Digital cloning is an emerging technology, that involves deep-learning algorithms, which allows one to manipulate currently existing
audio
Audio most commonly refers to sound, as it is transmitted in signal form. It may also refer to:
Sound
*Audio signal, an electrical representation of sound
*Audio frequency, a frequency in the audio spectrum
*Digital audio, representation of sound ...
,
photos
A photograph (also known as a photo, or more generically referred to as an ''image'' or ''picture'') is an image created by light falling on a photosensitive surface, usually photographic film or an electronic image sensor. The process and prac ...
, and
video
Video is an Electronics, electronic medium for the recording, copying, playback, broadcasting, and display of moving picture, moving image, visual Media (communication), media. Video was first developed for mechanical television systems, whi ...
s that are hyper-realistic. One of the impacts of such technology is that hyper-realistic videos and photos makes it difficult for the human eye to distinguish what is real and what is fake. Furthermore, with various companies making such technologies available to the public, they can bring various benefits as well as potential legal and ethical concerns.
Digital cloning can be categorized into audio-visual (AV), memory, personality, and
consumer behaviour
Consumer behaviour is the study of individuals, groups, or organisations and all activities associated with the Purchasing, purchase, Utility, use and disposal of goods and services. It encompasses how the consumer's emotions, Attitude (psy ...
cloning.
In AV cloning, the creation of a cloned digital version of the digital or non-digital original can be used, for example, to create a fake image, an avatar, or a fake video or
audio
Audio most commonly refers to sound, as it is transmitted in signal form. It may also refer to:
Sound
*Audio signal, an electrical representation of sound
*Audio frequency, a frequency in the audio spectrum
*Digital audio, representation of sound ...
of a person that cannot be easily differentiated from the real person it is purported to represent. A memory and personality clone like a mindclone is essentially a digital copy of a person’s mind. A consumer behavior clone is a profile or cluster of customers based on demographics.
Truby and Brown coined the term “digital thought clone” to refer to the evolution of digital cloning into a more advanced personalized digital clone that consists of “a replica of all known data and behavior on a specific living person, recording in real-time their choices, preferences, behavioral trends, and decision making processes.”
[ Text was copied from this source, which is available under ]
Creative Commons Attribution 4.0 International License
Digital cloning first became popular in the entertainment industry. The idea of digital clones originated from movie companies creating
virtual actor
A virtual actor or also known as virtual human, virtual persona, or digital clone is the creation or re-creation of a human being in image and voice using computer-generated imagery and sound, that is often indistinguishable from the real actor. ...
s of actors who have died. When actors die during a movie production, a digital clone of the actor can be synthesized using past footage, photos, and voice recordings to mimic the real person in order to continue the movie production.
Modern artificial intelligence, has allowed for the creation of
deepfake
''Deepfakes'' (a portmanteau of and ) are images, videos, or audio that have been edited or generated using artificial intelligence, AI-based tools or AV editing software. They may depict real or fictional people and are considered a form of ...
s. This involves manipulation of a video to the point where the person depicted in the video is saying or performing actions he or she may not have consented to.
In April 2018,
BuzzFeed
BuzzFeed, Inc. is an American Internet mass media, media, news and entertainment company with a focus on digital media. Based in New York City, BuzzFeed was founded in 2006 by Jonah Peretti and John Seward Johnson III, John S. Johnson III to ...
released a deepfake video of
Jordan Peele
Jordan Haworth Peele (born February 21, 1979) is an American actor, comedian and filmmaker. He is known for his film and television work in the Comedy film, comedy and Horror film, horror genres. He has received List of awards and nominations r ...
, which was manipulated to depict former President,
Barack Obama
Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
, making statements he has previously not made in public to warn the public against the potential dangers of deepfakes.
In addition to deepfakes, companies such as
Intellitar now allows one to easily create a digital clone of themselves by feeding a series of images and voice recordings. This essentially creates
digital immortality
Digital immortality (or "virtual immortality") is the hypothetical concept of storing (or cloning) a person's personality in digital substrate, i.e., a computer, robot or cyberspace (mind uploading). The result might look like an avatar behaving, r ...
, allowing loved ones to interact with representations of those who died.
Digital cloning not only allows one to digitally memorialize their loved ones, but they can also be used to create representations of historical figures and be used in an educational setting.
With the development of various technology, as mentioned above, there are numerous concerns that arises, including
identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
,
data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information".
Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
es, and other ethical concerns. One of the issues with digital cloning is that there are little to no legislations to protect potential victims against these possible problems.
Technology
Intelligent Avatar Platforms (IAP)
Intelligent Avatar Platform (IAP) can be defined as an online platform supported by
artificial intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
that allows one to create a
clone of themselves.
The individual must train his or her clone to act and speak like themselves by feeding the algorithm numerous voice recordings and videos of themselves.
Essentially, the platforms are marketed as a place where one 'lives eternally', as they are able to interact with other avatars on the same platform. IAP is becoming a platform for one to attain
digital immortality
Digital immortality (or "virtual immortality") is the hypothetical concept of storing (or cloning) a person's personality in digital substrate, i.e., a computer, robot or cyberspace (mind uploading). The result might look like an avatar behaving, r ...
, along with maintaining a family tree and legacy for generations following to see.
Some examples of IAP include
Intellitar and Eterni.me. Although most of these companies are still in its developing stages, they all are trying to achieve the same goal of allowing the user to create an exact duplicate of themselves to store every memory they have in their mind into the cyberspace.
Some include a free version, which only allows the user to choose their avatar from a given set of images and audio. However, with the premium setting, these companies will ask the user to upload photos, videos, and audio recordings of one to form a realistic version of themselves. Additionally, to ensure that the clone is as close to the original person, companies also encourage interacting with their own clone by chatting and answering questions for them. This allows the algorithm to learn the
cognition
Cognition is the "mental action or process of acquiring knowledge and understanding through thought, experience, and the senses". It encompasses all aspects of intellectual functions and processes such as: perception, attention, thought, ...
of the original person and apply that to the clone. Intellitar closed down in 2012 because of intellectual property battles over the technology it used.
Potential concerns with IAP includes the potential
data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information".
Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
es and not getting
consent
Consent occurs when one person voluntarily agrees to the proposal or desires of another. It is a term of common speech, with specific definitions used in such fields as the law, medicine, research, and sexual consent. Consent as understood i ...
of the deceased. IAP must have a strong foundation and responsibility against data breaches and hacking in order to protect personal information of the dead, which can include voice recording, photos, and messages.
In addition to the risk of
personal privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of ...
being compromised, there is also the risk of violating the
privacy of the deceased. Although one can give consent to creating a digital clone of themselves before his or her physical death, they are unable to give consent to the actions the digital clone may take.
Deepfakes
As described earlier, deepfakes is a form of video manipulation where one can change the people present by feeding various images of a specific person they want. Furthermore, one can also change the voice and words the person in the video says by simply submitting series of voice recordings of the new person lasting about one or two minutes long. In 2018, a new app called FakeApp was released, allowing the public to easily access this technology to create videos. This app was also used to create the
Buzzfeed
BuzzFeed, Inc. is an American Internet mass media, media, news and entertainment company with a focus on digital media. Based in New York City, BuzzFeed was founded in 2006 by Jonah Peretti and John Seward Johnson III, John S. Johnson III to ...
video of former President
Barack Obama
Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
.
With deepfakes, industries can cut the cost of hiring actors or models for films and advertisements by creating videos and film efficiently at a low cost just by collecting a series of photos and audio recordings with the consent of the individual.
Potential concerns with deepfakes is that access is given to virtually anyone who downloads the different apps that offer the same service. With anyone being able to access this tool, some may maliciously use the app to create revenge porn and manipulative videos of public officials making statements they will never say in real life. This not only invades the privacy of the individual in the video but also brings up various ethical concerns.
Voice cloning
Voice cloning is a case of the
audio deepfake
Audio deepfake technology, also referred to as voice cloning or deepfake audio, is an application of artificial intelligence designed to generate speech that convincingly mimics specific individuals, often speech synthesis, synthesizing phrases or ...
methods that uses
artificial intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
to generate a clone of a person's voice. Voice cloning involves
deep learning
Deep learning is a subset of machine learning that focuses on utilizing multilayered neural networks to perform tasks such as classification, regression, and representation learning. The field takes inspiration from biological neuroscience a ...
algorithm that takes in voice recordings of an individual and can
synthesize such a voice to the point where it can faithfully replicate a human voice with great accuracy of tone and likeness.
Cloning a voice requires high-performance computers. Usually, the computations are done using the
Graphics Processing Unit (GPU), and very often resort to the
cloud computing
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
, due to the enormous amount of calculation needed.
Audio data for training has to be fed into an artificial intelligence model. These are often original recordings that provide an example of the voice of the person concerned. Artificial intelligence can use this data to create an authentic voice, which can reproduce whatever is typed, called
Text-To-Speech
Speech synthesis is the artificial production of human speech. A computer system used for this purpose is called a speech synthesizer, and can be implemented in software or Computer hardware, hardware products. A text-to-speech (TTS) system conv ...
, or spoken, called Speech-To-Speech.
This technology worries many because of its impact on various issues, from political discourse to the rule of law. Some of the early warning signs have already appeared in the form of phone scams
and fake videos on social media of people doing things they never did.
Protections against these threats can be primarily implemented in two ways. The first is to create a way to analyze or detect the authenticity of a video. This approach will inevitably be an upside game as ever-evolving generators defeat these detectors. The second way could be to embed the creation and modification information in software or hardware.
This would work only if the data were not editable, but the idea would be to create an inaudible watermark that would act as a source of truth.
In other words, we could know if the video is authentic by seeing where it was shot, produced, edited, and so on.
15.ai—a non-commercial freeware web application that began as a
proof of concept
A proof of concept (POC or PoC), also known as proof of principle, is an inchoate realization of a certain idea or method in order to demonstrate its feasibility or viability. A proof of concept is usually small and may or may not be complete ...
of the
democratization
Democratization, or democratisation, is the structural government transition from an democratic transition, authoritarian government to a more democratic political regime, including substantive political changes moving in a democratic direction ...
of voice acting and dubbing using technology—gives the public access to such technology.
[
] Its gratis and non-commercial nature (with the only stipulation being that the project be properly credited when used
), ease of use, and substantial improvements to current text-to-speech implementations have been lauded by users;
however, some critics and
voice actor
Voice acting is the art of Acting, performing a character or providing information to an audience with one's voice. Performers are often called voice actors/actresses in addition to other names. Examples of voice work include animation, animated, ...
s have questioned the legality and
ethicality of leaving such technology publicly available and readily accessible.
Although this application is still in the developmental stage, it is rapidly developing as big technology corporations, such as
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
and
Amazon
Amazon most often refers to:
* Amazon River, in South America
* Amazon rainforest, a rainforest covering most of the Amazon basin
* Amazon (company), an American multinational technology company
* Amazons, a tribe of female warriors in Greek myth ...
are investing vast amounts of money for the development.
Some of the positive uses of voice cloning include the ability to synthesize millions of audiobooks without the use of human labor.
Also, voice cloning was used to translate podcast content into different languages using the podcaster's voice. Another includes those who may have lost their voice can gain back a sense of individuality by creating their voice clone by inputting recordings of them speaking before they lost their voices.
On the other hand, voice cloning is also susceptible to misuse. An example of this is the voices of celebrities and public officials being cloned, and the voice may say something to provoke conflict despite the actual person has no association with what their voice said.
In recognition of the threat that voice cloning poses to privacy, civility, and democratic processes, the Institutions, including the
Federal Trade Commission
The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) United States antitrust law, antitrust law and the promotion of consumer protection. It ...
,
U.S. Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government that oversees the domestic enforcement of federal laws and the administration of justice. It is equi ...
and
Defense Advanced Research Projects Agency (DARPA)
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
and the Italian
Ministry of Education, University and Research (MIUR), have weighed in on various audio deepfake use cases and methods that might be used to combat them.
Constructive uses
Education
Digital cloning can be useful in an educational setting to create a more immersive experience for students. Some students may learn better through a more interactive experience and creating deepfakes can enhance the learning ability of students. One example of this includes creating a digital clone of historical figures, such as
Abraham Lincoln
Abraham Lincoln (February 12, 1809 – April 15, 1865) was the 16th president of the United States, serving from 1861 until Assassination of Abraham Lincoln, his assassination in 1865. He led the United States through the American Civil War ...
, to show what problems he faced during his life and how he was able to overcome them. Another example of using digital clones in an educational setting is having speakers create a digital clone of themselves. Various advocacy groups may have trouble with schedules as they are touring various schools during the year. However, by creating digital clones of themselves, their clones can present the topic at places where the group could not physically make it. These educational benefits can bring students a new way of learning as well as giving access to those who previously were not able to access resources due to environmental conditions.
Arts
Although digital cloning has already been in the entertainment and arts industry for a while, artificial intelligence can greatly expand the uses of these technology in the industry. The movie-industry can create even more hyper-realistic actors and actresses who have died. Additionally, movie-industry can also create digital clones in movie scenes that may require extras, which can help cut the cost of production immensely. However, digital cloning and other technology can be beneficial for non-commercial purposes. For example, artists can be more expressive if they are looking to synthesize avatars to be part of their video production. They can also create digital avatars to draft up their work and help formulate their ideas before moving on working on the final work.
Actor
Val Kilmer
Val Edward Kilmer (December 31, 1959 – April 1, 2025) was an American actor. Initially a stage actor, he later found fame as a Leading actor, leading man in films in a wide variety of genres, including Comedy film, comedies, dramas, action fi ...
lost his voice in 2014 after a
tracheotomy
Tracheotomy (, ), or tracheostomy, is a surgical airway management procedure which consists of making an incision on the front of the neck to open a direct airway to the trachea. The resulting stoma (hole) can serve independently as an airway ...
due to his
throat cancer
Head and neck cancer is a general term encompassing multiple cancers that can develop in the head and neck region. These include cancers of the mouth, tongue, gums and lips ( oral cancer), voice box ( laryngeal), throat ( nasopharyngeal, orophar ...
.
However, he partnered with an AI company that produced a synthetic voice based on his previous recordings.
The voice enabled Kilmer to retake his "Iceman" role from 1986 ''
Top Gun
''Top Gun'' is a 1986 American action drama film directed by Tony Scott and produced by Don Simpson and Jerry Bruckheimer, with distribution by Paramount Pictures. The screenplay was written by Jim Cash and Jack Epps Jr., and was inspired ...
'' in the 2022 sequel film ''
Top Gun: Maverick''.
Digital immortality
Although
digital immortality
Digital immortality (or "virtual immortality") is the hypothetical concept of storing (or cloning) a person's personality in digital substrate, i.e., a computer, robot or cyberspace (mind uploading). The result might look like an avatar behaving, r ...
has existed for a while as social media accounts of the deceased continue to remain in cyberspace, creating a virtual clone that is immortal takes on a new meaning. With the creation of a digital clone, one can not only capture the visual presence of themselves but also their mannerism, including personality and cognition. With digital immortality, one can continue to interact with a representation of their loved ones after they have died. Furthermore, families can connect with the representations of multiple generations, forming a family tree, in a sense, to pass on the family legacy to future generations, providing a way for history to be passed down.
Concerns
Fake news
With a lack of regulations for deepfakes, there are several concerns that have arisen. Some concerning deepfake videos that can bring potential harm includes depiction of political officials displaying inappropriate behavior, police officers shown as shooting unarmed black men, and soldiers murdering innocent civilians may begin to appear although it may have never occurred in real life. With such hyper-realistic videos being released on the Internet, it becomes very easy for the public to be misinformed, which could lead people to take actions, thus contributing to this vicious cycle of unnecessary harm. Additionally, with the rise in fake news in recent news, there is also the possibility of combining deepfakes and fake news. This will bring further difficulty to distinguishing what is real and what is fake. Visual information can be very convincing to the human eyes, therefore, the combination of deepfakes and fake news can have a detrimental effect on society.
Strict regulations should be made by social media companies and other platforms for news.
Personal use
Another reason deepfakes can be used maliciously is for one to sabotage another on a personal level. With the increased accessibility of technologies to create deepfakes,
blackmail
Blackmail is a criminal act of coercion using a threat.
As a criminal offense, blackmail is defined in various ways in common law jurisdictions. In the United States, blackmail is generally defined as a crime of information, involving a thr ...
ers and thieves are able to easily extract personal information for financial gains and other reasons by creating videos of loved ones of the victim asking for help.
Furthermore, voice cloning can be used maliciously for criminals to make fake phone calls to victims. The phone calls will have the exact voice and mannerism as the individual, which can trick the victim into giving
private information
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
to the criminal without knowing. Alternatively, a bad actor could, for example, create a deepfake of a person superimposed onto a video to extract blackmail payment and/or as an act of
revenge porn
Revenge porn is the distribution of sexually explicit images or videos of individuals without their consent, with the punitive intention to create public humiliation or character assassination out of revenge against the victim. The material ma ...
.
Creating deepfakes and voice clones for personal use can be extremely difficult under the law because there is no commercial harm. Rather, they often come in the form of psychological and emotional damage, making it difficult for the court to provide a remedy for.
Ethical implications
Although there are numerous legal problems that arises with the development of such technology, there are also ethical problems that may not be protected under the current legislations. One of the biggest problems that comes with the use of deepfakes and voice cloning is the potential of identity theft. However, identity theft in terms of deepfakes are difficult to prosecute because there are currently no laws that are specific to deepfakes. Furthermore, the damages that malicious use of deepfakes can bring is more of a psychological and emotional one rather than a financial one, which makes it more difficult to provide a remedy for. Allen argues that the way one’s privacy should be treated is similar to
Kant’s categorical imperative.
Another ethical implication is the use of private and personal information one must give up to use the technology. Because digital cloning, deepfakes, and voice cloning all use a deep-learning algorithm, the more information the algorithm receives, the better the results are. However, every platform has a risk of data breach, which could potentially lead to very personal information being accessed by groups that users never consented to. Furthermore,
post-mortem privacy comes into question when family members of a loved one tries to gather as much information as possible to create a digital clone of the deceased without the permission of how much information they are willing to give up.
Existing laws in the United States
Copyright laws
In the United States, copyright laws require some type of originality and creativity in order to protect the author’s individuality. However, creating a digital clone simply means taking personal data, such as photos, voice recordings, and other information in order to create a virtual person that is as close to the actual person. In the decision of Supreme Court case
''Feist Publications Inc. v. Rural Television Services Company, Inc''., Justice O’Connor emphasized the importance of originality and some degree of creativity. However, the extent of originality and creativity is not clearly defined, creating a gray area for copyright laws.
Creating digital clones require not only the data of the person but also the creator’s input of how the digital clone should act or move. In ''Meshwerks v. Toyota,'' this question was raised and the court stated that the same copyright laws created for photography should be applied to digital clones.
Right of publicity
With the current lack of legislations to protect individuals against potential malicious use of digital cloning, the right of publicity may be the best way to protect one in a legal setting.
The
right of publicity
Personality rights, sometimes referred to as the right of publicity, are rights for an individual to control the commercial use of their identity, such as name, image, likeness, or other unequivocal identifiers. They are generally considered as p ...
, also referred to as personality rights, gives autonomy to the individual when it comes to controlling their own voice, appearance, and other aspects that essentially makes up their personality in a commercial setting. If a deepfake video or digital clone of one arises without their consent, depicting the individual taking actions or making statements that are out of their personality, they can take legal actions by claiming that it is violating their right to publicity. Although the right to publicity specifically states that it is meant to protect the image of an individual in a commercial setting, which requires some type of profit, some state that the legislation may be updated to protect virtually anyone's image and personality. Another important note is that the right of publicity is only implemented in specific states, so some states may have different interpretations of the right compared to other states.
Preventative measures
Regulation
Digital and digital thought clones raise legal issues relating to data privacy, informed consent, anti-discrimination, copyright, and right of publicity. More jurisdictions urgently need to enact legislation similar to the General Data Protection Regulation in Europe to protect people against unscrupulous and harmful uses of their data and the unauthorised development and use of digital thought clones.
Technology
One way to prevent being a victim to any of the technology mentioned above is to develop artificial intelligence against these algorithms. There are already several companies that have developed artificial intelligence that can detect manipulated images by looking at the patterns in each pixel. By applying a similar logic, they are trying to create a software that takes each frame of a given video and analyze it pixel by pixel in order to find the pattern of the original video and determine whether or not it has been manipulated.
In addition to developing new technology that can detect any video manipulations, many researchers are raising the importance for
private corporations creating stricter guidelines to protect individual privacy.
With the development of artificial intelligence, it is necessary to ask how this impacts society today as it begins to appear in virtually every aspect of society, including
medicine
Medicine is the science and Praxis (process), practice of caring for patients, managing the Medical diagnosis, diagnosis, prognosis, Preventive medicine, prevention, therapy, treatment, Palliative care, palliation of their injury or disease, ...
,
education
Education is the transmission of knowledge and skills and the development of character traits. Formal education occurs within a structured institutional framework, such as public schools, following a curriculum. Non-formal education als ...
,
politics
Politics () is the set of activities that are associated with decision-making, making decisions in social group, groups, or other forms of power (social and political), power relations among individuals, such as the distribution of Social sta ...
, and the
economy
An economy is an area of the Production (economics), production, Distribution (economics), distribution and trade, as well as Consumption (economics), consumption of Goods (economics), goods and Service (economics), services. In general, it is ...
. Furthermore, artificial intelligence will begin to appear in various aspects of society, which makes it important to have laws that protect
humans rights as technology takes over. As the private sector gains more digital power over the public, it is important to set strict
regulation
Regulation is the management of complex systems according to a set of rules and trends. In systems theory, these types of rules exist in various fields of biology and society, but the term has slightly different meanings according to context. Fo ...
s and laws to prevent private corporations from using personal data maliciously. Additionally, the past history of various data breaches and violations of
privacy policy
A privacy policy is a statement or legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify ...
should also be a warning for how personal information can be accessed and used without the person’s consent.
Digital literacy
Another way to prevent being harmed by these technology is by educating people on the pros and cons of digital cloning. By doing so, it empowers each individual to make a rational decision based on their own circumstances.
Furthermore, it is also important to educate people on how to protect the information they put out on the Internet. By increasing the
digital literacy
Digital literacy is an individual's ability to find, evaluate, and communicate information using typing or digital media platforms. Digital literacy combines technical and cognitive abilities; it consists of using information and communication tec ...
of the public, people have a greater chance of determining whether a given video has been manipulated as they can be more skeptical of the information they find online.
See also
*
Artificial intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
*
Deepfake
''Deepfakes'' (a portmanteau of and ) are images, videos, or audio that have been edited or generated using artificial intelligence, AI-based tools or AV editing software. They may depict real or fictional people and are considered a form of ...
*
Deep learning
Deep learning is a subset of machine learning that focuses on utilizing multilayered neural networks to perform tasks such as classification, regression, and representation learning. The field takes inspiration from biological neuroscience a ...
*
Digital media
In mass communication, digital media is any media (communication), communication media that operates in conjunction with various encoded machine-readable data formats. Digital content can be created, viewed, distributed, modified, listened to, an ...
*
Post-mortem privacy
*
Virtual actor
A virtual actor or also known as virtual human, virtual persona, or digital clone is the creation or re-creation of a human being in image and voice using computer-generated imagery and sound, that is often indistinguishable from the real actor. ...
* {{annotated link, Virtual human
References
Applications of artificial intelligence
Computer graphics
Deep learning
Identity theft
Special effects