🚨 If you are currently being threatened with deepfakes/morphed images: Go to our Emergency Help page first for immediate steps. Come back here for the full toolkit.
πŸ€– What are deepfakes and morphed images? +

Morphing is the older technique β€” someone takes your real photo and digitally edits it to place your face on an explicit or embarrassing image. It's been possible with basic software for years.

Deepfakes use AI to create very realistic fake videos or images. The AI is trained on photos of your face (even just a few public photos are enough) and generates new images or videos where your face appears in situations you were never in.

How easy is it to create one?

  • Basic morphing tools are freely available and require minimal skill
  • Deepfake apps like "FaceSwap" tools are widely shared in Telegram groups
  • Someone with 10–20 photos of your face and a free tool can create convincing fakes in minutes

The most important thing to understand:

βœ… Fake images are not evidence of what you did. They are evidence of what the creator did. Police, cybercrime cells, and courts are increasingly familiar with these tools. A deepfake can be technically identified as fabricated. "It looks real" does not mean "anyone will believe it" β€” especially when you have your original photos and a clear denial.
πŸ”¬ How to detect AI morphing and deepfakes +

You may not need to identify this yourself β€” investigators can do it. But knowing the signs can help you respond confidently.

Visual signs of morphing or AI generation:

  • Inconsistent lighting β€” the face may be lit differently from the body or background
  • Blurring around the hairline β€” where the face meets the hair is often the weakest point in face-swap edits
  • Unnatural eye movement β€” in deepfake videos, blinking may be unnatural or the eyes may not track correctly
  • Teeth and ears β€” AI often struggles with teeth details and ear shapes
  • Skin texture inconsistency β€” the face may look unnaturally smooth compared to the rest of the image
  • Background artifacts β€” objects near the face may look warped or smeared

Tools you can use:

βœ… For legal purposes, a forensic digital expert can formally certify that an image is fabricated. This is admissible in Indian courts. Ask your cybercrime officer about this.
πŸ” How to watermark your photos for protection +

Watermarking your photos before sharing can help prove the original is yours β€” and deter misuse.

Visible watermark (deters casual misuse):

  • Add your name or "@handle" as semi-transparent text to photos you share publicly
  • Android/iPhone: Use free apps like PhotoMarks, iWatermark, or the built-in Snapseed text tool
  • Position the watermark over a part of the image that's hard to crop out

Invisible metadata watermark (for legal evidence):

  • Keep the original, unedited version of every photo on your phone or a private cloud β€” with the original timestamp intact
  • The original EXIF metadata (date, device, location) on your photo proves you took it first
  • Never post the highest-resolution version of a photo publicly β€” save the best quality original for yourself
βœ… Best practice: For any photo you're concerned about sharing, send a lower-resolution version to platforms and keep the full-quality original only on your private device. The quality difference can help establish provenance if needed.
πŸ†˜ What to do if you've been deepfaked β€” step by step +
  1. Do not pay or comply with demands. Paying confirms to the attacker that you will pay, and they will demand more.
  2. Preserve evidence first: Screenshot the fake content, the threat messages, and the sender's profile. Note the URL. Do not delete anything yet.
  3. Report to the platform: Instagram, Facebook, X/Twitter, and YouTube all have reporting categories for non-consensual intimate imagery β€” deepfakes and morphed images are included. Report directly on the platform for the fastest removal. Use the Takedown Resource Kit to easily find the direct reporting links for each platform.
  4. File at cybercrime.gov.in: Go to the National Cyber Crime Reporting Portal and file under "Report Anonymous" for sexual content, or "Report Other Cybercrime" for threats and blackmail.
  5. Tell one trusted person β€” isolation is the attacker's goal. Breaking it is your first act of resistance.
  6. Contact iCall (9152987821) for confidential psychological support.
βœ… You do not need to face this alone and you do not need to have a lawyer before filing a police report. Any police station can register an FIR for cybercrime β€” they will then route it to the cyber cell.
πŸ’œ Emotional support β€” "nobody will believe me" +

The most powerful weapon a deepfake attacker has is the fear that people will believe the fake. Let's address that directly.

The truth about how people respond to deepfakes:

  • People who know you will almost always believe you when you say it's fake β€” because they know your character and context
  • Strangers who see the content are often more sceptical of explicit content than you expect β€” especially given how common fake content is
  • Law enforcement and courts are increasingly trained on AI-generated content and can verify authenticity through forensic analysis

Practical emotional steps:

  • Don't search compulsively for the fake content β€” each time you find it, the psychological harm compounds
  • Tell one trusted person first β€” their response will usually help ground you in the reality that people who know you will support you
  • Write down what happened in a private journal or note β€” it helps organise your thoughts and creates a chronological record
  • Limit how much time you spend on this each day β€” set a "this is my evidence gathering/reporting time" and then step away for your mental health
πŸ“ž iCall (TISS): 9152987821 β€” Free, confidential counselling. Mon–Sat 8am–10pm. They have counsellors specifically trained in technology-facilitated sexual abuse.