EDITORLETTERArtificialIntelligence,DeepfakesandaFutureofEctypesLucianoFloridi1,2Publishedonline:1August2018#SpringerNatureB.
V.
2018Theartworldisfullofreproductions.
Someareplainreplicas,forexampletheMonaLisa.
Othersarefakesorforgeries,liketheBVermeers^paintedbyHanvanMeegerenthatsoldfor$60million(KreugerandvanMeegeren2010).
Thedistinctionbetweenareplicaandafakeisbasedontheconceptofauthenticity.
Isthisartefactwhatitclaimstobe1Theanswerseemssimplebut,inreality,thingsarecomplicated.
Today,thepaintingsoftheforgerJohnMyattaresofamousthattheyarevaluedatupto$40,000each,asBgenuinefakes^(Furlong1986).
Theyarenotwhattheysaytheyare,buttheyareauthenticallypaintedbyhimandnotbyanotherforger.
Andtheyarebeautiful.
Abitasifoneweretoutterabeautifullie,notanyordinarylie.
AndanartistlikeMagritteseemstohavepaintednotonlyfalsePicassosandRenoirsduringtheNazioccupationofBelgium(Marin1983),butalsofakedhisownwork,sotospeak,inthefamouscaseofthetwocopiesofthepaintingBTheFlavourofTears^(1948),bothbyMagritte,butoneofwhichhepassedoffasfalse—partlyasasurrealistactandpartlytomakemoney.
Inthismess,andasifthingswerenotconfusingenough,digitaltechnologiesfurtherreshufflewhatispossibleandourunderstandingofit.
Thankstodigitaltechnologies,todayitismucheasiertoestablishtheauthenticityofawork.
Therearedatabaseswhereyoucancheckauthors'signatures,andmillionsofimagesthatcanbeviewedwithafewclicks.
Sellingafakeismoredifficult.
Figure1showsareproductionoftheBLodgeonLakeComo^byCarlFrederikPederAagaard(1833–1895),aDanishlandscapepainteranddecorativeartist.
Itwasonsalein2016oneBay.
Thepaintingisverypopularontheweb,andthereareplentyofgoodreplicas.
Nothingwrongwiththem.
However,ifyoucheckFig.
1carefully,youwillnoticethatthisissoldasanunsignedBoriginal^,whichismisleadingtosaytheleast.
Boththequalityofthepaintingandthepricearesuspicious,andaGoogleimagesearchquicklyPhilos.
Technol.
(2018)31:317–321https://doi.
org/10.
1007/s13347-018-0325-31Ihavediscussedthenatureofquestionsandepistemicrelevancein(Floridi2008).
*LucianoFloridiluciano.
floridi@oii.
ox.
ac.
uk1OxfordInternetInstitute,UniversityofOxford,1StGiles,OxfordOX13JS,UK2TheAlanTuringInstitute,96EustonRoad,LondonNW12DB,UKrevealsthatthisisamerereplica.
Atthetimeofwriting,thepaintingwasnolongeravailableandthesellerdidnotseemtobeactiveoneBayanymore.
Ofcourse,fakesarenotalwaysreproductions;theycanalsobeBnewworks^byafamousartist,likePollockorVanGogh.
Inthiscase,sophisticatedscientifictechniquestoestablishauthenticityincludetestsrunusingAI.
Aresearchpaper,publishedlastNovemberbyAhmedElgammal,YanKangandMilkoDenLeeuw(Elgammaletal.
2017)proposedBacomputationalapproachforanalysisofstrokesinlinedrawingsbyartists^,basedonneuralnetworks.
Thetrainingcollectionconsistedofadatasetof300digitiseddrawingswithover80,000strokes,byPabloPicasso,HenryMatisseandEgonSchiele,andafewworksbyotherartists.
Bysegmentingindividualstrokes,thesystemlearnedtoquantifythecharacteristicsofindividualstrokesindrawings,thusidentifyingtheuniquepropertiesforeachartist.
ThesoftwaremanagedtoclassifyBindividualstrokeswithaccuracy70%-90%,andaggregateoverdrawingswithaccu-racyabove80%,whilebeingrobusttobedeceivedbyfakes(withaccuracy100%fordetectingfakesinmostsettings)^.
Itturnsoutthatthewayinwhichindividualsdrawlinesisasuniqueastheirfingerprintsortheirgait,andAIcanhelponetodiscoverit,asifitwereamicroscope.
ButAIisnotjustforidentifyingfakes.
LetusstayintheNetherlands,averyinterestingproject2byMicrosoft,incollaborationwiththeRembrandtHouseMuseum,hasledtothecreationofaportraitofagentleman,whichbothisandisnotaRembrandt(seeFig.
2).
Figure1Afake,theoriginalisBLodgeonLakeComo^byCarlFrederikPederAagaard(1833–1895)2Seehttps://news.
microsoft.
com/europe/features/next-rembrandt/318L.
FloridiAnalysingtheknownworksofRembrandt,analgorithmidentifiedthemostcom-monsubject(aportraitofaCaucasianman,30–40yearsold),themostcommontraits(facialhair,facingtotheright,wearingahat,acollaranddarkclothing,etc.
),themostsuitablestyletoreproducethesecharacterisingproperties,thebrushstrokes,inshort,alltheinformationneededtoproduceanewpaintingbyRembrandt.
Havingcreatedit,itwasreproducedusinga3Dprinter,toensurethatthedepthandlayeringofthecolourwouldbeascloseaspossibletoRembrandt'sstyleandwayofpainting.
Theresultisamasterpiece.
ARembrandtthatRembrandtneverpainted,butwhichchallengesourconceptsofBauthenticity^andBoriginality^,giventhepainting'sstronglinkwithRembrandthimself.
Idonotknowthevalueofthepainting.
MybetisthatitwouldbequiteexpensiveifitwereauctionedasreliablyauthenticatedasthatuniqueMicrosoft'sRembrandt.
WedonothaveawordtodefineanartefactsuchasMicrosoft'sRembrandt.
Soletmesuggestectype.
ThewordcomesfromGreekandithasasubtlemeaningthatisquiteusefulhere:anectypeisacopy,yetnotanycopy,butratheracopythathasaspecialrelationwithitssource(theoriginofitscreation),thearchetype.
Inparticular,anectypeistheimpressionleftbyaseal.
Itisnottherealthing,butitisclearlylinkedinasignificant,authenticwaywiththerealthingitself.
LockeusedBectypes^torefertoideasorimpressionsthatcorrespond,althoughsomewhatinadequately,tosomeexter-nalrealities(thearchetypes)towhichtheyrefer(Locke2008).
Digitaltechnologiesareabletoseparatethearchetypalsource—whatwasinthemindoftheartist,forexample—fromtheprocess(style,method,procedure)thatleadsfromthesourcetotheartefact(Floridi2017).
Oncethislinkissevered,onecanhaveectypesthatareBauthentic^instyleandcontent,butnotBoriginal^,intermsofarchetypalsource,likeMicrosoft'sRembrandt.
ButonecanalsohaveectypesthatareBoriginal^intermsofarchetypalsource(theydocomefromwheretheypurporttocome)yetnotBauthentic^intermsofproduction,performance,ormethod(theyarenottheonesusedbythesourcetodelivertheartefact).
Inotherwords,ectypescanbeauthenticbutunoriginalartefacts,likeMicrosoft'sRembrandt,orinauthenticbutoriginalartefacts.
AgreatexampleofaninauthenticoriginalectypewasprovidedinMarchbyanaudiorecordingofJohnF.
Kennedy'slastspeech.
Despitebeinganordinaryspeechfromadecades-oldcampaigntrail,itsuddenlymadeheadlinenews.
BecauseitwastheDallasTradeMartFig.
2TheRembrandtthatisnotaRembrandt.
MicrosoftProjectwiththeRembrandtHouseMuseumArtificialIntelligence,DeepfakesandaFutureofEctypes319speechof22November1963,thetextthatJFKwouldhaveread,hadhenotbeenassassinatedmeremomentsbefore,onhiswaytodeliverit.
Thetextisoriginal:itcomesfromthesource.
Butthevoicethatrecitesisinauthentic,becauseitwassynthesisedbysoftwarethatanalysed831recordingsofKennedy'sspeechesandinterviews,inordertoBlearn^howtospeaklikehim.
ThesoftwarefinallygavevoicetoJFK'slastspeech55yearslate.
SohereisaKennedywhoisandisnotaKennedy,similarandyetdifferentfromtheRembrandtthatisandisnotaRembrandt.
Theyarebothectypes(seeTable1).
Wesawthattheproductionofectypesdoesnotstopattheworkofart,butinvolvesanyartefact,fromtextstophotos,fromaudiorecordingstovideos.
Itiswellknownthatthehistoryofmanuscripts,printing,photography,cinemaandtelevisionispavedwithfakes.
Expectmoreectypestoo.
Inparticular,artistslovetobreakboundariesanditiseasytoimaginethat,likeMagrittefakinghisownpainting,theywillstartproducingtheirownectypes.
ImagineapainterusingthesoftwaredevelopedbyMicrosofttoproduceherownnewworks.
Itwouldstillbeanectype,andthiswouldexplainwhy(withqualifications)theprocesswouldcapturesomeauthenticity.
Thereproductionoftheworkofartbymechanicalmeanswillhaveacquiredanewmeaning(Benjamin2008).
Withectypes,weusuallyknowwherethingsstand.
Butsomeonecouldcheat.
LastMay,GooglepresentedGoogleDuplex,aversionofitsAIassistantthatsimulatesbeinghumantohelpuserswithsimpleinteractivetasks,likebookingarestauranttable.
Thecompanywasquicktostatethatitwillnotintentionallymisleadanyone,andthatitwillmakesurealwaystoclarifywhenauserisinteractingwithanartificialagent.
Butsomeoneelsecouldusethesetechnologiesforcriminalorevilpurposes.
ThisiswhathappenswithDeepfake,asetoftechniquesusedtosynthesisenewvisualproducts,forexamplebyreplacingfacesintheoriginals.
ThetypicalcasesinvolvepornmoviesinwhichthefacesoffamousactresseslikeGalGadotorScarlettJohansson(thisisregularlyaboutwomen'sfaces)areusedtoreplacetheoriginalfaces.
Inthiscasetoo,largedatabasesareneededtoinstructthesoftware(whichisavailableforfree,andthereisalsoanapp),soifyouarenotapublicfiguretherisksarelower.
Deepfakealsoconcernspoliticians,likePresidentObama,forexample.
WhatisthefutureaheadofusDigitaltechnologiesseemtoundermineourconfidenceintheoriginal,genuine,authenticnatureofwhatweseeandhear.
Butwhatthedigitalbreaksitcanalsorepair,notunliketheendlessstrugglebetweensoftwarevirusandantivirus.
Inourcase,inadditiontoeducatingpeople,acquiringnewsensitivitiesandhavingtherightlegalframework,thereareatleastacoupleofinterestingdigitalstrategies.
Forartefactsthatarealreadyavailable,itiseasytoimagineTable1Archetype,fakeandectypesOriginalsourceAuthenticproductionLeonardo'sMonaLisaYesYesHanvanMeegeren'sforgedVermeersNoNoMicrosoft'sRembrandtNo(Qualified)YesJFK'sTradeMartspeechYesNo320L.
FloridiAIsystemsthatgiveusahand.
ItwouldbeinterestingtoanalyseMicrosoft'sRembrandtandKennedy'sspeechwithanartificialsystemtoseewhetheritdiscoveredthemtobeectypes.
ResearchisalreadyavailableonmethodstoexposeDeepfakevideosgeneratedwithneuralnetworks(Lietal.
2018).
Inshort,letusrememberthesoftwaredevelopedtoanalysedrawings:thereareplentyofsophisticatedtoolsfordetectionofimageforgery.
Andmorearelikelytobedevelopedasthedemandforthemincreases.
Next,asregardsnewartefacts,becauseoriginalityandauthenticityarealsoamatterofprovablehistoricalcontinuityfromthesourcetotheproductthroughtheprocessofproduction,themuch-vauntedblockchain,orasimilarsolution,couldmakeabigdifference.
Blockchainislikearegisterthatstorestransactionsinanaccruable,safe,transparentandtraceableway.
Asasecureanddistributedregisteroftransactions,blockchainisbeingexploredasameansofreliablycertifyingtheoriginsandhistoryofparticularproducts:whetherintermsofsecuringfoodsupplychains,orinrecordingthemanylinkedactsofcreationandownershipthatdefinetheprovenanceofanartwork.
Inthefuture,wemayadoptthesamesolutionwhereverthereisaneedtoensure(orestablish)theoriginalityandauthenticityofsomeartefact,beitawrittendocument,aphoto,avideoorapainting.
Andofcourse,afutureartistmaywanttoensure,throughablockchain,thatherworkofartasanectypeisreallywhatitsaysitis.
Atthatpointweshallhavetravelledfullcircle,forweshallhaveBgenuineectypes^,liketheMicrosoft'sRembrandt,orKennedy'sspeech.
ReferencesBenjamin,W.
(2008).
Theworkofartintheageofmechanicalreproduction.
London:Penguin.
Elgammal,A.
,Kang,Y.
,&DenLeeuw,M.
(2017).
Picasso,matisse,orafakeAutomatedanalysisofdrawingsatthestrokelevelforattributionandauthentication.
arXivpreprintarXiv:1711.
03536.
Floridi,L.
(2008).
Understandingepistemicrelevance.
Erkenntnis,69(1),69–92.
Floridi,L.
(2017).
Digital'scleavingpoweranditsconsequences.
Philosophy&Technology,30(2),123–129.
Furlong,M.
(1986).
Genuinefake:abiographyofAlanWatts.
Portsmouth:Heinemann.
Kreuger,F.
H.
,&vanMeegeren,H.
(2010).
HanvanMeegerenrevisited:hisart&listofworks.
Delft:F.
H.
Kreuger.
Li,Y,Chang,M.
-C.
,Farid,H.
,&Lyu,S.
(2018).
InIctuOculi:exposingAIgeneratedfakefacevideosbydetectingeyeblinking.
arXivpreprintarXiv:1806.
02877.
Locke,J.
(2008).
Anessayconcerninghumanunderstanding.
NewYorkOxford:OxfordUniversityPress.
Marin,M.
(1983).
Leradeaudelamémoire:souvenirsdéterminés.
Paris:Pré-aux-Clercs.
ArtificialIntelligence,DeepfakesandaFutureofEctypes321
每年的7月的最后一个周五是全球性质的“系统管理员日”,据说是为了感谢系统管理员的辛苦工作....friendhosting决定从现在开始一直到9月8日对其全球9个数据中心的VPS进行4.5折(优惠55%)大促销。所有VPS基于KVM虚拟,给100M带宽,不限制流量,允许自定义上传ISO...官方网站:https://friendhosting.net比特币、信用卡、PayPal、支付宝、微信、we...
百纵科技官网:https://www.baizon.cn/百纵科技:美国云服务器活动重磅来袭,洛杉矶C3机房 带金盾高防,会员后台可自助管理防火墙,添加黑白名单 CC策略开启低中高.CPU全系列E52680v3 DDR4内存 三星固态盘列阵。另有高防清洗!美国洛杉矶 CN2 云服务器CPU内存带宽数据盘防御价格1H1G10M10G10G19元/月 购买地址2H1G10M10G10G29元/月 购买...
BlueHost 主机商在以前做外贸网站的时候还是经常会用到的,想必那时候有做外贸网站或者是选择海外主机的时候还是较多会用BlueHost主机商的。只不过这些年云服务器流行且性价比较高,于是大家可选择商家变多,但是BlueHost在外贸主机用户群中可选的还是比较多的。这次年中618活动大促来袭,毕竟BLUEHOST商家目前中文公司设立在上海,等后面有机会也过去看看。他们也会根据我们的国内年中促销发...
pornmovies为你推荐
存储备份备份在sd卡的怎么恢复硬盘工作原理数据存储的原理是什么今日油条油条每周最多能吃多少access数据库access数据库的组成是什么刘祚天DJ是什么职业?lunwenjiance知网论文检测查重系统丑福晋八阿哥胤禩有几个福晋 都叫啥名儿呀同一ip网站同IP的网站互相链接会被K吗?百度关键词工具百度有关键字分析工具吗?Google AdWords有的www.622hh.comwww.710av.com怎么不可以看了
域名解析文件 新秒杀 gitcafe 合肥鹏博士 好看qq空间 国外免费全能空间 秒杀预告 域名转接 me空间社区 南通服务器 傲盾官网 33456 联通网站 smtp服务器地址 什么是web服务器 防cc攻击 阿里云邮箱怎么注册 wordpress空间 锐速 hdchina 更多