{"id":286924,"date":"2023-03-17T11:00:09","date_gmt":"2023-03-17T05:30:09","guid":{"rendered":"https:\/\/www.scconline.com\/blog\/?p=286924"},"modified":"2023-03-17T11:14:18","modified_gmt":"2023-03-17T05:44:18","slug":"emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india","status":"publish","type":"post","link":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/","title":{"rendered":"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India"},"content":{"rendered":"<div style=\"text-align: justify; line-height: 150%;\">\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Introduction to deepfake<\/h4>\n<p>Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial networks (GANs), to generate synthetic media such as images, videos, and audios. The goal of deepfake technology is to create highly realistic synthetic media that resembles real people, but with some aspect of the content manipulated. Deepfake technology<a id=\"fnref1\" href=\"#fn1\" title=\"1. Jia Wen Seow, et al., &#8220;A Comprehensive Overview of Deepfake: Generation, Detection, Datasets and Opportunities&#8221;, 513 Science Direct 351-371 (2022) &lt;https:\/\/doi.org\/10.1016\/j.neucom.2022.09.135&gt; accessed on 6-2-2023.\"><sup>1<\/sup><\/a> is based on two techniques, namely, deep learning and generative adversarial networks. Deep learning is a subfield of machine learning that uses algorithms inspired by the structure and function of the brain, known as artificial neural networks, to process and analyse large amounts of data. Deep learning has been applied to a wide range of applications such as computer vision, natural language processing, speech recognition, and robotics. Generative adversarial networks (GANs) are a type of deep learning architecture that use two neural networks, a generator, and a discriminator, to train on a dataset and generate new, synthetic data that resembles the original data. The generator creates fake samples while the discriminator assesses the authenticity of the generated samples and the real samples from the training dataset. The two networks are trained in an adversarial manner, where the generator tries to generate samples that can fool the discriminator, while the discriminator tries to correctly distinguish the generated samples from the real ones. This process continues until the generator is able to produce highly realistic synthetic data.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/Feb_22_Assistant-1.png\" alt=\"\" width=\"800\" height=\"353\"\/><\/p>\n<p style=\"margin-bottom: 3%; text-align: center;\"><b>Illustration: Face-to-face method<a id=\"fnref2\" href=\"#fn2\" title=\"2. J. Thies et al., Face2Face: Real-Time Face Capture and Reenactment of RGB Videos (CVPR 2016, Las Vegas, June 2016) &lt;https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2016\/papers\/Thies_Face2Face_Real-Time_Face_CVPR_2016_paper.pdf&gt; accessed on 6-2-2023.\"><sup>2<\/sup><\/a><\/b><\/p>\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Creation of deepfakes<\/h4>\n<p style=\"\">Deepfakes are created using a machine learning technique known as generative adversarial networks (GANs). A GAN consists of two neural networks, a generator, and a discriminator, that are trained on a large dataset of real images, videos, or audio. The generator network creates synthetic data, such as a synthetic image, that resembles the real data in the training set. The discriminator network then assesses the authenticity of the synthetic data and provides feedback to the generator on how to improve its output. This process is repeated multiple times, with the generator and discriminator learning from each other, until the generator produces synthetic data that is highly realistic and difficult to distinguish from the real data. This training data is used to create deepfakes which may be applied in various ways for video and image deepfakes:<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt;\">(<i>a<\/i>) <i>face swap<\/i>: transfer the face of one person for that of the person in the video;<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt;\">(<i>b<\/i>) <i>attribute editing:<\/i> change characteristics of the person in the video e.g. style or colour of the hair;<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt;\">(<i>c<\/i>) <i>face re-enactment<\/i>: transferring the facial expressions from the face of one person on to the person in the target video; and<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt; margin-bottom: 3%;\">(<i>d<\/i>) <i>fully synthetic material<\/i>: Real material is used to train what people look like,but the resulting picture is entirely made up.<\/p>\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Detection of deepfakes<\/h4>\n<p style=\"margin-bottom: 3%;\">It is important to note that deepfake technology is constantly evolving and improving, so deepfake detection techniques need to be regularly updated to keep up with the latest developments. Currently, the best way to determine if a piece of media is a deepfake is to use a combination of multiple detection techniques and to be cautious of any content that seems too good to be true. Here are some of the most common techniques used to detect deepfakes:<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Visual artifacts.<\/i><\/b> &#8212; Some deepfakes have noticeable visual artifacts<a id=\"fnref3\" href=\"#fn3\" title=\"3. Conference on Computer Vision and Pattern Recognition Workshops, 2020, accessed on 10-3-2022 &lt;https:\/\/www.ohadf.com\/papers\/AgarwalFaridFriedAgrawala_CVPRW2020.pdf&gt; accessed on 8-2-2023.\"><sup>3<\/sup><\/a>, such as unnatural facial movements or blinking, that can be a giveaway that the content is fake. Visual artifacts in deepfakes can arise due to several factors, such as limitations in the training data, limitations in the deep learning algorithms, or the need to compromise between realism and computational efficiency. Some common examples of visual artifacts in deepfakes include unnatural facial movements or expressions, unnatural or inconsistent eye blinking, and mismatched or missing details in the background.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Audio-visual mismatches.<\/i><\/b> &#8212; In some deepfakes, the audio and visual content may not match perfectly, which can indicate that the content has been manipulated. For example, the lip movements of a person in a deepfake video may not match the audio perfectly, or the audio may contain background noise or echoes that are not present in the video<a id=\"fnref4\" href=\"#fn4\" title=\"4. Yipin Zhou and Ser-Nam Lim, Joint Audio-Visual Deepfake Detection, Computer Vision Foundation 2022 &lt;https:\/\/openaccess.thecvf.com\/content\/ICCV2021\/papers\/Zhou_Joint_Audio-Visual_Deepfake_Detection_ICCV_2021_paper.pdf&gt; accessed on 8-2-2022.\"><sup>4<\/sup><\/a>. These types of audio-visual mismatches can be a sign that the content has been manipulated.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Deep learning-based detection.<\/i><\/b> &#8212; Deep learning algorithms, such as deep neural networks, can be used to detect deepfakes by training the algorithms on a large dataset of real and fake images, videos, or audios. The algorithm learns the patterns and artifacts that are typical of fake content, such as unnatural facial movements, inconsistent eye blinking, and audio-visual mismatches.Once the deep learning algorithm has been trained, it can be used to detect deepfakes by analysing new, unseen media. If the algorithm detects that a piece of media is fake, it can flag it for manual inspection or flag it for further analysis<a id=\"fnref5\" href=\"#fn5\" title=\"5. Agarwal, S. et al., Protecting World Leaders Against Deep Fakes, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 38-45, 2019, accessed on 10-3-2022&lt;http:\/\/www.hao-li.com\/publications\/papers\/cvpr2019workshopsPWLADF.pdf&gt; accessed on 9-2-2023.\"><sup>5<\/sup><\/a>.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Forensics-based detection.<\/i><\/b> &#8212; Forensics-based detection methods involve analysing various aspects of an image or video, such as the geometric relationships between facial features, to determine whether the content has been manipulated or not.<a id=\"fnref6\" href=\"#fn6\" title=\"6. Samuel H. Silva, et al., &#8220;Deepfake Forensics Analysis: An Explainable Hierarchical Ensemble of Weakly Supervised Models&#8221;, 4 Science Direct 2022 &lt;https:\/\/doi.org\/10.1016\/j.fsisyn.2022.100217&gt; accessed on 9-2-2023.\"><sup>6<\/sup><\/a> These methods can be effective in detecting deepfakes, but they are not foolproof. Deepfake creators are constantly improving their techniques to make the forgeries more convincing, so forensic methods need to be constantly updated to keep up.In addition to analysing facial features, other forensic methods include analysing patterns in audio and video data, and examining inconsistencies in lighting, shading, and other visual cues. These methods can help identify deepfakes, but they are not a guarantee, and there is always a possibility that a sophisticated deepfake may go undetected.<\/p>\n<p style=\"\"><b><i>Multi-model ensemble.<\/i><\/b> &#8212; The use of a multi-model ensemble is a popular approach in deepfake detection as it can provide more accurate results compared to using a single model<a id=\"fnref7\" href=\"#fn7\" title=\"7. Abdulhameed Al Obaid, et al., &#8220;Multimodal Fake-News Recognition Using Ensemble of Deep Learners&#8221;, 24 Entropy 1242 (2022) &lt;https:\/\/doi.org\/10.3390\/e24091242&gt; accessed on 9-2-2023.\"><sup>7<\/sup><\/a>. By combining the outputs of multiple deepfake detection methods, a multi-model ensemble can provide a more comprehensive evaluation of the authenticity of an image or video.For example, one model might focus on analysing the geometric properties of facial features, while another might focus on detecting inconsistencies in lighting and shading. By combining the results from these models, a multi-model ensemble can provide a more robust evaluation of the authenticity of the content.<\/p>\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Offences Caused Using Deepfakes<\/h4>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/Feb_22_Assistant-2.jpg\" alt=\"\" width=\"552\" height=\"312\"\/><\/p>\n<p style=\"text-align: center; margin-bottom: 3%;\"><b>Illustrations of various crimes committed using deepfakes<\/b><\/p>\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Offences committed by using deepfakes<\/h4>\n<p style=\"margin-bottom: 3%;\">There is a plethora of possibility of commission of crimes using the technology of deepfake. The technology itself does not pose a threat, however it can be used as a tool to commit crimes against individuals and society. The following crimes can be committed using deepfake:<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Identity theft and virtual forgery.<\/i><\/b> &#8212; Identity theft and virtual forgery using deepfakes can be serious offences and can have significant consequences for individuals and society as a whole. The use of deepfakes to steal someone&#8217;s identity, create false representations of individuals, or manipulate public opinion can cause harm to an individual&#8217;s reputation and credibility, and can spread misinformation. Under Section 66<a id=\"fnref8\" href=\"#fn8\" title=\"8. Information Technology Act, 2000, S. 66.\"><sup>8<\/sup><\/a> computer-related offences) and Section 66-C<a id=\"fnref9\" href=\"#fn9\" title=\"9. Information Technology Act, 2000, S. 66-C.\"><sup>9<\/sup><\/a> (punishment for identity theft) of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a> these crimes can be prosecuted. Also, Sections 420<a id=\"fnref10\" href=\"#fn10\" title=\"10. Penal Code, 1860, S. 420.\"><sup>10<\/sup><\/a> and <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001561810\">468<\/a><a id=\"fnref11\" href=\"#fn11\" title=\"11. Penal Code, 1860, S. 468.\"><sup>11<\/sup><\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002726960\">Penal Code, 1860<\/a> could be invoked in this regard.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Misinformation against Governments.<\/i><\/b> &#8212; The use of deepfakes to spread misinformation, subvert the Government, or incite hatred and disaffection against the Government is a serious issue and can have far-reaching consequences for society. The spread of false or misleading information can create confusion and undermine public trust and can be used to manipulate public opinion or influence political outcomes. Under Section 66-F<a id=\"fnref12\" href=\"#fn12\" title=\"12. Information Technology Act, 2000, S. 66-F.\"><sup>12<\/sup><\/a> (cyber terrorism) and the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-9001297991\">Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Amendment Rules, 2022<\/a><a id=\"fnref13\" href=\"#fn13\" title=\"13. Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Amendment Rules, 2022.\"><sup>13<\/sup><\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a><a id=\"fnref14\" href=\"#fn14\" title=\"14. Information Technology Act, 2000.\"><sup>14<\/sup><\/a> these crimes can be prosecuted. Also, Section 121<a id=\"fnref15\" href=\"#fn15\" title=\"15. Penal Code, 1860, S. 121.\"><sup>15<\/sup><\/a> waging war against the Government of India) and Section <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001561381\">124-A<\/a><a id=\"fnref16\" href=\"#fn16\" title=\"16. Penal Code, 1860, S. 124-A.\"><sup>16<\/sup><\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002726960\">Penal Code, 1860<\/a> could be invoked in this regard.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Hate speech and online defamation.<\/i><\/b> &#8212;Hate speech and online defamation using deepfakes can be serious issues that can harm individuals and society as a whole. The use of deepfakes to spread hate speech or defamatory content can cause significant harm to the reputation and well-being of individuals and can contribute to a toxic online environment. Under the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-9001297991\">Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Amendment Rules, 2022<\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a> these crimes can be prosecuted. Also, Sections 153-A<a id=\"fnref17\" href=\"#fn17\" title=\"17. Penal Code, 1860, S. 153-A.\"><sup>17<\/sup><\/a> and 153-B<a id=\"fnref18\" href=\"#fn18\" title=\"18. Penal Code, 1860, S. 153-B.\"><sup>18<\/sup><\/a> (Speech affecting public tranquility) Section <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001561851\">499<\/a><a id=\"fnref19\" href=\"#fn19\" title=\"19. Penal Code, 1860, S. 499.\"><sup>19<\/sup><\/a> (defamation) of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002726960\">Penal Code, 1860<\/a> could be invoked in this regard.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Practices affection elections.<\/i><\/b> &#8212; The use of deepfakes in elections can have significant consequences and can undermine the integrity of the democratic process. Deepfakes can be used to spread false or misleading information about political candidates and can be used to manipulate public opinion and influence the outcome of an election.The impact of deepfakes on elections is a growing concern, and many Governments and organisations are taking steps to address this issue. Under Section 66-D<a id=\"fnref20\" href=\"#fn20\" title=\"20. Information Technology Act, 2000, S. 66-D.\"><sup>20<\/sup><\/a> (punishment for cheating by personation by using computer resource) and Section 66-F<a id=\"fnref21\" href=\"#fn21\" title=\"21. Information Technology Act, 2000, S. 66-F.\"><sup>21<\/sup><\/a> (cyber terrorism) of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a> these crimes can be prosecuted. Also, Sections 123(3-A)<a id=\"fnref22\" href=\"#fn22\" title=\"22. Representation of the People Act, 1951, S. 123(3-A).\"><sup>22<\/sup><\/a>, 123 and 125<a id=\"fnref23\" href=\"#fn23\" title=\"23. Representation of the People Act, 1951, S. 125.\"><sup>23<\/sup><\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002801315\">Representation of the People Act, 1951<\/a> and Social Media Platforms and Internet and Mobile Association of India (IAMAI), today presented a &#8220;Voluntary Code of Ethics for the General Election, 2019 could be invoked to tackle the menace affecting elections in India.<\/p>\n<p style=\"margin-bottom: 3%;\"><b><i>Violation of privacy\/obscenity and pornography.<\/i><\/b> &#8212; This technology can be used to create fake images or videos that depict people doing or saying things that never actually happened, potentially damaging the reputation of individuals, or spreading false information. It is also possible for deepfakes to be used for malicious purposes such as non-consensual pornography, or for political propaganda or misinformation campaigns. This can have serious implications for individuals whose images or likenesses are used without their consent, as well as for society at large when deepfakes are used to spread false information or manipulate public opinion. Under Section 66-E<a id=\"fnref24\" href=\"#fn24\" title=\"24. Information Technology Act, 2000, S. 66-E.\"><sup>24<\/sup><\/a> (punishment for violation of privacy), Section 67<a id=\"fnref25\" href=\"#fn25\" title=\"25. Information Technology Act, 2000, S. 67.\"><sup>25<\/sup><\/a> (punishment for publishing or transmitting obscene material in electronic form), Section 67-A<a id=\"fnref26\" href=\"#fn26\" title=\"26. Information Technology Act, 2000, S. 67-A.\"><sup>26<\/sup><\/a> (punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form), Section 67-B<a id=\"fnref27\" href=\"#fn27\" title=\"27. Information Technology Act, 2000, S. 67-B.\"><sup>27<\/sup><\/a> (punishment for publishing or transmitting of material depicting children sexually explicit act\/pornography in electronic form) of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a> these crimes can be prosecuted. Also, Sections 292<a id=\"fnref28\" href=\"#fn28\" title=\"28. Penal Code, 1860, S. 292.\"><sup>28<\/sup><\/a> and 294<a id=\"fnref29\" href=\"#fn29\" title=\"29. Penal Code, 1860, S. 294.\"><sup>29<\/sup><\/a> (Punishment for sale etc. of obscene material) of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002726960\">Penal Code, 1860<\/a> and Sections <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001550490\">13<\/a><a id=\"fnref30\" href=\"#fn30\" title=\"30. Protection of Children from Sexual Offences Act, 2012, S. 13.\"><sup>30<\/sup><\/a>, <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001550491\">14<\/a><a id=\"fnref31\" href=\"#fn31\" title=\"31. Protection of Children from Sexual Offences Act, 2012, S. 14.\"><sup>31<\/sup><\/a> and <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001550492\">15<\/a><a id=\"fnref32\" href=\"#fn32\" title=\"32. Protection of Children from Sexual Offences Act, 2012, S. 15.\"><sup>32<\/sup><\/a> of the <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002825996\">Protection of Children from Sexual Offences Act, 2012<\/a> (POCSO) could be invoked in this regard to protect the rights of women and children.<\/p>\n<h4 style=\"background-image: linear-gradient(to left, #FFFFFF, rgb(121, 164, 210));\">Conclusion and suggestions<\/h4>\n<p style=\"margin-bottom: 3%;\">The current legislation in India regarding cyber offences caused using deepfakes is not adequate to fully address the issue. The lack of specific provisions in the IT Act, 2000 regarding artificial intelligence, machine learning, and deepfakes makes it difficult to effectively regulate the use of these technologies. In order to better regulate offences caused using deepfakes, it may be necessary to update the IT Act, 2000 to include provisions that specifically address the use of deepfakes and the penalties for their misuse. This could include increased penalties for those who create or distribute deepfakes for malicious purposes, as well as stronger legal protections for individuals whose images or likenesses are used without their consent.<\/p>\n<p style=\"\">It is also important to note that the development and use of deepfakes is a global issue, and it will likely require international cooperation and collaboration to effectively regulate their use and prevent privacy violations.In the meantime, it is important for individuals and organisations to be aware of the potential risks associated with deepfakes and to be vigilant in verifying the authenticity of information encountered online. In the meantime, the Governments can do the following:<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt;\">(<i>a<\/i>) First, is the censorship approach of blocking public access to misinformation by issuing orders to intermediaries and publishers.<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt;\">(<i>b<\/i>) Second approach is the punitive approach which imposes liability on individuals or organisations originating or disseminating misinformation.<\/p>\n<p style=\"margin-left: 36pt; text-indent: -18pt; margin-bottom: 3%;\">(<i>c<\/i>) The third approach is the intermediary regulation approach, which imposes obligations upon online intermediaries to expeditiously remove misinformation from their platforms, failing which they could incur liability as stipulated under Sections <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001540663\">69-A<\/a><a id=\"fnref33\" href=\"#fn33\" title=\"33. Information Technology Act, 2000, S. 69-A.\"><sup>33<\/sup><\/a> and <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0001540681\">79<\/a><a id=\"fnref34\" href=\"#fn34\" title=\"34. Information Technology Act, 2000, S. 79.\"><sup>34<\/sup><\/a> of <a href=\"https:\/\/www.scconline.com\/DocumentLink.aspx?q=JTXT-0002796572\">Information Technology Act, 2000<\/a>.<\/p>\n<\/div>\n<hr\/>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><strong><span style=\"color: #000080;\">&#8224; Teaching and Research Assistant, School of Law-Forensic Justice and Policy Studies, National Forensic Sciences University, Gandhinagar, India. Author can be reached at <a href=\"mailto:shubham.pandey@nfsu.ac.in\">shubham.pandey@nfsu.ac.in<\/a>.<\/span><\/strong><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><strong><span style=\"color: #000080;\">&#8224;&#8224; Assistant Professor, School of Law-Forensic Justice and Policy Studies, National Forensic Sciences University, Gandhinagar, India. Author can be reached at <a href=\"mailto:gaurav.jadhav@nfsu.ac.in\">gaurav.jadhav@nfsu.ac.in<\/a>.<\/span><\/strong><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn1\" href=\"#fnref1\">1.<\/a> Jia Wen Seow, et al., &#8220;A Comprehensive Overview of Deepfake: Generation, Detection, Datasets and Opportunities&#8221;, 513 Science Direct 351-371 (2022) &lt;<a href=\"https:\/\/doi.org\/10.1016\/j.neucom.2022.09.135\">https:\/\/doi.org\/10.1016\/j.neucom.2022.09.135<\/a>&gt; accessed on 6-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn2\" href=\"#fnref2\">2.<\/a> J. Thies et al., Face2Face: Real-Time Face Capture and Reenactment of RGB Videos (CVPR 2016, Las Vegas, June 2016) &lt;<a href=\"https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2016\/papers\/Thies_Face2Face_Real-Time_Face_CVPR_2016_paper.pdf\">https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2016\/papers\/Thies_Face2Face_Real-Time_Face_CVPR_2016_paper.pdf<\/a>&gt; accessed on 6-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn3\" href=\"#fnref3\">3.<\/a> Conference on Computer Vision and Pattern Recognition Workshops, 2020, accessed on 10-3-2022 &lt;<a href=\"https:\/\/www.ohadf.com\/papers\/AgarwalFaridFriedAgrawala_CVPRW2020.pdf\">https:\/\/www.ohadf.com\/papers\/AgarwalFaridFriedAgrawala_CVPRW2020.pdf<\/a>&gt; accessed on 8-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn4\" href=\"#fnref4\">4.<\/a> Yipin Zhou and Ser-Nam Lim, Joint Audio-Visual Deepfake Detection, Computer Vision Foundation 2022 &lt;<a href=\"https:\/\/openaccess.thecvf.com\/content\/ICCV2021\/papers\/Zhou_Joint_Audio-Visual_Deepfake_Detection_ICCV_2021_paper.pdf\">https:\/\/openaccess.thecvf.com\/content\/ICCV2021\/papers\/Zhou_Joint_Audio-Visual_Deepfake_Detection_ICCV_2021_paper.pdf<\/a>&gt; accessed on 8-2-2022.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn5\" href=\"#fnref5\">5.<\/a> Agarwal, S. et al., Protecting World Leaders Against Deep Fakes, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 38-45, 2019, accessed on 10-3-2022&lt;<a href=\"http:\/\/www.hao-li.com\/publications\/papers\/cvpr2019workshopsPWLADF.pdf\">http:\/\/www.hao-li.com\/publications\/papers\/cvpr2019workshopsPWLADF.pdf<\/a>&gt; accessed on 9-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn6\" href=\"#fnref6\">6.<\/a> Samuel H. Silva, et al., &#8220;Deepfake Forensics Analysis: An Explainable Hierarchical Ensemble of Weakly Supervised Models&#8221;, 4 Science Direct 2022 &lt;<a href=\"https:\/\/doi.org\/10.1016\/j.fsisyn.2022.100217\">https:\/\/doi.org\/10.1016\/j.fsisyn.2022.100217<\/a>&gt; accessed on 9-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn7\" href=\"#fnref7\">7.<\/a> Abdulhameed Al Obaid, et al., &#8220;Multimodal Fake-News Recognition Using Ensemble of Deep Learners&#8221;, 24 Entropy 1242 (2022) &lt;<a href=\"https:\/\/doi.org\/10.3390\/e24091242\">https:\/\/doi.org\/10.3390\/e24091242<\/a>&gt; accessed on 9-2-2023.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn8\" href=\"#fnref8\">8.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/9o3L7TRq\">Information Technology Act, 2000, S. 66.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn9\" href=\"#fnref9\">9.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/thUq2y3u\">Information Technology Act, 2000, S. 66-C.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn10\" href=\"#fnref10\">10.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/n479k8lW\">Penal Code, 1860, S. 420.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn11\" href=\"#fnref11\">11.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/VR42bZeQ\">Penal Code, 1860, S. 468.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn12\" href=\"#fnref12\">12.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/M7a2Wjjv\">Information Technology Act, 2000, S. 66-F.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn13\" href=\"#fnref13\">13.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/8uwgV9zj\">Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Amendment Rules, 2022<\/a>.<\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn14\" href=\"#fnref14\">14.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/QFpg4Fi0\">Information Technology Act, 2000.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn15\" href=\"#fnref15\">15.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/vLQ99kkN\">Penal Code, 1860, S. 121.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn16\" href=\"#fnref16\">16.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/PL9xvg1D\">Penal Code, 1860, S. 124-A.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn17\" href=\"#fnref17\">17.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/sqsmToDs\">Penal Code, 1860, S. 153-A.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn18\" href=\"#fnref18\">18.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/oyPLl7Bc\">Penal Code, 1860, S. 153-B.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn19\" href=\"#fnref19\">19.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/boYyWc4v\">Penal Code, 1860, S. 499.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn20\" href=\"#fnref20\">20.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/6JxZuN14\">Information Technology Act, 2000, S. 66-D.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn21\" href=\"#fnref21\">21.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/M7a2Wjjv\">Information Technology Act, 2000, S. 66-F.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn22\" href=\"#fnref22\">22.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/uApwn5Kv\">Representation of the People Act, 1951, S. 123(3-A).<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn23\" href=\"#fnref23\">23.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/4Et5dkGk\">Representation of the People Act, 1951, S. 125.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn24\" href=\"#fnref24\">24.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/sKZIhhJ3\">Information Technology Act, 2000, S. 66-E.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn25\" href=\"#fnref25\">25.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/r4byFiMr\">Information Technology Act, 2000, S. 67.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn26\" href=\"#fnref26\">26.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/Pju7Odo5\">Information Technology Act, 2000, S. 67-A.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn27\" href=\"#fnref27\">27.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/N4BMoAj6\">Information Technology Act, 2000, S. 67-B.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn28\" href=\"#fnref28\">28.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/4F5zM3nu\">Penal Code, 1860, S. 292.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn29\" href=\"#fnref29\">29.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/dQPqLL63\">Penal Code, 1860, S. 294.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn30\" href=\"#fnref30\">30.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/UhZPq765\">Protection of Children from Sexual Offences Act, 2012, S. 13.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn31\" href=\"#fnref31\">31.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/ADXYtiuV\">Protection of Children from Sexual Offences Act, 2012, S. 14.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn32\" href=\"#fnref32\">32.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/a3HkLR1G\">Protection of Children from Sexual Offences Act, 2012, S. 15.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn33\" href=\"#fnref33\">33.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/Pd39W8U7\">Information Technology Act, 2000, S. 69-A.<\/a><\/p>\n<p style=\"margin-left: 18pt; text-indent: -18pt;\"><a id=\"fn34\" href=\"#fnref34\">34.<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/LXbwaE8i\">Information Technology Act, 2000, S. 79.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Shubham Pandey&#8224; and Gaurav Jadhav&#8224;&#8224;<\/p>\n","protected":false},"author":67011,"featured_media":287103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[42503,1191],"tags":[30105,55965,55958,55961,55960,55434,55964,55962,55959,55963],"class_list":["post-286924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legal-analysis","category-op-ed","tag-artificial-intelligence","tag-deepfakes","tag-emerging","tag-generative-adversarial-networks","tag-learning-algorithms","tag-machine-learning","tag-sexually-explicit","tag-spread-misinformation","tag-technologies-and-law","tag-transmitting-of-material"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India | SCC Times<\/title>\n<meta name=\"description\" content=\"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India\" \/>\n<meta property=\"og:description\" content=\"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/\" \/>\n<meta property=\"og:site_name\" content=\"SCC Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scc.online\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-17T05:30:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-17T05:44:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"886\" \/>\n\t<meta property=\"og:image:height\" content=\"590\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/\",\"url\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/\",\"name\":\"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India | SCC Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg\",\"datePublished\":\"2023-03-17T05:30:09+00:00\",\"dateModified\":\"2023-03-17T05:44:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe\"},\"description\":\"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial\",\"breadcrumb\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage\",\"url\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg\",\"contentUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg\",\"width\":886,\"height\":590},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.scconline.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\",\"url\":\"https:\/\/www.scconline.com\/blog\/\",\"name\":\"SCC Times\",\"description\":\"Bringing you the Best Analytical Legal News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.scconline.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India | SCC Times","description":"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India","og_description":"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial","og_url":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/","og_site_name":"SCC Times","article_publisher":"https:\/\/www.facebook.com\/scc.online\/","article_published_time":"2023-03-17T05:30:09+00:00","article_modified_time":"2023-03-17T05:44:18+00:00","og_image":[{"width":886,"height":590,"url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/","url":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/","name":"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India | SCC Times","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage"},"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg","datePublished":"2023-03-17T05:30:09+00:00","dateModified":"2023-03-17T05:44:18+00:00","author":{"@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"description":"Deepfake is a type of artificial intelligence-based technology that uses machine learning algorithms, particularly generative adversarial","breadcrumb":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#primaryimage","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg","width":886,"height":590},{"@type":"BreadcrumbList","@id":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/17\/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scconline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Technologies and Law: Legal Status of Tackling Crimes Relating to Deepfakes in India"}]},{"@type":"WebSite","@id":"https:\/\/www.scconline.com\/blog\/#website","url":"https:\/\/www.scconline.com\/blog\/","name":"SCC Times","description":"Bringing you the Best Analytical Legal News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scconline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/"}]}},"jetpack_featured_media_url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-761.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":316389,"url":"https:\/\/www.scconline.com\/blog\/post\/2024\/03\/07\/meity-issues-advisory-on-misinformation-and-deepfake-legal-news\/","url_meta":{"origin":286924,"position":0},"title":"MeitY issues advisory on Misinformation and Deepfake mandating unique metadata","author":"Kriti","date":"March 7, 2024","format":false,"excerpt":"Advisory mandates to label a permanent unique metadata on every work to identify the source and creator in case of misinformation and deepfake.","rel":"","context":"In &quot;Legislation Updates&quot;","block_context":{"text":"Legislation Updates","link":"https:\/\/www.scconline.com\/blog\/post\/category\/legislationupdates\/"},"img":{"alt_text":"Ministry of Electronics and Information Technology","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/03\/Ministry-of-Electronics-and-Information-Technology.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/03\/Ministry-of-Electronics-and-Information-Technology.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/03\/Ministry-of-Electronics-and-Information-Technology.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/03\/Ministry-of-Electronics-and-Information-Technology.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":290678,"url":"https:\/\/www.scconline.com\/blog\/post\/2023\/04\/27\/importance-of-data-ethics-in-an-ai-driven-world\/","url_meta":{"origin":286924,"position":1},"title":"Importance of Data Ethics in an AI-Driven World","author":"Editor","date":"April 27, 2023","format":false,"excerpt":"by Karnika Seth\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"importance of data ethics in an ai-driven world","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/04\/importance-of-data-ethics-in-an-ai-driven-world.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/04\/importance-of-data-ethics-in-an-ai-driven-world.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/04\/importance-of-data-ethics-in-an-ai-driven-world.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/04\/importance-of-data-ethics-in-an-ai-driven-world.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":366093,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/11\/08\/deepfake-regulation-rights\/","url_meta":{"origin":286924,"position":2},"title":"Me, Myself and AI: Chasing Deepfakes Across Borders Without Losing Your Rights","author":"Editor","date":"November 8, 2025","format":false,"excerpt":"by Yash Bajpai*","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"Deepfake regulation","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/11\/Deepfake-regulation.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/11\/Deepfake-regulation.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/11\/Deepfake-regulation.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/11\/Deepfake-regulation.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":376572,"url":"https:\/\/www.scconline.com\/blog\/post\/2026\/02\/24\/mnlu-nagpur-intellectual-property-emerging-technology-conference-2026\/","url_meta":{"origin":286924,"position":3},"title":"Call for Papers | One Day National Conference on \u201cIntellectual Property, Emerging Technology and Digital Regulation\u201d March 27, 2026","author":"Editor","date":"February 24, 2026","format":false,"excerpt":"MNLU Nagpur invites papers for its One Day National Conference on Intellectual Property, Emerging Technology and Digital Regulation to be held on 27 March 2026.","rel":"","context":"In &quot;Call For Papers&quot;","block_context":{"text":"Call For Papers","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/callforpapers\/"},"img":{"alt_text":"MNLU Nagpur IP Emerging Technology Conference 2026","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/02\/MNLU-Nagpur-IP-Emerging-Technology-Conference-2026.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/02\/MNLU-Nagpur-IP-Emerging-Technology-Conference-2026.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/02\/MNLU-Nagpur-IP-Emerging-Technology-Conference-2026.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/02\/MNLU-Nagpur-IP-Emerging-Technology-Conference-2026.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":217113,"url":"https:\/\/www.scconline.com\/blog\/post\/2019\/07\/21\/upes-dehradun-international-conference-on-law-and-technology-on-legal-social-and-economic-perspectives-on-exponential-technologies\/","url_meta":{"origin":286924,"position":4},"title":"UPES Dehradun | International Conference on Law and Technology on Legal, Social, and Economic Perspectives on Exponential Technologies","author":"Bhumika Indulia","date":"July 21, 2019","format":false,"excerpt":"Reported by Shashank Sinha","rel":"","context":"In &quot;Conference\/Seminars\/Lectures&quot;","block_context":{"text":"Conference\/Seminars\/Lectures","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/conference_seminars_lectures\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/ICLT-2-Poster.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/ICLT-2-Poster.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/ICLT-2-Poster.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/ICLT-2-Poster.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":348176,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/05\/17\/ai-based-app-showreel-secures-copyright-registration-in-india\/","url_meta":{"origin":286924,"position":5},"title":"AI-Based App \u2018ShowReel\u2019 secures Copyright Registration in India","author":"Editor","date":"May 17, 2025","format":false,"excerpt":"Innovative platform developed by Hotmail co-founder Sabeer Bhatia aims to transform entrepreneurship education through generative AI.","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"ShowReel AI","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/05\/ShowReel-AI.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/05\/ShowReel-AI.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/05\/ShowReel-AI.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/05\/ShowReel-AI.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/286924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/users\/67011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/comments?post=286924"}],"version-history":[{"count":0,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/286924\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media\/287103"}],"wp:attachment":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media?parent=286924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/categories?post=286924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/tags?post=286924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}