DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Tool

Sensity Detection API (1.0)

Reading Time: 2 mins read
in Deepfake, Software, Tool

Introduction

The Sensity Detection API runs a selection of automated authenticity tests on images and videos. The tests are designed to detect the latest AI-based media manipulation and synthesis techniques. Currently, the Sensity Detection API supports the following forms of media analysis:

Face Manipulation

Available for: images / videos

This test detects a class of deepfake manipulation that takes a real video of a person and alters or swaps their face with another person. The API can be called with input from files or URLs of videos and images online.

GAN Generated Faces

Available for: images

This test detects entirely synthetically generated images of faces, such as the photorealistic StyleGAN, as they may appear on social media profiles, accounts of financial services online, or dating apps.

Credentials

For access to a trial account, please contact us at support@sensity.ai

Getting Started

To get started with the API let’s consider an end-to-end example: analyzing a person’s headshot (let’s call it person.png) to assess if it was generated by a GAN model.

API Token

In order to start making automated API calls, we need to set up an API token for our already registered account.

This step requires login authentication first. You can authenticate your account with username and password in the Authorize button in the Swagger UI.

We can do so by making a POST request to /auth/tokens. You should now receive a JSON object containing a token field. Save this string securely, as this is your API credentials from now on.

To set the token in the Swagger UI, paste it in the Bearer field, after clicking the Authorize button.

When using the API programmatically, we recommend to export the token as an environment variable: export SENSITY_TOKEN=your_api_key

 

LEARN MORE

Tags: DeepfakeDeepfake-tools
ADVERTISEMENT

Related Posts

OWASP Dependency-Check Tool

OWASP Dependency-Check Tool

May 2, 2023
Cisco Meraki – SaaS Tool

Cisco Meraki – SaaS Tool

April 23, 2023
BeachheadSecure – SaaS Tool

BeachheadSecure – SaaS Tool

April 23, 2023
Jamf Now – SaaS Tool

Jamf Now – SaaS Tool

April 23, 2023

More Articles

Alerts

Vulnerabilities in Kids Place App

May 17, 2023
Alerts

Ubuntu Security Advisory

October 20, 2021
Cyber101

DevSecOps Engineer

January 25, 2022
Alerts

Chrome Security Update: Version 114 Released

June 1, 2023
Certification

Certified Hacking Forensic Investigator (CHFI)

April 19, 2022
Alerts

Drupal Releases Security Updates

June 13, 2022
Book

Social Engineering: The Science of Human Hacking

October 5, 2020

Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks

March 25, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.