SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Misinformation on the internet:
Video and AI
Vasileios Mezaris
CERTH-ITI
Presentation at the "Age of misinformation: an interdisciplinary outlook on fake news" webinar
17th December 2020
Vasileios Mezaris, December 2020
Why focus on video?
• Powerful, sensational, persuasive medium
• “Believe nothing you hear, and only one half that you see.”
(Edgar Allan Poe, Nov. 1845)
Vasileios Mezaris, December 2020
Can I believe what I see?
• Is this video exactly as captured by the camera? (detection)
• What has been altered, and how do you know? (explanation)
• Why has it been altered? (understanding intent)
→ Intent is important; are the below edited videos carriers of
misinformation? Should they be banned from internet platforms?
Video credits: Media Forensics Challenge (MFC) dataset; GRIP, University Federico II, Naples
Vasileios Mezaris, December 2020
What is the role of AI?
• A powerful enabler of detecting and understanding video
manipulations
• But also a tool for promoting misinformation! (deepfakes; can
facilitate Distributed Denial of Truth (DDoT) attacks)
Prediction: Tampered Tampering localization / explanation (kind of…)
Vasileios Mezaris
Vasileios Mezaris, December 2020
InVID-WeVerify Verification Plugin: a “Swiss army knife” for
video verification
A browser plugin to debunk fake news
and to verify videos and images
>30.000
users
• Check prior video use: reverse video
search on the Web
• Check contextual information: Social-
media-based contextual analysis
• Keyframe/image inspection by
magnifying glass
• Check image (keyframe) forensics
Free! Get it from:
https://www.invid-project.eu/verify
Verifying videos: a browser plugin
H2020 IA, 2016-2018
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
A CERTH-ITI / InVID webpage for video fragmentation and reverse
web search; helps to quicky catch the “easy fakes” (try it!):
http://multimedia3.iti.gr/video_
fragmentation/service/start.html
Verifying videos: a web service
H2020 IA, 2016-2018
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
https://www.youtube.com/watch?v=OVAxQA3gMEo
“Video, the crowd in panic flees
from Notre Dame in Paris after
the attack of an armed man”
A video verification example
Vasileios Mezaris
Vasileios Mezaris, December 2020
AI4Media: A European Excellence Centre for Media, Society and
Democracy
• AI against disinformation is one of our use cases
• We are advancing the SoA in AI, in various directions (e.g. explainability, robustness)
More AI for verifying videos
H2020 RIA, 2020-2024
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
• Whether a video is a carrier of misinformation is not an easy yes/no question; may require
detecting & interpreting manipulations, and understanding intent
• Even relatively simple approaches, such as video fragmentation for reserse Web search, can
have great impact [1]
• AI is the enabler of more elaborate manipulation detection [2], but can also be a risk
[1] D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou, V. Mezaris, "The InVID Plug-in:
Web Video Verification on the Browser", Proc. Int. Workshop on Multimedia Verification (MuVer 2017) at ACM Multimedia 2017, Mountain
View, CA, USA, October 2017.
[2] G. Mercier, F. Markatopoulou, R. Cozien, M. Zampoglou, E. Apostolidis, A. Metsai, S. Papadopoulos, V. Mezaris, I. Patras, I. Kompatsiaris,
"Detecting Manipulations in Video", in book "Video Verification in the Fake News Era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou
(Eds.), pp. 161-189, Springer, 2019.
[3] "Video verification in the fake news era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Editors), Springer, 2019.
Concluding remarks
• Complete automation is not easy; often, AI+human symbiosis is the key [3]
• New challenges & advances in AI (e.g. Explainable AI) will create new
opportunities for even greater use of AI in verification (of video and more)
Vasileios Mezaris, December 2020
Questions?
Contact: Dr. Vasileios Mezaris
Research Director, Head of Intelligent Digital Transformation Laboratory
Information Technologies Institute (ITI) /
Centre for Research and Technology Hellas (CERTH)
Thermi-Thessaloniki, Greece
Email: bmezaris@iti.gr, web: http://www.iti.gr/~bmezaris/
This work was supported in part by the EU’s Horizon 2020 programme
grant agreements H2020-687786 InVID and H2020-951911 AI4Media

Más contenido relacionado

La actualidad más candente

[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...AIIM International
 
10 Trends in Social and Digital Media
10 Trends in Social and Digital Media10 Trends in Social and Digital Media
10 Trends in Social and Digital Mediamariomvas
 
Оголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і ПрограманіяОголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і Програманіяdemchenko
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26chefhja
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Browser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitBrowser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitKurtis Armour
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outChris Hammond-Thrasher
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationInVID Project
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Stuart Barr
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Free as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraFree as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraGiovanni Battista Gallus
 

La actualidad más candente (14)

[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
 
Take Down
Take DownTake Down
Take Down
 
10 Trends in Social and Digital Media
10 Trends in Social and Digital Media10 Trends in Social and Digital Media
10 Trends in Social and Digital Media
 
Оголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і ПрограманіяОголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і Програманія
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Browser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitBrowser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides Detroit
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried out
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
passaro_021815
passaro_021815passaro_021815
passaro_021815
 
Free as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraFree as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance era
 

Similar a Misinformation on the internet: Video and AI

Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...VasileiosMezaris
 
Social media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsSocial media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsYiannis Kompatsiaris
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
 
Assignment 2 with script
Assignment 2 with scriptAssignment 2 with script
Assignment 2 with scriptMaxineOwens
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014iDIALOGHI
 
Technology and the changing face of education
Technology and the changing face of educationTechnology and the changing face of education
Technology and the changing face of educationdwesting
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfHOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfLorenzoBielli2
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012Bex Lewis
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetSymeon Papadopoulos
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
SXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSeán Earley
 

Similar a Misinformation on the internet: Video and AI (20)

Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...
 
Social media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsSocial media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and events
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
Assignment 2 with script
Assignment 2 with scriptAssignment 2 with script
Assignment 2 with script
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
Technology and the changing face of education
Technology and the changing face of educationTechnology and the changing face of education
Technology and the changing face of education
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
03.fbis10083
03.fbis1008303.fbis10083
03.fbis10083
 
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfHOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
SXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and Trepidation
 

Más de VasileiosMezaris

Multi-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationMulti-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationVasileiosMezaris
 
CERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskCERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskVasileiosMezaris
 
Spatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosSpatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosVasileiosMezaris
 
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...VasileiosMezaris
 
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022VasileiosMezaris
 
TAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsTAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsVasileiosMezaris
 
Explaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionExplaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionVasileiosMezaris
 
Combining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchCombining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchVasileiosMezaris
 
Explaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersExplaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersVasileiosMezaris
 
Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...VasileiosMezaris
 
Are all combinations equal? Combining textual and visual features with multi...
Are all combinations equal?  Combining textual and visual features with multi...Are all combinations equal?  Combining textual and visual features with multi...
Are all combinations equal? Combining textual and visual features with multi...VasileiosMezaris
 
CA-SUM Video Summarization
CA-SUM Video SummarizationCA-SUM Video Summarization
CA-SUM Video SummarizationVasileiosMezaris
 
Video smart cropping web application
Video smart cropping web applicationVideo smart cropping web application
Video smart cropping web applicationVasileiosMezaris
 
PGL SUM Video Summarization
PGL SUM Video SummarizationPGL SUM Video Summarization
PGL SUM Video SummarizationVasileiosMezaris
 
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalHard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalVasileiosMezaris
 
PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020VasileiosMezaris
 
GAN-based video summarization
GAN-based video summarizationGAN-based video summarization
GAN-based video summarizationVasileiosMezaris
 

Más de VasileiosMezaris (20)

Multi-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationMulti-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and Localization
 
CERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskCERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages Task
 
Spatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosSpatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees Videos
 
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
 
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
 
TAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsTAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for Explanations
 
Gated-ViGAT
Gated-ViGATGated-ViGAT
Gated-ViGAT
 
Explaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionExplaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attention
 
Combining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchCombining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video Search
 
Explaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersExplaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiers
 
Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...
 
Are all combinations equal? Combining textual and visual features with multi...
Are all combinations equal?  Combining textual and visual features with multi...Are all combinations equal?  Combining textual and visual features with multi...
Are all combinations equal? Combining textual and visual features with multi...
 
CA-SUM Video Summarization
CA-SUM Video SummarizationCA-SUM Video Summarization
CA-SUM Video Summarization
 
Video smart cropping web application
Video smart cropping web applicationVideo smart cropping web application
Video smart cropping web application
 
PGL SUM Video Summarization
PGL SUM Video SummarizationPGL SUM Video Summarization
PGL SUM Video Summarization
 
Video Thumbnail Selector
Video Thumbnail SelectorVideo Thumbnail Selector
Video Thumbnail Selector
 
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalHard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
 
LSTM Structured Pruning
LSTM Structured PruningLSTM Structured Pruning
LSTM Structured Pruning
 
PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020
 
GAN-based video summarization
GAN-based video summarizationGAN-based video summarization
GAN-based video summarization
 

Último

STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONrouseeyyy
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Silpa
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPirithiRaju
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformationAreesha Ahmad
 
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY1301aanya
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Servicemonikaservice1
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Mohammad Khajehpour
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicinesherlingomez2
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 

Último (20)

STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 

Misinformation on the internet: Video and AI

  • 1. Misinformation on the internet: Video and AI Vasileios Mezaris CERTH-ITI Presentation at the "Age of misinformation: an interdisciplinary outlook on fake news" webinar 17th December 2020
  • 2. Vasileios Mezaris, December 2020 Why focus on video? • Powerful, sensational, persuasive medium • “Believe nothing you hear, and only one half that you see.” (Edgar Allan Poe, Nov. 1845)
  • 3. Vasileios Mezaris, December 2020 Can I believe what I see? • Is this video exactly as captured by the camera? (detection) • What has been altered, and how do you know? (explanation) • Why has it been altered? (understanding intent) → Intent is important; are the below edited videos carriers of misinformation? Should they be banned from internet platforms? Video credits: Media Forensics Challenge (MFC) dataset; GRIP, University Federico II, Naples
  • 4. Vasileios Mezaris, December 2020 What is the role of AI? • A powerful enabler of detecting and understanding video manipulations • But also a tool for promoting misinformation! (deepfakes; can facilitate Distributed Denial of Truth (DDoT) attacks) Prediction: Tampered Tampering localization / explanation (kind of…)
  • 5. Vasileios Mezaris Vasileios Mezaris, December 2020 InVID-WeVerify Verification Plugin: a “Swiss army knife” for video verification A browser plugin to debunk fake news and to verify videos and images >30.000 users • Check prior video use: reverse video search on the Web • Check contextual information: Social- media-based contextual analysis • Keyframe/image inspection by magnifying glass • Check image (keyframe) forensics Free! Get it from: https://www.invid-project.eu/verify Verifying videos: a browser plugin H2020 IA, 2016-2018 Coordinator: CERTH
  • 6. Vasileios Mezaris Vasileios Mezaris, December 2020 A CERTH-ITI / InVID webpage for video fragmentation and reverse web search; helps to quicky catch the “easy fakes” (try it!): http://multimedia3.iti.gr/video_ fragmentation/service/start.html Verifying videos: a web service H2020 IA, 2016-2018 Coordinator: CERTH
  • 7. Vasileios Mezaris Vasileios Mezaris, December 2020 https://www.youtube.com/watch?v=OVAxQA3gMEo “Video, the crowd in panic flees from Notre Dame in Paris after the attack of an armed man” A video verification example
  • 8. Vasileios Mezaris Vasileios Mezaris, December 2020 AI4Media: A European Excellence Centre for Media, Society and Democracy • AI against disinformation is one of our use cases • We are advancing the SoA in AI, in various directions (e.g. explainability, robustness) More AI for verifying videos H2020 RIA, 2020-2024 Coordinator: CERTH
  • 9. Vasileios Mezaris Vasileios Mezaris, December 2020 • Whether a video is a carrier of misinformation is not an easy yes/no question; may require detecting & interpreting manipulations, and understanding intent • Even relatively simple approaches, such as video fragmentation for reserse Web search, can have great impact [1] • AI is the enabler of more elaborate manipulation detection [2], but can also be a risk [1] D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou, V. Mezaris, "The InVID Plug-in: Web Video Verification on the Browser", Proc. Int. Workshop on Multimedia Verification (MuVer 2017) at ACM Multimedia 2017, Mountain View, CA, USA, October 2017. [2] G. Mercier, F. Markatopoulou, R. Cozien, M. Zampoglou, E. Apostolidis, A. Metsai, S. Papadopoulos, V. Mezaris, I. Patras, I. Kompatsiaris, "Detecting Manipulations in Video", in book "Video Verification in the Fake News Era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Eds.), pp. 161-189, Springer, 2019. [3] "Video verification in the fake news era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Editors), Springer, 2019. Concluding remarks • Complete automation is not easy; often, AI+human symbiosis is the key [3] • New challenges & advances in AI (e.g. Explainable AI) will create new opportunities for even greater use of AI in verification (of video and more)
  • 10. Vasileios Mezaris, December 2020 Questions? Contact: Dr. Vasileios Mezaris Research Director, Head of Intelligent Digital Transformation Laboratory Information Technologies Institute (ITI) / Centre for Research and Technology Hellas (CERTH) Thermi-Thessaloniki, Greece Email: bmezaris@iti.gr, web: http://www.iti.gr/~bmezaris/ This work was supported in part by the EU’s Horizon 2020 programme grant agreements H2020-687786 InVID and H2020-951911 AI4Media