Intelligence Artificielle

Lensa is Using Your Photos to Train Their AI

Photo editing app Lensa grew massively popular over the last week as social media has become flooded with people posting AI-generated selfies from the app’s latest feature.

For $3.99, Lensa users can upload 10-20 images of themselves and then receive 50 selfies generated by the app’s artificial intelligence in a variety of art styles.

But, before you slam the purchase button, a word of warning: Lensa’s privacy policy and terms of use stipulate that the images users submit to generate their selfies, or rather the “Face Data,” can be used by Prisma AI, the company behind Lensa, to further train the AI’s neural network.

An artificial neural network like the one used by Lensa, or the popular text-to-image generator Dall-E 2, studies vast quantitites of data to learn how to create better and better results. To be able to convert simple sentences into surprisingly well-crafted images, Dall-E 2 was trained on hundreds of millions of images to learn the association between different words and different visual characteristics. Similarly, Lensa’s neural network is continuously learning how to more accurately portray faces.

This face data, which includes position, orientation, and face topology, is harvested using Apple’s TrueDepth API — the same face-tracking capabilities that allow iPhone users to unlock their phones with their face just by looking at their screen. It is this face data that is fed into the neural network. However, this face data is not sold to third parties.

For writer and former model Maya Kotomori, who recently uploaded her own Lensa selfies, it’s unclear whether or not these AI-assisted generators are problematic or not. In the artistic community, apps like Dall-E 2 have been controversial as artists worry both about their income as illustrators being affected and the possibility their work is being stolen to feed the neural networks. In many cases, users have used AI generators to spit out images in particular artists’ style, without their consent or payment.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

17 heures ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

17 heures ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

3 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

4 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

5 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

5 jours ago

This website uses cookies.