies on checks and balances. For every potentially dangerous invention, a polar opposite is designed to check it. Since the advent of deepfakes and the discovery of their dangerous capabilities, there have been attempts to develop counteracting measures for them.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Deepfake detection tools are the easiest means of identifying deepfakes. Some of these tools are web-based, such as <\/span><a href=\"https:\/\/about.fb.com\/news\/2020\/01\/enforcing-against-manipulated-media\/\"><span style=\"font-weight: 400;\">Facebook&#8217;s enforcement against manipulated media.<\/span><\/a><span style=\"font-weight: 400;\"> Some others come as software to be installed on computers, such as the <\/span><a href=\"https:\/\/www.bbc.com\/news\/technology-53984114.amp\"><span style=\"font-weight: 400;\">Microsoft Video Authenticator tool<\/span><\/a><span style=\"font-weight: 400;\">, which takes a video clip and gives a percentage-based authenticity score as to the likelihood of the clip being a deepfake. Another software, Deepwater, functions just like the Microsoft Video Authentication tool. Some other tools and automatic techniques include biological signals, <\/span><a href=\"https:\/\/analyticsindiamag.com\/top-ai-based-tools-techniques-for-deepfake-detection\/\"><span style=\"font-weight: 400;\">phoneme-viseme mismatches<\/span><\/a><span style=\"font-weight: 400;\">, using facial movements, and <\/span><a href=\"https:\/\/analyticsindiamag.com\/top-ai-based-tools-techniques-for-deepfake-detection\/\"><span style=\"font-weight: 400;\">recurrent convolutional strategies<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Manually detecting deepfakes is much more tasking. This process requires utmost meticulousness and sometimes luck. This involves studying incongruous attributes such as unnatural eye and body movements, unnatural facial expressions, absence of emotion, unreal hair and teeth, blurred aspects, misalignments, and inconsistent audio. In addition to these observations, one can make reverse image searches.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eff51ab elementor-widget elementor-widget-heading\" data-id=\"eff51ab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Improved Customer Experience<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85505ce elementor-widget elementor-widget-text-editor\" data-id=\"85505ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With text-to-speech technology, businesses experience minimised workload on staff and enhanced personalised customer experience. TTS, with AI robots, helps businesses pass the necessary information to their clientele fluidly with few expected errors. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d75f6c elementor-widget elementor-widget-heading\" data-id=\"0d75f6c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Dangerous Are Deepfakes?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c6c7fc elementor-widget elementor-widget-text-editor\" data-id=\"6c6c7fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">While deepfakes come with their special packs of merits in arts for film creation; in research such as medicine where you can use AI generative technology to make fake <\/span><a href=\"https:\/\/www.springwise.com\/ai-system-creates-synthetic-brain-scans\/\"><span style=\"font-weight: 400;\">brain scans<\/span><\/a><span style=\"font-weight: 400;\"> on the real patients; and for identity protection such as in interviews.<\/span><\/p><p><span style=\"font-weight: 400;\">The dangers of deepfakes, however, are insurmountable. Below we discuss some of them and their social, political, and economic impacts:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-466c064 elementor-widget elementor-widget-heading\" data-id=\"466c064\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Revenge Porn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efaae78 elementor-widget elementor-widget-text-editor\" data-id=\"efaae78\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The list of ills that deepfakes bring can never be complete without mentioning its pornographic application. The very origin of the name &#8220;deepfakes&#8221;, as we&#8217;ve mentioned earlier in this post, springs from its use in the malicious creation of pornographic content. To put this in perspective, <\/span><a href=\"https:\/\/www.independent.co.uk\/arts-entertainment\/tv\/news\/kristen-bell-deepfake-porn-video-good-place-vox-a9559906.html\"><span style=\"font-weight: 400;\">research shows that pornographic content online in 2020 contained 96% of deepfake videos<\/span><\/a><span style=\"font-weight: 400;\">, which means deepfake pornography was made to tarnish the image of its victims. This puts the reputation of female celebrities, especially, at risk of absolute damage if not controlled.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f705a6 elementor-widget elementor-widget-heading\" data-id=\"9f705a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Phishing and Scamming<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2ef81a elementor-widget elementor-widget-text-editor\" data-id=\"a2ef81a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">People can use Deepfake technology to create fake videos of persons of financial authority to prise money from them. In 2020, <\/span><a href=\"https:\/\/www.pandasecurity.com\/en\/mediacenter\/technology\/deepfake-fraud\/?amp=1https:\/\/www.forrester.com\/blogs\/predictions-2020-cybersecurity\/\"><span style=\"font-weight: 400;\">Forrester predicted the cost of deepfakes scams to be $250 million<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c775d5f elementor-widget elementor-widget-heading\" data-id=\"c775d5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Legal Evidence Compromise<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afcd239 elementor-widget elementor-widget-text-editor\" data-id=\"afcd239\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Another danger of deepfake technology is its application to the legal system, where people can use it to alter, tamper with, and deny criminal evidence. For example, between 2019 and 2020, during a child custody battle in a British courtroom, <\/span><a href=\"https:\/\/www.abajournal.com\/web\/article\/courts-and-lawyers-struggle-with-growing-prevalence-of-deepfakes\"><span style=\"font-weight: 400;\">a woman presented doctored recordings of her husband being abusive.<\/span><\/a><span style=\"font-weight: 400;\"> Thanks to the husband who could prove otherwise, justice would have probably been served wrong.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76a1763 elementor-widget elementor-widget-heading\" data-id=\"76a1763\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Medical Infrastructural Compromise<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d78ee61 elementor-widget elementor-widget-text-editor\" data-id=\"d78ee61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The positives of deepfakes can also double as a demerit. Earlier, we mentioned how deepfakes could be used to create false brain scans to help study a patient&#8217;s tumour condition. When this application is broadened, it can be used by persons with malicious intent to deceive medical facilities into believing the wrong radiographic information about a targeted patient.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65b7578 elementor-widget elementor-widget-heading\" data-id=\"65b7578\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Political Propaganda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a9ae2 elementor-widget elementor-widget-text-editor\" data-id=\"a5a9ae2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Political opponents can use Deepfakes to influence the public and sow fear and distrust.<\/span><\/p><p><span style=\"font-weight: 400;\">In 2008, 2012, and 2016 respectively, <\/span><a href=\"https:\/\/www.brookings.edu\/articles\/is-seeing-still-believing-the-deepfake-challenge-to-truth-in-politics\/\"><span style=\"font-weight: 400;\">Barack Obama was recorded telling a small gathering of people that residents of hard-hit regions often resorted to religion and guns<\/span><\/a><span style=\"font-weight: 400;\">; Mitt Romney was recorded saying 47% of the nation&#8217;s population were content with depending on the government for basic amenities, and Hillary Clinton was observed shunning a group of Trump&#8217;s supporters and reducing them to &#8220;deplorable&#8221;, all of which were eventually found out to be fake.<\/span><\/p><p><span style=\"font-weight: 400;\">The political intricacies and consequences of deepfakes, if not efficiently managed, are capable of leaving a dent in global democracy.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e52ddf elementor-widget elementor-widget-heading\" data-id=\"3e52ddf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is Deepfake Technology Legal?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03ee2f3 elementor-widget elementor-widget-text-editor\" data-id=\"03ee2f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The legality of deepfakes is subject to certain factors specifically tailored to stave off the victimization of potential possible victims. In December 2019, the World Intellectual Property Organisation (WIPO) published its <\/span><a href=\"https:\/\/www.wipo.int\/export\/sites\/www\/about-ip\/en\/artificial_intelligence\/call_for_comments\/pdf\/ind_lacasa.pdf\"><span style=\"font-weight: 400;\">Draft Issues Paper on Intellectual policy and Artificial Intelligence<\/span><\/a><span style=\"font-weight: 400;\">. As it stands, deepfakes have not been permanently marked illegal at least in nearly every country in the world. <\/span><a href=\"https:\/\/www.businessinsider.com\/china-making-deepfakes-illegal-requiring-that-ai-videos-be-marked-2019-11?r=US&amp;IR=T\"><span style=\"font-weight: 400;\">China is among the microscopic few countries taking active actions regarding the prohibition of deepfakes<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">According to WIPO, if the contents of deepfakes completely contradict the victims&#8217; lives, the contents cannot be granted copyright protection. <\/span><span style=\"font-weight: 400; color: #333333;\">In the same draft, WIPO states that if a deepfake content is irrelevant, inaccurate, let&#8217;s false, it should be erased expeditiously<\/span><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Deepfakes aren&#8217;t exactly illegal, but caveats around their usage, publication, and creation are in place. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36dff81 elementor-widget elementor-widget-heading\" data-id=\"36dff81\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wrapping it Up<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9096db4 elementor-widget elementor-widget-text-editor\" data-id=\"9096db4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">While deepfakes have harmless applications, the effects of their malicious usage exceed their merits, <a href=\"https:\/\/www.accuknox.com\/blog\/emerging-cybersecurity-threats\">raising concerns regarding cyber security<\/a>, digital content verity, global democracy, and individual privacy.<\/span><\/p><p><span style=\"font-weight: 400;\">When in 2019, <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/13\/what-are-deepfakes-and-how-can-you-spot-them\"><span style=\"font-weight: 400;\">the number of deepfake videos found online was 15,000; according to Deeptrace,<\/span><\/a><span style=\"font-weight: 400;\"> this was double the number found nine months earlier. Furthermore, 96% of these videos were pornographic, and 99% of these pornographic videos made women their victims.<\/span><\/p><p><span style=\"font-weight: 400;\">The statistics show a staggering multiplication growth rate of malicious deepfakes. If governments worldwide do not actively address these concerns, who knows how deep the digital future will be into fakery?<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca835f0 elementor-widget elementor-widget-heading\" data-id=\"ca835f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Related Articles<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75e0af9 elementor-widget elementor-widget-text-editor\" data-id=\"75e0af9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<center><div class='yarpp yarpp-related yarpp-related-shortcode yarpp-template-thumbnails'>\n<!-- YARPP Thumbnails -->\n<h3><\/h3>\n<div class=\"yarpp-thumbnails-horizontal\">\n<a class='yarpp-thumbnail' rel='norewrite' href='https:\/\/synthesys.io\/blog\/can-you-monetize-youtube-videos-with-text-to-speech-al-voices\/' title='Can You Monetize Youtube Videos with Text-to-Speech Al Voices?'>\n<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/10\/can-you-monetise-youtube-videos-with-text-to-speech-al-voices-1536x1020-1-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"can you monetise youtube videos with text to speech al voices\" data-pin-nopin=\"true\" \/><span class=\"yarpp-thumbnail-title\">Can You Monetize Youtube Videos with Text-to-Speech Al Voices?<\/span><\/a>\n<a class='yarpp-thumbnail' rel='norewrite' href='https:\/\/synthesys.io\/blog\/how-to-turn-your-articles-into-videos\/' title='How To Turn Your Articles into Videos'>\n<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/12\/articles-to-video-2-1536x1024-1-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"articles to video 2 Synthesys AI Studio\" data-pin-nopin=\"true\" \/><span class=\"yarpp-thumbnail-title\">How To Turn Your Articles into Videos<\/span><\/a>\n<a class='yarpp-thumbnail' rel='norewrite' href='https:\/\/synthesys.io\/blog\/synthesia-alternatives\/' title='5 Best Synthesia Alternatives'>\n<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2023\/08\/Synthesias-Alternatives-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"Synthesia\u2019s Alternatives\" data-pin-nopin=\"true\" srcset=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2023\/08\/Synthesias-Alternatives-150x150.webp 150w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2023\/08\/Synthesias-Alternatives-120x120.webp 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><span class=\"yarpp-thumbnail-title\">5 Best Synthesia Alternatives<\/span><\/a>\n<a class='yarpp-thumbnail' rel='norewrite' href='https:\/\/synthesys.io\/blog\/generative-ai-trends\/' title='Top 10 Generative AI Trends To Look Out for in 2024'>\n<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2024\/02\/generative-AI-1-150x150.webp\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"generative-AI trends\" data-pin-nopin=\"true\" srcset=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2024\/02\/generative-AI-1-150x150.webp 150w, https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2024\/02\/generative-AI-1-120x120.webp 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><span class=\"yarpp-thumbnail-title\">Top 10 Generative AI Trends To Look Out for in 2024<\/span><\/a>\n<\/div>\n<\/div>\n<\/center>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is a Deepfake? by Oliver Goodwin | Reading Time: minutes Does the possibility of actors being present on set despite temporal and\/or spatial gaps ever bewilder you? For instance, after the demise of Paul Walker in 2013, we got to understand that he&#8217;d left behind incomplete scenes. Yet, upon the release of Fast &amp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":855,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>What is a Deepfake? | Blog - Synthesys<\/title>\r\n<meta name=\"description\" content=\"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/synthesys.io\/blog\/what-is-deepfake\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"What is a Deepfake? | Blog - Synthesys\" \/>\r\n<meta property=\"og:description\" content=\"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/synthesys.io\/blog\/what-is-deepfake\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Blog - Synthesys\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Synthesys-AI-Studio\/100076575441886\/\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-05-03T06:01:23+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-02-01T11:44:17+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\r\n\t<meta property=\"og:image:height\" content=\"853\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#\\\/schema\\\/person\\\/a702671d5187c580ebf84b3a909883fe\"},\"headline\":\"What is a Deepfake?\",\"datePublished\":\"2022-05-03T06:01:23+00:00\",\"dateModified\":\"2024-02-01T11:44:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/\"},\"wordCount\":2558,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/deepfake.webp\",\"articleSection\":[\"AI Video\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/\",\"url\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/\",\"name\":\"What is a Deepfake? | Blog - Synthesys\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/deepfake.webp\",\"datePublished\":\"2022-05-03T06:01:23+00:00\",\"dateModified\":\"2024-02-01T11:44:17+00:00\",\"description\":\"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#primaryimage\",\"url\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/deepfake.webp\",\"contentUrl\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/deepfake.webp\",\"width\":1280,\"height\":853,\"caption\":\"What is a Deepfake\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/what-is-deepfake\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Deepfake?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/\",\"name\":\"Blog - Synthesys\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#organization\",\"name\":\"Synthesys Blog\",\"url\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.synthesys.io\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/blog.synthesys.io\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo.png\",\"width\":131,\"height\":32,\"caption\":\"Synthesys Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/Synthesys-AI-Studio\\\/100076575441886\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/synthesys-studio\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/synthesys.io\\\/blog\\\/#\\\/schema\\\/person\\\/a702671d5187c580ebf84b3a909883fe\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/blog.synthesys.io\"]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Deepfake? | Blog - Synthesys","description":"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/","og_locale":"en_US","og_type":"article","og_title":"What is a Deepfake? | Blog - Synthesys","og_description":"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.","og_url":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/","og_site_name":"Blog - Synthesys","article_publisher":"https:\/\/www.facebook.com\/people\/Synthesys-AI-Studio\/100076575441886\/","article_published_time":"2022-05-03T06:01:23+00:00","article_modified_time":"2024-02-01T11:44:17+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#article","isPartOf":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/"},"author":{"name":"admin","@id":"https:\/\/synthesys.io\/blog\/#\/schema\/person\/a702671d5187c580ebf84b3a909883fe"},"headline":"What is a Deepfake?","datePublished":"2022-05-03T06:01:23+00:00","dateModified":"2024-02-01T11:44:17+00:00","mainEntityOfPage":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/"},"wordCount":2558,"commentCount":0,"publisher":{"@id":"https:\/\/synthesys.io\/blog\/#organization"},"image":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#primaryimage"},"thumbnailUrl":"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp","articleSection":["AI Video"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/synthesys.io\/blog\/what-is-deepfake\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/","url":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/","name":"What is a Deepfake? | Blog - Synthesys","isPartOf":{"@id":"https:\/\/synthesys.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#primaryimage"},"image":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#primaryimage"},"thumbnailUrl":"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp","datePublished":"2022-05-03T06:01:23+00:00","dateModified":"2024-02-01T11:44:17+00:00","description":"If you want to know about what deepfake is and everything about it, keep reading our complete guide and learn everything about it.","breadcrumb":{"@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/synthesys.io\/blog\/what-is-deepfake\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#primaryimage","url":"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp","contentUrl":"https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp","width":1280,"height":853,"caption":"What is a Deepfake"},{"@type":"BreadcrumbList","@id":"https:\/\/synthesys.io\/blog\/what-is-deepfake\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/synthesys.io\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Deepfake?"}]},{"@type":"WebSite","@id":"https:\/\/synthesys.io\/blog\/#website","url":"https:\/\/synthesys.io\/blog\/","name":"Blog - Synthesys","description":"","publisher":{"@id":"https:\/\/synthesys.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/synthesys.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/synthesys.io\/blog\/#organization","name":"Synthesys Blog","url":"https:\/\/synthesys.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/synthesys.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.synthesys.io\/wp-content\/uploads\/2022\/04\/logo.png","contentUrl":"https:\/\/blog.synthesys.io\/wp-content\/uploads\/2022\/04\/logo.png","width":131,"height":32,"caption":"Synthesys Blog"},"image":{"@id":"https:\/\/synthesys.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Synthesys-AI-Studio\/100076575441886\/","https:\/\/www.linkedin.com\/company\/synthesys-studio"]},{"@type":"Person","@id":"https:\/\/synthesys.io\/blog\/#\/schema\/person\/a702671d5187c580ebf84b3a909883fe","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a34b35e0393bbc37a65ec48e0544e6044f50528d1edab04404bec1a4f31d9473?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.synthesys.io"]}]}},"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake-150x150.webp",150,150,true],"full":["https:\/\/synthesys.io\/blog\/wp-content\/uploads\/2022\/05\/deepfake.webp",1280,853,false]},"categories_names":{"8":{"name":"AI Video","link":"https:\/\/synthesys.io\/blog\/category\/ai-video\/"}},"tags_names":[],"comments_number":"0","_links":{"self":[{"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/posts\/100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":69,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":2711,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/posts\/100\/revisions\/2711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/media\/855"}],"wp:attachment":[{"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/synthesys.io\/blog\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}