Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.


Exploring today's technology for tomorrow's possibilities
What is a Deepfake and How to Spot One

What is a Deepfake and How to Spot One

Stephen Mash


This article will seek to answer two key questions. Firstly, what are Deepfakes which is straightforward to answer, secondly, how to spot one, which is by far the trickier proposition. We’ll also look at the history of Deepfakes, the technology behind their creation and some of their uses.

What is a Deepfake?

Simply speaking, it’s fake media content, typically still image, video or audio of one or more persons that a computer system creates using artificial intelligence (AI) techniques.
The most common use is to generate videos. For example, can computers superimpose one person’s fake images and voice patterns onto another person, instituting a face swap. As a result, a computer creates a Deepfake video of a person doing and saying things they have never done or said.
So what is a deep fake? The term is simply the conjunction of “deep learning” and “fake”, hence “Deepfake”. The distinguishing feature of Deepfake media is that they appear convincing even though they portray fictitious events at first sight.

What is Deepfake Technology?

Deepfake technology is specifically the use of computer machine learning techniques to create visual and audio content with the intention to deceive the audience. The process uses deep learning, a machine learning technique that uses an artificial neural network that learns how to create movements and sounds for an individual person by analysing real videos of that person.
The most typical method of creating Deepfake content uses two algorithms working in combination for a process of continuous refinement.
  • The first algorithm, known as the generator, produces fake content;
  • The second algorithm, known as the discriminator, then assesses the content and identifies all the data points that indicate the content is fake;
  • This information feeds back from the discriminator algorithm to the generator algorithm;
  • The generator algorithm’s machine learning-based processing then refines the content to resolve the tell-tale signs spotted by the discriminator algorithm.
This process continues until the discriminator algorithm cannot determine that the content is fake. Thus, this process is a generative adversarial network, two algorithms working in a combative partnership to achieve the desired result.

The History of Deepfakes

Manipulating photographs has been going on as long as photography has been around. Soon after the development of moving images, techniques to alter the pictures followed.
The movie industry has been at the forefront of manipulating images for artistic purposes, whether it’s superimposing computer-generated images using green screen technology or using a computer to automatically mask out an actor’s tattoos rather than relying on makeup to cover them over.
The first recorded use of Deepfake technology was in 1997, a computer-generated image of a person’s face moved in response to music to appear as if that person were singing.
The late twenty-tens says a series of advances where researchers created convincing videos, including one system that allowed a computer-generated face to recreate a person’s facial expressions in real-time. This period also saw the use of Deepfake techniques enter into general usage. Now anyone with a computer and access to software could create a Deepfake. Deepfake software is now widely available, including apps for mobile devices.
Channel 4 highlighted the capabilities of the technology on Christmas Day 2020 when they broadcast their traditional alternative Christmas speech using a Deepfake video of the Queen. This programme showed the ability to produce a broadcast-quality video that was four minutes long. The video dramatically ended by revealing the actor delivering the speech.

Why are Deepfakes Created?

Movie Making

The movie industry is always looking for methods of improving filmmaking. Deepfake technology offers the ability to include the likeness of a deceased actor in a film for continuity purposes, such as the appearances of Carrie Fisher and Peter Cushing in the Star Wars franchise films produced after their passing.
The technology also has the potential to correct acting mistakes without having to reshoot an entire scene, potentially offering huge production cost savings.
In theory, it can also replace one actor with an entirely different actor if circumstances warrant a post-production change.
There is also the potential to improve dubbed films by subtly modifying the actor’s facial expressions to match the dubbed soundtrack and removing the sometimes-distracting mismatch between their mouth movements and the sounds.


Another purpose widely seen is to create videos of political figures making statements that could discredit that person for parody or malicious intent. Typically the person makes a controversial or offensive statement that undermines their character or enables their opponents to support a claim against their fitness for office. Attempts of such acts of political sabotage have seen fake videos of Barak Obama and Donald Trump. However, none have stood up to scrutiny.
The technology can also create fictitious characters using AI-generated faces that appear to be real people. The purpose is to make political statements, deliver propaganda, or spread disinformation. These non-existent people are sock puppets that anonymous individuals or organisations use to convey controversial views or make personal attacks.


From a security perspective, Deepfakes have the potential for use in phishing campaigns where hackers attempt to persuade a potential victim to click on a dangerous link or perform an action such as transferring money to the attacker’s account.
The ability to send a video message that appears to be from someone the victim knows has the potential to increase the success rate of such an attack. For example, an employee working in an accounts department receiving a video call that appears to be from a senior director instructing them to transfer funds would be significantly more compelling than an email or text message.

Adult-Orientated Content

The most common purpose is sadly content of an adult nature, creating videos of a specific person engaged in explicit acts. A survey of Deepfake videos undertaken at the end of 2019 found that over 96% were for this purpose. Almost all involved using a female celebrity’s image to generate the Deepfake.

Creating Doubt

A final observed purpose is for blackmail, or rather to counter blackmail. Deepfake technology is not yet at the stage where creating videos to blackmail a victim is a credible proposition. Forensic analysis of the videos will quickly identify the video as being fake. However, where an individual is subject to blackmail through genuine video footage, creating multiple Deepfakes on behalf of the target can cast doubt onto the believability of the real video.

Do Deepfakes have Benefits?

Away from the movie industry, Deepfake technology does have useful and practical applications.
For example, a patient who is permanently unable to speak following a medical event may require a voice generation device to communicate. While these devices were initially robotic sounding, as demonstrated by the late Stephen Hawking, modern versions sound very lifelike.
Now, Deepfake audio technology can allow these devices to replicate the user’s voice using available recordings. The ability to retain their voice, with unique accent and inflexions, offers significant wellbeing benefits over the long term as they recover.

How Can You Spot a Deepfake?

When Deepfakes first appeared, their inferior quality made visual detection simple. Looking for lip-syncing issues, odd areas of skin tones, blurring around moving features, or unnatural movements will spot the low-quality Deepfakes. However, the technology has reached the point where the generation of convincing videos that look genuine to the viewer is possible.
Looking at the believability of the content and tracing back the source of the video can help. If the video shows someone acting out of character or espousing views that run counter to their usual public persona, then you should be cautious. If the video is not from a credible and trustworthy source, then a question mark should hang over its legitimacy.
The problem is that people tend to believe anything that reinforces their personal views. Thus, even when experts expose the deception behind a Deepfake video, some people will still think it is authentic and distrust the evidence that it is fake. This is a societal problem that reached far beyond synthetic media into the broader issues of fake news.
Technological solutions for detecting Deepfakes employ primarily the same deep learning algorithms that created them in the first place.
  • Looking for subtle inconsistencies and artefacts in video and audio data that the generation process creates will provide a means to detect it as a Deepfake.
  • Other techniques look for inconsistencies in the fine detail of the fake images, such as reflections or blink patterns, to spot evidence of computer generation processes behind the imagery.
The problem is that soon after finding a solution to consistently and reliably spotting Deepfakes, updates to generation software resolve the tell-tale issues that gave them away.


Producing fake videos that can deceive the average viewer is now relatively straightforward with the technology we all have at our disposal. But, without controls, we may soon find ourselves bombarded with fake news through social media channels that appear genuine and credible. Unfortunately, it’s only a matter of time before such phoney information sways public opinion, influences elections, or manipulates stock markets.
Producing Deepfakes is not a crime unless there is an intent to use it for malicious purposes or it depicts an individual in such a way that constitutes harassment.
The cyber security sector is already seeing the use of Deepfake videos to coerce individuals to perform fraudulent acts by deceiving them into believing they are dealing with a known contact. Deepfake technology can play a significant role in social engineering techniques.


Spotting Deepfakes is not a simple task that we can do without the help of the technology that creates them in the first place. Unfortunately, there’s a race between the means of creation and detection, each trying to keep one step ahead.
The critical advice is don’t believe everything you see and hear, especially if it’s not from a trustworthy source that you can independently check.
About the Author: Stephen Mash is a contributing writer for HP Tech Takes. Stephen is a UK-based freelance technology writer with a background in cybersecurity and risk management.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.


Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by; reseller offers may vary. Items sold by are not for immediate resale. Orders that do not comply with terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license.

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (