Modes of operation
Generating believable fake content requires taking care of multiple aspects to ensure that the results are as authentic as possible. A typical deepfake setup requires a source, a target, and the generated content.
- The source, denoted with subscript s, is the driver identity that controls the required output
- The target, denoted with subscript t, is the identity being faked
- The generated content, denoted with subscript g, is the result following the transformation of the source to the target.
Now that we have some basic terminology in place, let's dive deeper and understand different ways of generating fake content.
Replacement
This is the most widely used form of generating fake content. The aim is to replace specific content of the target (xt) with that from the source (xs). Face replacement has been an active area of research for quite some time now. Figure 8.1 shows Donald Trump's face being replaced with Nicolas...