{"id":28246,"date":"2025-11-26T16:30:00","date_gmt":"2025-11-26T15:30:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=28246"},"modified":"2025-12-03T09:53:00","modified_gmt":"2025-12-03T08:53:00","slug":"anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/","title":{"rendered":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0"},"content":{"rendered":"\n<p style=\"text-align: justify;\" aria-level=\"1\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><span data-contrast=\"auto\">A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Malicious uses of deepfakes can be grouped into three main categories:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><b><span data-contrast=\"auto\">Disinformation\u00a0and enhanced phishing:\u00a0F<\/span><\/b><span data-contrast=\"auto\">alsified videos with\u00a0carefully crafted\u00a0messages can\u00a0be\u00a0exploited to manipulate public opinion, influence political debates, or spread false information.\u00a0These videos may prompt targets to click on phishing links, increasing the credibility of attacks. Such identity theft has already targeted public figures and company CEOs, sometimes encouraging fraudulent investments.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">CEO fraud and social engineering:\u00a0<\/span><\/b><span data-contrast=\"auto\">Traditional telephone\u00a0scams\u00a0and CEO fraud are harder to detect when attackers use deepfakes to imitate an executive\u2019s voice or fully impersonate someone (face and voice) to obtain sensitive information. Such live identity theft\u00a0scams,\u00a0especially via videoconferencing,\u00a0have already resulted in significant financial losses, as seen in Hong Kong in early\u00a02024<\/span><span data-contrast=\"auto\">1<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Identity\u00a0theft\u00a0to circumvent KYC solutions<\/span><\/b><b><span data-contrast=\"auto\">2<\/span><\/b><b><span data-contrast=\"auto\">\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">Increasingly, applications,\u00a0especially in banking,\u00a0use real-time facial verification for identity checks. By digitally altering the facial image\u00a0submitted, malicious actors can impersonate others during these verification\u00a0processes.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The rapid growth of generative artificial intelligence has led to a steady increase in both the number and sophistication of\u00a0deepfake\u00a0generation models.\u00a0It\u00a0is\u00a0increasingly\u00a0common\u00a0for\u00a0companies to\u00a0suffer\u00a0such attacks\u00a0(as\u00a0evidenced\u00a0by our latest CERT-W annual report<\/span><span data-contrast=\"auto\">\u00a0)\u00a0and increasingly difficult to detect and counter them.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-28202\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Diapositive1-e1764164832688.jpg\" alt=\"Augmentation des technologies deepfakes et des pertes financi\u00e8res en r\u00e9sultant\" width=\"1280\" height=\"720\" \/><i style=\"font-size: revert; color: initial;\"><span data-contrast=\"none\">Figure<\/span><\/i><i style=\"font-size: revert; color: initial;\"><span data-contrast=\"none\">1<\/span><\/i><i style=\"font-size: revert; color: initial;\"><span data-contrast=\"none\"> &#8211; Increase in deepfake technologies and resulting financial losses<\/span><\/i><\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Humans\u00a0remain\u00a0the primary target and therefore the first line of defense in the information system against this\u00a0type\u00a0of attack. However,\u00a0we have seen a\u00a0significant evolution\u00a0in\u00a0the maturity of\u00a0these technologies over\u00a0the past year, and it is becoming increasingly\u00a0difficult\u00a0to distinguish between\u00a0what is real\u00a0and\u00a0what is fake with the naked eye.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">After supporting many companies with employee training and awareness, we saw the need to analyze tools that could strengthen their defenses.\u00a0Having reliable\u00a0deepfake\u00a0detection solutions is no longer just a technical issue: it is a necessity to protect IT systems against intrusions,\u00a0maintain\u00a0trust in digital exchanges, and preserve the reputation of individuals and companies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-28204\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Diapositive2-e1764165727521.jpg\" alt=\"\" width=\"1280\" height=\"720\" \/><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Our\u00a0<\/span><b><i><span data-contrast=\"auto\">Radar of\u00a0deepfake\u00a0detection solutions\u00a0<\/span><\/i><\/b><span data-contrast=\"auto\">presents about 30 mature providers we have tested rigorously, allowing us to\u00a0identify\u00a0initial trends in this emerging market.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"auto\">For our technical tests, some stakeholders provided versions of their solutions deployed in environments\u00a0similar to\u00a0those used by their customers. We then built a database of multiple deepfake content of\u00a0various types: media type (audio only, image, video, live interaction); format (sample size, duration, extension) and deepfake tools used to generate these samples:<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28253 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Presentation1-e1764167420572.jpg\" alt=\"\" width=\"958\" height=\"140\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Presentation1-e1764167420572.jpg 958w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Presentation1-e1764167420572-437x64.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Presentation1-e1764167420572-71x10.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/Presentation1-e1764167420572-768x112.jpg 768w\" sizes=\"auto, (max-width: 958px) 100vw, 958px\" \/><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To best extract market trends from these tests, we considered three distinct evaluation criteria:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span data-contrast=\"auto\">Performance (deepfake detection capability, accuracy of false positive results, response time, etc.)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Deployment (ease of integration into a client environment, deployment\u00a0support\u00a0and documentation)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">User experience (understanding of\u00a0results, ease of use of the tool, etc.)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<h1 style=\"text-align: justify;\" aria-level=\"1\">\u00a0<\/h1>\n<h1 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">An emerging market that has already proven itself in real-world conditions<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h1>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Two\u00a0different technologies to achieve the same goal\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">We first categorized\u00a0the different solutions offered according to the type of content detected:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span data-contrast=\"auto\">56%\u00a0of solutions\u00a0detect based\u00a0on\u00a0<\/span><b><span data-contrast=\"auto\">visual\u00a0media\u00a0data\u00a0<\/span><\/b><span data-contrast=\"auto\">(image, video)<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">50% of solutions opt for detection based on\u00a0<\/span><b><span data-contrast=\"auto\">audio data\u00a0<\/span><\/b><span data-contrast=\"auto\">(simple audio file or audio from a video)\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This balanced distribution of content types enabled us to compare the performance of each technology.\u00a0While\u00a0most\u00a0of the solutions developed\u00a0rely on artificial intelligence models trained to classify\u00a0AI-generated\u00a0content, the processing of a\u00a0visual\u00a0file\u00a0(such as a photo) or an audio file (such as an MP3)\u00a0differs\u00a0greatly in\u00a0the types of AI models used.\u00a0We could therefore expect differences in performance\u00a0between these two technologies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">However,\u00a0our technical tests show\u00a0that the accuracy of the solutions\u00a0is\u00a0relatively similar\u00a0for both image and audio processing.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<table style=\"width: 100%;\" data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"1\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td style=\"width: 46.3095%;\" data-celllook=\"4369\">\n<p><b><span data-contrast=\"auto\">92.5%<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Deepfake images or videos were detected as malicious by\u00a0<\/span><b><span data-contrast=\"auto\">image processing<\/span><\/b><span data-contrast=\"auto\">\u00a0solutions<\/span><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 5.83333%;\" data-celllook=\"4369\">\n<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">VS<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 46.6667%;\" data-celllook=\"4369\">\n<p><b><span data-contrast=\"auto\">96<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Deepfake audio sources were detected as malicious by\u00a0solutions\u00a0<\/span><b><span data-contrast=\"auto\">processing audio.<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">We also\u00a0identified\u00a0leading providers developing live audio and video deepfake detection,\u00a0capable of processing sources in under 10 seconds,\u00a0which addresses today\u2019s most dangerous attack vectors.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"1\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"4369\">\n<p><b><span data-contrast=\"auto\">19%\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<\/td>\n<td data-celllook=\"4369\">\n<p><b><span data-contrast=\"auto\">Solutions offer\u00a0<\/span><\/b><b><span data-contrast=\"auto\">live<\/span><\/b><b><span data-contrast=\"auto\">\u00a0detection of deepfakes, integrated into videoconferencing software or\u00a0devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:64,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"auto\">These solutions, which\u00a0mainly process\u00a0audio,\u00a0achieved an accuracy score of\u00a073%\u00a0of deepfakes detected as such. This shows\u00a0the potential for improvement for these young players in detecting\u00a0state-of-the-art\u00a0live\u00a0attacks.<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\">\u00a0<\/h2>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">From PoC to deployment at scale, a step already taken by some<\/span><\/h2>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The maturity of solutions also varies\u00a0on our radar. While some providers are\u00a0start-ups\u00a0emerging\u00a0to\u00a0meet this specific need, others\u00a0are not new\u00a0to the market. In fact, some of the\u00a0companies we met\u00a0had their core business in other areas\u00a0before entering this market (we can mention biometric identification,\u00a0artificial intelligence tools, and even\u00a0AI-powered multimedia content\u00a0generators!).\u00a0These players therefore have the knowledge and experience to\u00a0offer their customers a packaged service that can be deployed on a large scale,\u00a0as well as\u00a0post-deployment\u00a0support.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Younger startups are also maturing and moving beyond the PoC phase by offering companies a range of deployment options:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span data-contrast=\"auto\">API\u00a0requests, which can be integrated into other\u00a0software,\u00a0remain\u00a0the preferred way to call on the services of tools that enable deepfake detection.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Comprehensive SaaS\u00a0GUI<\/span><span data-contrast=\"auto\">6<\/span><span data-contrast=\"auto\">\u00a0platforms. Some of these\u00a0platforms\u00a0have\u00a0already\u00a0been\u00a0deployed on-premises in certain contexts, particularly in the\u00a0banking and insurance\u00a0sectors.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">On-device\u00a0Docker\u00a0containers, which\u00a0allow\u00a0plug-ins\u00a0to be added to audio\u00a0and video\u00a0devices or videoconferencing\u00a0software\u00a0for\u00a0integration tailored\u00a0to specific detection needs.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<h1 style=\"text-align: justify;\" aria-level=\"1\">\u00a0<\/h1>\n<h1 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">Use cases for\u00a0deepfake detection\u00a0solutions: trends and developments<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h1>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Use cases specific\u00a0to\u00a0critical\u00a0business needs that require protection<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To meet diverse market needs, solution providers have specialized in specific use cases.\u00a0In addition to\u00a0answering the question &#8220;deepfake or original content?&#8221;,\u00a0some providers\u00a0are developing and offering\u00a0additional\u00a0features\u00a0to target specific uses for their solutions.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">We have grouped the various offerings from providers into broad categories to help us understand market trends:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><b><span data-contrast=\"auto\">KYC and identity verification<\/span><\/b><span data-contrast=\"auto\">: in banking onboarding or online account opening processes, deepfake detection makes it possible to distinguish between\u00a0a real video\u00a0of a user and an AI-generated imitation. This protects financial institutions against identity theft and money laundering.\u00a0These solutions will be able to give &#8220;liveness&#8221;\u00a0scores\u00a0or match rates to the person being\u00a0identified\u00a0in order to\u00a0refine\u00a0detection.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Social media\u00a0watch\u00a0and\u00a0source identification<\/span><\/b><span data-contrast=\"auto\">:\u00a0To prevent\u00a0fake media or information from damaging\u00a0their clients&#8217;\u00a0reputations,\u00a0some solution providers have deployed\u00a0watch on\u00a0social media or\u00a0multimedia content\u00a0analysis tools\u00a0for email attachments to enable rapid response. The features\u00a0of these solutions make it possible to understand how and by which deepfake model this malicious content was produced,\u00a0helping to trace the source of the attack.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Falsified documents and insurance fraud<\/span><\/b><span data-contrast=\"auto\">:\u00a0A number\u00a0of\u00a0players\u00a0have turned their attention to combating insurance fraud\u00a0and false\u00a0identity\u00a0documents. Their solutions\u00a0seek\u00a0to\u00a0detect alterations in supporting documents or photos of damage\u00a0by highlighting how and which parts of the original image have been\u00a0modified.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Detection of telephone\u00a0scams\u00a0and\u00a0identity theft in video calls<\/span><\/b><span data-contrast=\"auto\">:\u00a0these types\u00a0of attacks\u00a0are on the rise and rely\u00a0on the creation of realistic imitations of a manager&#8217;s voice or face,\u00a0in particular to\u00a0deceive employees and obtain transfers or sensitive information.\u00a0Most\u00a0detection systems\u00a0targeting these attacks have developed capabilities for full integration into video call\u00a0software\u00a0or sound cards on the devices to be protected.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Each\u00a0solution\u00a0is designed\u00a0with specific features\u00a0aligned with\u00a0market\u00a0needs\u00a0to\u00a0maximize the relevance and operational effectiveness of detection solutions.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Open source as the initiator, proprietary solutions to take over<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">While proprietary solutions dominate, open-source approaches also play a role in this field. These initiatives play\u00a0an important role\u00a0in academic research and experimentation, but they often\u00a0remain\u00a0less effective and less robust in the face of sophisticated deepfakes.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">While some offer\u00a0very good\u00a0results on controlled test benches\u00a0(\u00a0up\u00a0to 90% detection performance<\/span><span data-contrast=\"auto\">7<\/span><span data-contrast=\"auto\">\u00a0), proprietary solutions offered by specialized publishers\u00a0generally offer\u00a0better performance in production. They also stand out in terms of support: regular updates, technical support, and maintenance services, which are essential for critical environments such as finance, insurance, and public\u00a0sector. This difference is gradually creating a gap between\u00a0open source\u00a0research and commercial offerings, where reliability and\u00a0integration into complex environments\u00a0are becoming key selling points.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">False positives: the remaining challenge<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Many vendors emphasize their\u00a0deepfake\u00a0detection capabilities. We felt it was important to extend our testing to understand how these solutions perform on false positives: is\u00a0<\/span><b><span data-contrast=\"auto\">real<\/span><\/b><span data-contrast=\"auto\">\u00a0content\u00a0detected as\u00a0natural\u00a0content\u00a0or as deepfake content?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">\u00a0The evaluations we conducted on several detection solutions highlight contrasting results depending on the type of content.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span data-contrast=\"auto\">For images and video:\u00a0nearly 40%\u00a0of the solutions tested still have difficulty correctly managing false positives. With these solutions,\u00a0between 50% and 70% of the real\u00a0images analyzed are considered\u00a0deepfakes. This\u00a0limits their reliability,\u00a0especially when they are subjected to\u00a0large amounts\u00a0of content.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">On the audio side, the solutions stand out with\u00a0more\u00a0robust performance\u00a0on false positives:\u00a0only\u00a07%.\u00a0Only a few particularly\u00a0altered (but non-AI) or poor-quality\u00a0samples\u00a0were detected as deepfakes by some solutions.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To address these issues, some vendors are combining image\/video and audio processing. Currently, these modalities are usually scored separately, but efforts are underway to integrate their results for greater accuracy.\u00a0Some publishers are working on ways\u00a0<\/span><b><span data-contrast=\"auto\">to use these two scores more complementarily to limit false positives<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:142}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">What does the future hold\u00a0for\u00a0deepfake\u00a0detection?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h1>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Current solutions are effective under most present conditions. However, as technologies and attack methods rapidly evolve, vendors will face two major challenges.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The first challenge is detecting content from unknown generative tools. While most solutions handle common technologies well, their performance drops with newer, less-documented methods.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The second challenge is real-time detection. Currently, only 19% of solutions offer this feature, and their performance is still insufficient to meet future needs.\u00a0In contrast,\u00a0notable progress is\u00a0already\u00a0being made in audio detection, which is\u00a0emerging\u00a0as a promising advance for enhancing security in critical scenarios\u00a0involving\u00a0phishing\u00a0or CEO fraud\u00a0via\u00a0deepfake\u00a0audio\u00a0calls.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The market maturity of these\u00a0cutting-edge\u00a0technologies is accelerating, and there is every reason to believe that detection solutions will quickly catch up with the latest advances in\u00a0deepfake\u00a0creation. The next few years will be decisive in seeing the emergence of more reliable, faster tools that are better integrated with business needs.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now&#8230;<\/p>\n","protected":false},"author":1522,"featured_media":28270,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[4083,4849,3208,4848,2796,3156],"coauthors":[4527],"class_list":["post-28246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-ai","tag-ai-generated","tag-cloud-en","tag-deepfake","tag-risk","tag-risk-management-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight<\/title>\n<meta name=\"description\" content=\"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-26T15:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T08:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Louis-marie Marcille\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis-marie Marcille\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\"},\"author\":{\"name\":\"Louis-marie Marcille\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d16d10e10ef2c94fdf449e0853babb04\"},\"headline\":\"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0\",\"datePublished\":\"2025-11-26T15:30:00+00:00\",\"dateModified\":\"2025-12-03T08:53:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\"},\"wordCount\":1776,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg\",\"keywords\":[\"AI\",\"AI-Generated\",\"cloud\",\"Deepfake\",\"risk\",\"risk management\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\",\"name\":\"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg\",\"datePublished\":\"2025-11-26T15:30:00+00:00\",\"dateModified\":\"2025-12-03T08:53:00+00:00\",\"description\":\"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d16d10e10ef2c94fdf449e0853babb04\",\"name\":\"Louis-marie Marcille\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/louis-marie-marcille\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight","description":"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/","og_locale":"en_US","og_type":"article","og_title":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight","og_description":"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/","og_site_name":"RiskInsight","article_published_time":"2025-11-26T15:30:00+00:00","article_modified_time":"2025-12-03T08:53:00+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg","type":"image\/jpeg"}],"author":"Louis-marie Marcille","twitter_misc":{"Written by":"Louis-marie Marcille","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/"},"author":{"name":"Louis-marie Marcille","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d16d10e10ef2c94fdf449e0853babb04"},"headline":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0","datePublished":"2025-11-26T15:30:00+00:00","dateModified":"2025-12-03T08:53:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/"},"wordCount":1776,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg","keywords":["AI","AI-Generated","cloud","Deepfake","risk","risk management"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/","name":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg","datePublished":"2025-11-26T15:30:00+00:00","dateModified":"2025-12-03T08:53:00+00:00","description":"\u00a0A deepfake is a form of synthetic content that\u00a0emerged\u00a0in 2017,\u00a0leveraging\u00a0artificial intelligence to create or manipulate text, images, videos, and audio with high realism.\u00a0Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes,\u00a0representing\u00a0a growing threat and a significant challenge to digital trust.\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/11\/concept-de-collage-de-reconnaissance-faciale-min-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/11\/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/d16d10e10ef2c94fdf449e0853babb04","name":"Louis-marie Marcille","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/louis-marie-marcille\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=28246"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28246\/revisions"}],"predecessor-version":[{"id":28795,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/28246\/revisions\/28795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/28270"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=28246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=28246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=28246"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=28246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}