SlideShare a Scribd company logo
1 of 10
Download to read offline
Misinformation on the internet:
Video and AI
Vasileios Mezaris
CERTH-ITI
Presentation at the "Age of misinformation: an interdisciplinary outlook on fake news" webinar
17th December 2020
Vasileios Mezaris, December 2020
Why focus on video?
• Powerful, sensational, persuasive medium
• “Believe nothing you hear, and only one half that you see.”
(Edgar Allan Poe, Nov. 1845)
Vasileios Mezaris, December 2020
Can I believe what I see?
• Is this video exactly as captured by the camera? (detection)
• What has been altered, and how do you know? (explanation)
• Why has it been altered? (understanding intent)
→ Intent is important; are the below edited videos carriers of
misinformation? Should they be banned from internet platforms?
Video credits: Media Forensics Challenge (MFC) dataset; GRIP, University Federico II, Naples
Vasileios Mezaris, December 2020
What is the role of AI?
• A powerful enabler of detecting and understanding video
manipulations
• But also a tool for promoting misinformation! (deepfakes; can
facilitate Distributed Denial of Truth (DDoT) attacks)
Prediction: Tampered Tampering localization / explanation (kind of…)
Vasileios Mezaris
Vasileios Mezaris, December 2020
InVID-WeVerify Verification Plugin: a “Swiss army knife” for
video verification
A browser plugin to debunk fake news
and to verify videos and images
>30.000
users
• Check prior video use: reverse video
search on the Web
• Check contextual information: Social-
media-based contextual analysis
• Keyframe/image inspection by
magnifying glass
• Check image (keyframe) forensics
Free! Get it from:
https://www.invid-project.eu/verify
Verifying videos: a browser plugin
H2020 IA, 2016-2018
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
A CERTH-ITI / InVID webpage for video fragmentation and reverse
web search; helps to quicky catch the “easy fakes” (try it!):
http://multimedia3.iti.gr/video_
fragmentation/service/start.html
Verifying videos: a web service
H2020 IA, 2016-2018
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
https://www.youtube.com/watch?v=OVAxQA3gMEo
“Video, the crowd in panic flees
from Notre Dame in Paris after
the attack of an armed man”
A video verification example
Vasileios Mezaris
Vasileios Mezaris, December 2020
AI4Media: A European Excellence Centre for Media, Society and
Democracy
• AI against disinformation is one of our use cases
• We are advancing the SoA in AI, in various directions (e.g. explainability, robustness)
More AI for verifying videos
H2020 RIA, 2020-2024
Coordinator: CERTH
Vasileios Mezaris
Vasileios Mezaris, December 2020
• Whether a video is a carrier of misinformation is not an easy yes/no question; may require
detecting & interpreting manipulations, and understanding intent
• Even relatively simple approaches, such as video fragmentation for reserse Web search, can
have great impact [1]
• AI is the enabler of more elaborate manipulation detection [2], but can also be a risk
[1] D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou, V. Mezaris, "The InVID Plug-in:
Web Video Verification on the Browser", Proc. Int. Workshop on Multimedia Verification (MuVer 2017) at ACM Multimedia 2017, Mountain
View, CA, USA, October 2017.
[2] G. Mercier, F. Markatopoulou, R. Cozien, M. Zampoglou, E. Apostolidis, A. Metsai, S. Papadopoulos, V. Mezaris, I. Patras, I. Kompatsiaris,
"Detecting Manipulations in Video", in book "Video Verification in the Fake News Era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou
(Eds.), pp. 161-189, Springer, 2019.
[3] "Video verification in the fake news era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Editors), Springer, 2019.
Concluding remarks
• Complete automation is not easy; often, AI+human symbiosis is the key [3]
• New challenges & advances in AI (e.g. Explainable AI) will create new
opportunities for even greater use of AI in verification (of video and more)
Vasileios Mezaris, December 2020
Questions?
Contact: Dr. Vasileios Mezaris
Research Director, Head of Intelligent Digital Transformation Laboratory
Information Technologies Institute (ITI) /
Centre for Research and Technology Hellas (CERTH)
Thermi-Thessaloniki, Greece
Email: bmezaris@iti.gr, web: http://www.iti.gr/~bmezaris/
This work was supported in part by the EU’s Horizon 2020 programme
grant agreements H2020-687786 InVID and H2020-951911 AI4Media

More Related Content

What's hot

[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...AIIM International
 
10 Trends in Social and Digital Media
10 Trends in Social and Digital Media10 Trends in Social and Digital Media
10 Trends in Social and Digital Mediamariomvas
 
Оголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і ПрограманіяОголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і Програманіяdemchenko
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26chefhja
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Browser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitBrowser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitKurtis Armour
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outChris Hammond-Thrasher
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationInVID Project
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Stuart Barr
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Free as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraFree as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraGiovanni Battista Gallus
 

What's hot (14)

[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
 
Take Down
Take DownTake Down
Take Down
 
10 Trends in Social and Digital Media
10 Trends in Social and Digital Media10 Trends in Social and Digital Media
10 Trends in Social and Digital Media
 
Оголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і ПрограманіяОголошення на мінікемпі: OneWebDay і Програманія
Оголошення на мінікемпі: OneWebDay і Програманія
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Browser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides DetroitBrowser and Windows Hardening Bsides Detroit
Browser and Windows Hardening Bsides Detroit
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried out
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
passaro_021815
passaro_021815passaro_021815
passaro_021815
 
Free as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance eraFree as in freedom. The importance of FOSS in the surveillance era
Free as in freedom. The importance of FOSS in the surveillance era
 

Similar to Misinformation on the internet: Video and AI

Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...VasileiosMezaris
 
Social media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsSocial media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsYiannis Kompatsiaris
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
 
Assignment 2 with script
Assignment 2 with scriptAssignment 2 with script
Assignment 2 with scriptMaxineOwens
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014iDIALOGHI
 
Technology and the changing face of education
Technology and the changing face of educationTechnology and the changing face of education
Technology and the changing face of educationdwesting
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfHOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfLorenzoBielli2
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012Bex Lewis
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetSymeon Papadopoulos
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
SXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSeán Earley
 

Similar to Misinformation on the internet: Video and AI (20)

Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...Video, AI and News: video analysis and verification technologies for supporti...
Video, AI and News: video analysis and verification technologies for supporti...
 
Social media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and eventsSocial media mining for sensing and responding to real-world trends and events
Social media mining for sensing and responding to real-world trends and events
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
Assignment 2 with script
Assignment 2 with scriptAssignment 2 with script
Assignment 2 with script
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Aggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media ContentAggregating and Analyzing the Context of Social Media Content
Aggregating and Analyzing the Context of Social Media Content
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014From Social Media Chaos to Social Business Security - Geneva 2014
From Social Media Chaos to Social Business Security - Geneva 2014
 
Technology and the changing face of education
Technology and the changing face of educationTechnology and the changing face of education
Technology and the changing face of education
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
03.fbis10083
03.fbis1008303.fbis10083
03.fbis10083
 
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdfHOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
HOW TECHNOLOGY HAS IMPACTED THE LIVES OF CONSUMERS AND BUSINESS - slideshare.pdf
 
The digital revolution and the future 2012
The digital revolution and the future 2012The digital revolution and the future 2012
The digital revolution and the future 2012
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Verifying Multimedia Content on the Internet
Verifying Multimedia Content on the InternetVerifying Multimedia Content on the Internet
Verifying Multimedia Content on the Internet
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
SXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and TrepidationSXSW 2017 - Trends and Trepidation
SXSW 2017 - Trends and Trepidation
 

More from VasileiosMezaris

Multi-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationMulti-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationVasileiosMezaris
 
CERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskCERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskVasileiosMezaris
 
Spatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosSpatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosVasileiosMezaris
 
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...VasileiosMezaris
 
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022VasileiosMezaris
 
TAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsTAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsVasileiosMezaris
 
Explaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionExplaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionVasileiosMezaris
 
Combining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchCombining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchVasileiosMezaris
 
Explaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersExplaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersVasileiosMezaris
 
Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...VasileiosMezaris
 
Are all combinations equal? Combining textual and visual features with multi...
Are all combinations equal?  Combining textual and visual features with multi...Are all combinations equal?  Combining textual and visual features with multi...
Are all combinations equal? Combining textual and visual features with multi...VasileiosMezaris
 
CA-SUM Video Summarization
CA-SUM Video SummarizationCA-SUM Video Summarization
CA-SUM Video SummarizationVasileiosMezaris
 
Video smart cropping web application
Video smart cropping web applicationVideo smart cropping web application
Video smart cropping web applicationVasileiosMezaris
 
PGL SUM Video Summarization
PGL SUM Video SummarizationPGL SUM Video Summarization
PGL SUM Video SummarizationVasileiosMezaris
 
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalHard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalVasileiosMezaris
 
PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020VasileiosMezaris
 
GAN-based video summarization
GAN-based video summarizationGAN-based video summarization
GAN-based video summarizationVasileiosMezaris
 

More from VasileiosMezaris (20)

Multi-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and LocalizationMulti-Modal Fusion for Image Manipulation Detection and Localization
Multi-Modal Fusion for Image Manipulation Detection and Localization
 
CERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages TaskCERTH-ITI at MediaEval 2023 NewsImages Task
CERTH-ITI at MediaEval 2023 NewsImages Task
 
Spatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees VideosSpatio-Temporal Summarization of 360-degrees Videos
Spatio-Temporal Summarization of 360-degrees Videos
 
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
Masked Feature Modelling for the unsupervised pre-training of a Graph Attenti...
 
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
Cross-modal Networks and Dual Softmax Operation for MediaEval NewsImages 2022
 
TAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for ExplanationsTAME: Trainable Attention Mechanism for Explanations
TAME: Trainable Attention Mechanism for Explanations
 
Gated-ViGAT
Gated-ViGATGated-ViGAT
Gated-ViGAT
 
Explaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attentionExplaining video summarization based on the focus of attention
Explaining video summarization based on the focus of attention
 
Combining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video SearchCombining textual and visual features for Ad-hoc Video Search
Combining textual and visual features for Ad-hoc Video Search
 
Explaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiersExplaining the decisions of image/video classifiers
Explaining the decisions of image/video classifiers
 
Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...Learning visual explanations for DCNN-based image classifiers using an attent...
Learning visual explanations for DCNN-based image classifiers using an attent...
 
Are all combinations equal? Combining textual and visual features with multi...
Are all combinations equal?  Combining textual and visual features with multi...Are all combinations equal?  Combining textual and visual features with multi...
Are all combinations equal? Combining textual and visual features with multi...
 
CA-SUM Video Summarization
CA-SUM Video SummarizationCA-SUM Video Summarization
CA-SUM Video Summarization
 
Video smart cropping web application
Video smart cropping web applicationVideo smart cropping web application
Video smart cropping web application
 
PGL SUM Video Summarization
PGL SUM Video SummarizationPGL SUM Video Summarization
PGL SUM Video Summarization
 
Video Thumbnail Selector
Video Thumbnail SelectorVideo Thumbnail Selector
Video Thumbnail Selector
 
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal RetrievalHard-Negatives Selection Strategy for Cross-Modal Retrieval
Hard-Negatives Selection Strategy for Cross-Modal Retrieval
 
LSTM Structured Pruning
LSTM Structured PruningLSTM Structured Pruning
LSTM Structured Pruning
 
PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020PoR_evaluation_measure_acm_mm_2020
PoR_evaluation_measure_acm_mm_2020
 
GAN-based video summarization
GAN-based video summarizationGAN-based video summarization
GAN-based video summarization
 

Recently uploaded

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 

Recently uploaded (20)

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 

Misinformation on the internet: Video and AI

  • 1. Misinformation on the internet: Video and AI Vasileios Mezaris CERTH-ITI Presentation at the "Age of misinformation: an interdisciplinary outlook on fake news" webinar 17th December 2020
  • 2. Vasileios Mezaris, December 2020 Why focus on video? • Powerful, sensational, persuasive medium • “Believe nothing you hear, and only one half that you see.” (Edgar Allan Poe, Nov. 1845)
  • 3. Vasileios Mezaris, December 2020 Can I believe what I see? • Is this video exactly as captured by the camera? (detection) • What has been altered, and how do you know? (explanation) • Why has it been altered? (understanding intent) → Intent is important; are the below edited videos carriers of misinformation? Should they be banned from internet platforms? Video credits: Media Forensics Challenge (MFC) dataset; GRIP, University Federico II, Naples
  • 4. Vasileios Mezaris, December 2020 What is the role of AI? • A powerful enabler of detecting and understanding video manipulations • But also a tool for promoting misinformation! (deepfakes; can facilitate Distributed Denial of Truth (DDoT) attacks) Prediction: Tampered Tampering localization / explanation (kind of…)
  • 5. Vasileios Mezaris Vasileios Mezaris, December 2020 InVID-WeVerify Verification Plugin: a “Swiss army knife” for video verification A browser plugin to debunk fake news and to verify videos and images >30.000 users • Check prior video use: reverse video search on the Web • Check contextual information: Social- media-based contextual analysis • Keyframe/image inspection by magnifying glass • Check image (keyframe) forensics Free! Get it from: https://www.invid-project.eu/verify Verifying videos: a browser plugin H2020 IA, 2016-2018 Coordinator: CERTH
  • 6. Vasileios Mezaris Vasileios Mezaris, December 2020 A CERTH-ITI / InVID webpage for video fragmentation and reverse web search; helps to quicky catch the “easy fakes” (try it!): http://multimedia3.iti.gr/video_ fragmentation/service/start.html Verifying videos: a web service H2020 IA, 2016-2018 Coordinator: CERTH
  • 7. Vasileios Mezaris Vasileios Mezaris, December 2020 https://www.youtube.com/watch?v=OVAxQA3gMEo “Video, the crowd in panic flees from Notre Dame in Paris after the attack of an armed man” A video verification example
  • 8. Vasileios Mezaris Vasileios Mezaris, December 2020 AI4Media: A European Excellence Centre for Media, Society and Democracy • AI against disinformation is one of our use cases • We are advancing the SoA in AI, in various directions (e.g. explainability, robustness) More AI for verifying videos H2020 RIA, 2020-2024 Coordinator: CERTH
  • 9. Vasileios Mezaris Vasileios Mezaris, December 2020 • Whether a video is a carrier of misinformation is not an easy yes/no question; may require detecting & interpreting manipulations, and understanding intent • Even relatively simple approaches, such as video fragmentation for reserse Web search, can have great impact [1] • AI is the enabler of more elaborate manipulation detection [2], but can also be a risk [1] D. Teyssou, J.-M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou, V. Mezaris, "The InVID Plug-in: Web Video Verification on the Browser", Proc. Int. Workshop on Multimedia Verification (MuVer 2017) at ACM Multimedia 2017, Mountain View, CA, USA, October 2017. [2] G. Mercier, F. Markatopoulou, R. Cozien, M. Zampoglou, E. Apostolidis, A. Metsai, S. Papadopoulos, V. Mezaris, I. Patras, I. Kompatsiaris, "Detecting Manipulations in Video", in book "Video Verification in the Fake News Era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Eds.), pp. 161-189, Springer, 2019. [3] "Video verification in the fake news era", V. Mezaris, L. Nixon, S. Papadopoulos, D. Teyssou (Editors), Springer, 2019. Concluding remarks • Complete automation is not easy; often, AI+human symbiosis is the key [3] • New challenges & advances in AI (e.g. Explainable AI) will create new opportunities for even greater use of AI in verification (of video and more)
  • 10. Vasileios Mezaris, December 2020 Questions? Contact: Dr. Vasileios Mezaris Research Director, Head of Intelligent Digital Transformation Laboratory Information Technologies Institute (ITI) / Centre for Research and Technology Hellas (CERTH) Thermi-Thessaloniki, Greece Email: bmezaris@iti.gr, web: http://www.iti.gr/~bmezaris/ This work was supported in part by the EU’s Horizon 2020 programme grant agreements H2020-687786 InVID and H2020-951911 AI4Media