{"id":3248,"date":"2021-02-25T13:26:03","date_gmt":"2021-02-25T12:26:03","guid":{"rendered":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=3248"},"modified":"2025-06-24T11:34:23","modified_gmt":"2025-06-24T09:34:23","slug":"deepfake","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake","title":{"rendered":"Deepfakes: qu\u00e9 son y c\u00f3mo evitar ser estafado por esta tecnolog\u00eda"},"content":{"rendered":"\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">El <strong>concepto de <\/strong><\/span><strong><em>deepfake<\/em><\/strong><span data-contrast=\"auto\"> naci\u00f3 hace unos a\u00f1os fruto de la uni\u00f3n de las tecnolog\u00edas de <\/span><span data-contrast=\"auto\">aprendizaje profundo<\/span> <span data-contrast=\"auto\">(redes neuronales concretamente) <\/span><span data-contrast=\"auto\">y la palabra <\/span><em>fake<\/em><span data-contrast=\"auto\"> (falso, en espa\u00f1ol). En esta entrada te vamos a contar qu\u00e9 son los deepfakes y algunas <strong>pautas para no caer en ellos. <\/strong><br \/><br \/>Pero antes de <\/span><span data-contrast=\"auto\">explicar qu\u00e9 es este nuevo t\u00e9rmino y c\u00f3mo nos afecta hagamos un <\/span><span data-contrast=\"auto\">bre<\/span><span data-contrast=\"auto\">v<\/span><span data-contrast=\"auto\">e repaso por la historia de las redes neuronales<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5678 size-large\" src=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/ilustracion-deepfake-1020x572.jpg\" alt=\"ilustraci\u00f3n deepfakes\" width=\"1020\" height=\"572\" srcset=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/ilustracion-deepfake-1020x572.jpg 1020w, https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/ilustracion-deepfake-175x98.jpg 175w, https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/ilustracion-deepfake-768x431.jpg 768w, https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/ilustracion-deepfake.jpg 1200w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_72 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\/#Breve_historia_de_las_redes_neuronales\" title=\"Breve historia de las redes neuronales\">Breve historia de las redes neuronales<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\/#Que_son_los_deepfakes\" title=\"Qu\u00e9 son los deepfakes\u00a0\">Qu\u00e9 son los deepfakes\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\/#Los_peligros_de_los_deepfakes\" title=\"Los peligros de los deepfakes\">Los peligros de los deepfakes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\/#Como_detectar_estos_enganos\" title=\"C\u00f3mo detectar estos enga\u00f1os\">C\u00f3mo detectar estos enga\u00f1os<\/a><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Breve_historia_de_las_redes_neuronales\"><\/span>Breve historia de las redes neuronales<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Desde la antig\u00fcedad, el funcionamiento del cerebro y el pensamiento humano ha sido objeto de estudio<\/span><span data-contrast=\"auto\"> y ya grandes pensadores como Plat\u00f3n, Arist\u00f3teles o Descartes intentaron <\/span><span data-contrast=\"auto\">desentra\u00f1ar sus misterios.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Con el paso del tiempo,<\/span><span data-contrast=\"auto\"> se han realizado grandes avances que han ido arrojando <\/span><span data-contrast=\"auto\">luz a ese vac\u00edo de oscuridad que es nuestro cerebro. Pero no es hasta los <strong>a\u00f1os 40 cuando se formula matem\u00e1ticamente<\/strong>, por primera vez, el <a href=\"https:\/\/www.inesem.es\/revistadigital\/educacion-sociedad\/neuroplasticidad\/\" target=\"_blank\" rel=\"noopener noreferrer\">funcionamiento<\/a><\/span><span data-contrast=\"auto\"><a href=\"https:\/\/www.inesem.es\/revistadigital\/educacion-sociedad\/neuroplasticidad\/\" target=\"_blank\" rel=\"noopener noreferrer\"> de una neurona humana<\/a>. <\/span><span data-contrast=\"auto\">Gracias a este trabajo y a la evoluci\u00f3n de la tecnolog\u00eda, en las d\u00e9cadas venideras se formular\u00edan e implementar\u00edan neuronas m\u00e1s complejas y redes neuronales de m\u00faltiples neuronas<\/span><span data-contrast=\"auto\">. Debido a la <strong>alta complejidad<\/strong> de estos sistemas y a la poca capacidad computacional que se pose\u00eda<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> muchos de estos trabajos se quedaron en el plano te\u00f3rico ya que era imposible implementarlos en<\/span><span data-contrast=\"auto\"> las computadoras de la \u00e9poca<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Pero <\/span><span data-contrast=\"auto\">es a partir de 2010<\/span><span data-contrast=\"auto\"> cuando el mundo de las redes neuronales explota gracias a<\/span><span data-contrast=\"auto\"> la evoluci\u00f3n tecnol\u00f3gica que supuso el poder utilizar las GPU para realizar los <strong>c<\/strong><\/span><span data-contrast=\"auto\"><strong>ostosos c\u00f3mputos<\/strong> que precisan <\/span><span data-contrast=\"auto\">dichos algoritmos<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Esta explosi\u00f3n continua a d\u00eda de hoy y ha permitido avances tecnol\u00f3gicos hasta la fecha impensables<\/span><span data-contrast=\"auto\">, entre ellos la conducci\u00f3n aut\u00f3noma, robots inteligentes y generaci\u00f3n de rostros humanos<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\"> Es con esto \u00faltimo con lo que empiezan a surgir los primeros deepfakes.<\/span><\/p>\r\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Que_son_los_deepfakes\"><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">Qu\u00e9 son los deepfakes\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Cuando hablamos de \u201c<\/span><span data-contrast=\"auto\">deepfake<\/span><span data-contrast=\"auto\">\u201d nos re<\/span><span data-contrast=\"auto\">ferimos a la t\u00e9cnica por la cual, mediante redes neuronales artificiales, se generan v\u00eddeos falsos <\/span><span data-contrast=\"auto\">ultra realistas<\/span><span data-contrast=\"auto\"> con diferentes fines. <\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Esto es posible <strong>gracias a las <\/strong><\/span><span data-contrast=\"auto\"><strong>Redes Generativas Antag\u00f3nicas<\/strong> (GAN por sus siglas en ingl\u00e9s), un tipo de red capaz de generar o reconstruir im\u00e1genes<\/span><span data-contrast=\"auto\">. Desde generar modelos tridimensionales a partir de planos en dos dimensiones<\/span> <span data-contrast=\"auto\">hasta crear de la nada rostros de humanos <\/span><span data-contrast=\"auto\">que en realidad no existen.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.imgur.com\/yX8KrtC.png\" alt=\"\" width=\"1220\" height=\"813\" \/><\/p>\r\n<p style=\"text-align: justify;\"><strong>Ninguna de estas personas es real.<\/strong><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Inicialmente, estas redes \u00fanicamente pod\u00edan crear im\u00e1genes est\u00e1ticas, pero <\/span><span data-contrast=\"auto\">a partir de 2018 y gracias a los continuos avances en este campo, <\/span><span data-contrast=\"auto\">empezaron a aparecer los primeros v\u00eddeos donde se hac\u00eda uso de esta t\u00e9cnica.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Los_peligros_de_los_deepfakes\"><\/span>Los peligros de los deepfakes<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Gracias a la facilidad con la que se puede acceder a esta tecnolog\u00eda<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> han aparecido m\u00faltiples im\u00e1genes y v\u00eddeos <\/span><span data-contrast=\"auto\">deepfake<\/span> <span data-contrast=\"auto\">que tienen como objetivo la propagaci\u00f3n de noticias<\/span><span data-contrast=\"auto\"> e informaci\u00f3n<\/span><span data-contrast=\"auto\"> falsas. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Por ejemplo, <\/span><span data-contrast=\"auto\">han sido ampliamente <a href=\"https:\/\/www.elconfidencial.com\/empresas\/2019-11-10\/deepfake-politicos-elecciones-crisis-reputacion-empresas-inteligencia-artificial_2316956\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">utilizados con fines pol\u00edticos<\/a><\/span><span data-contrast=\"auto\">, creando v\u00eddeos <\/span><span data-contrast=\"auto\">realistas <\/span><span data-contrast=\"auto\">de <\/span><span data-contrast=\"auto\">grandes l\u00edderes mundiales como Barack Obama, Donald Trump o Vladimir Putin<\/span><span data-contrast=\"auto\"> transmitiendo mensajes falsos con el<strong> fin de enga\u00f1ar a la poblaci\u00f3n.<\/strong><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Este tipo de v\u00eddeos e im\u00e1genes de <\/span><span data-contrast=\"auto\">gran realismo<\/span><span data-contrast=\"auto\"> han elevado las \u201c<\/span><span data-contrast=\"auto\">fake<\/span> <span data-contrast=\"auto\">news<\/span><span data-contrast=\"auto\">\u201d a un nuevo nivel, siendo cada vez m\u00e1s dif\u00edcil el distinguir la realidad de la ficci\u00f3n en la sociedad de la sobreinformaci\u00f3n en la que vivimos.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/cQ54GDm1eL0\" width=\"300\" height=\"314\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Pero no todo iban a ser malas noticias en lo <\/span><span data-contrast=\"auto\">que a esta nueva <\/span><span data-contrast=\"auto\">era <\/span><span data-contrast=\"auto\">de \u201cfalsificaciones\u201d se refiere. Por ejemplo, esta tecnolog\u00eda est\u00e1 suponiendo una <strong>revoluci\u00f3n en el mundo del cine,<\/strong> ya que gracias a ella es posible resucitar a grandes actores que ya no se<\/span><span data-contrast=\"auto\"> encuentran entre nosotros. <\/span><span data-contrast=\"auto\">En este campo Disney lidera el avance y podemos ver c\u00f3mo traen de vuelta a la princesa Leia (interpretada por la ya difunta Carrie Fisher) en <\/span><span data-contrast=\"auto\">su pel\u00edcula <\/span><span data-contrast=\"auto\">\u201c<\/span><span data-contrast=\"auto\">Rogue<\/span> <span data-contrast=\"auto\">One<\/span><span data-contrast=\"auto\">: una historia de <\/span><span data-contrast=\"auto\">Star<\/span><span data-contrast=\"auto\"> Wars\u201d.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Como_detectar_estos_enganos\"><\/span>C\u00f3mo detectar estos enga\u00f1os<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">A d\u00eda de hoy nos llegan decenas de noticias a nuestros ordenadores y m\u00f3viles, <\/span><span data-contrast=\"auto\">muchas <\/span><span data-contrast=\"auto\">de ellas <\/span><span data-contrast=\"auto\">con el \u00fanico objetivo de enga\u00f1arnos y alimentarnos informaci\u00f3n falsa. Conforme avanza la tecnolog\u00eda, cada vez es m\u00e1s complicado separar la realidad de la <\/span><span data-contrast=\"auto\">ficci\u00f3n<\/span><span data-contrast=\"auto\">, pero hay una serie de detalles en los que podemos fijarnos para detectar estos deepfakes<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">A la hora de <strong>\u00abcazar\u00bb uno de estos <\/strong><\/span><strong>deepfakes<\/strong><span data-contrast=\"auto\">, debemos fijarnos en los detalles ya que ser\u00e1n los que marquen la diferencia: <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<ul style=\"text-align: justify;\">\r\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Prestar atenci\u00f3n a la <strong>uni\u00f3n del rostro con el cuello<\/strong>. <\/span><span data-contrast=\"auto\">A pesar de que los algoritmos actuales son muy precisos intercambiando el rostro, esta uni\u00f3n sigue siendo un punto flaco.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Comprobar la <strong>sincronizaci\u00f3n del sonido<\/strong> con los labios.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Al igual que con la uni\u00f3n del rostro con el cuello, la <strong>boca y su interior<\/strong> sigue siendo uno de los puntos flacos de estas t\u00e9cnicas.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Pero <\/span><strong>la mejor herramienta <\/strong><span data-contrast=\"auto\">contra este tipo de contenido falso es la informaci\u00f3n y <strong>nuestro criterio propio<\/strong>. Ante la duda siempre deberemos acudir a la fuente, estudiarla y compararla con otras noticias <\/span><span data-contrast=\"auto\">para asegurarnos de su veracidad. La (buena) informaci\u00f3n es nuestra mejor arma en este mar de desinformaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>\u00bfC\u00f3mo evitar ser timado por la tecnolog\u00eda deepface? En este art\u00edculo te damos algunos trucos para detectar los deekfake.<\/p>\n","protected":false},"author":91808,"featured_media":3252,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"class_list":["post-3248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desarrollo-de-aplicaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qu\u00e9 son los &quot;deepfake&quot; y c\u00f3mo no ser enga\u00f1ado por uno<\/title>\n<meta name=\"description\" content=\"Los \u201cdeepfake&quot; son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u00e9 son los &quot;deepfake&quot; y c\u00f3mo no ser enga\u00f1ado por uno\" \/>\n<meta property=\"og:description\" content=\"Los \u201cdeepfake&quot; son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-25T12:26:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T09:34:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1620\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Antonio Cort\u00e9s\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Antonio Cort\u00e9s\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\"},\"author\":{\"name\":\"Juan Antonio Cort\u00e9s\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/8ee1766993cf03a21166b38bfc299346\"},\"headline\":\"Deepfakes: qu\u00e9 son y c\u00f3mo evitar ser estafado por esta tecnolog\u00eda\",\"datePublished\":\"2021-02-25T12:26:03+00:00\",\"dateModified\":\"2025-06-24T09:34:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\"},\"wordCount\":900,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg\",\"articleSection\":[\"Desarrollo de Aplicaciones\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\",\"name\":\"Qu\u00e9 son los \\\"deepfake\\\" y c\u00f3mo no ser enga\u00f1ado por uno\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg\",\"datePublished\":\"2021-02-25T12:26:03+00:00\",\"dateModified\":\"2025-06-24T09:34:23+00:00\",\"description\":\"Los \u201cdeepfake\\\" son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg\",\"width\":1620,\"height\":1080,\"caption\":\"Deepface\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desarrollo de Aplicaciones\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Deepfakes: qu\u00e9 son y c\u00f3mo evitar ser estafado por esta tecnolog\u00eda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/8ee1766993cf03a21166b38bfc299346\",\"name\":\"Juan Antonio Cort\u00e9s\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2022\/05\/cropped-Juan-Antonio-Cortes-96x96-1-96x96.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2022\/05\/cropped-Juan-Antonio-Cortes-96x96-1-96x96.jpg\",\"caption\":\"Juan Antonio Cort\u00e9s\"},\"description\":\"EDUCACI\u00d3N: \u2022 Graduado en Ingenier\u00eda Inform\u00e1tica por la UGR \u2022 M\u00e1ster Universitario Oficial en Ciencia de Datos e Ingenier\u00eda de Computadores por la UGR \u2022 Doctorando en tecnolog\u00edas de la informaci\u00f3n por la UGR EXPERIENCIA: \u2022 Docente en INESEM Business School \u2022 M\u00e1s de tres a\u00f1os de experiencia como cient\u00edfico de datos en el Repsol Technology Lab ESCRIBE SOBRE: Ciencia de datos \u00b7 Procesamiento de datos \u00b7 Aplicaci\u00f3n de datos en las tecnolog\u00edas industriales Experta en Tecnolog\u00edas de la Comunicaci\u00f3n. Cuenta con experiencia como docente e investigador\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jacortesibanez\/\"],\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juanantonio-cortes\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu\u00e9 son los \"deepfake\" y c\u00f3mo no ser enga\u00f1ado por uno","description":"Los \u201cdeepfake\" son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake","og_locale":"es_ES","og_type":"article","og_title":"Qu\u00e9 son los \"deepfake\" y c\u00f3mo no ser enga\u00f1ado por uno","og_description":"Los \u201cdeepfake\" son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2021-02-25T12:26:03+00:00","article_modified_time":"2025-06-24T09:34:23+00:00","og_image":[{"width":1620,"height":1080,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg","type":"image\/jpeg"}],"author":"Juan Antonio Cort\u00e9s","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan Antonio Cort\u00e9s","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake"},"author":{"name":"Juan Antonio Cort\u00e9s","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/8ee1766993cf03a21166b38bfc299346"},"headline":"Deepfakes: qu\u00e9 son y c\u00f3mo evitar ser estafado por esta tecnolog\u00eda","datePublished":"2021-02-25T12:26:03+00:00","dateModified":"2025-06-24T09:34:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake"},"wordCount":900,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg","articleSection":["Desarrollo de Aplicaciones"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake","name":"Qu\u00e9 son los \"deepfake\" y c\u00f3mo no ser enga\u00f1ado por uno","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg","datePublished":"2021-02-25T12:26:03+00:00","dateModified":"2025-06-24T09:34:23+00:00","description":"Los \u201cdeepfake\" son v\u00eddeos falsos generados mediante redes neuronales. Te contamos un poco m\u00e1s de ellos y c\u00f3mo detectarlos en esta entrada.","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake.jpg","width":1620,"height":1080,"caption":"Deepface"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/deepfake#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Desarrollo de Aplicaciones","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones"},{"@type":"ListItem","position":3,"name":"Deepfakes: qu\u00e9 son y c\u00f3mo evitar ser estafado por esta tecnolog\u00eda"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/8ee1766993cf03a21166b38bfc299346","name":"Juan Antonio Cort\u00e9s","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2022\/05\/cropped-Juan-Antonio-Cortes-96x96-1-96x96.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2022\/05\/cropped-Juan-Antonio-Cortes-96x96-1-96x96.jpg","caption":"Juan Antonio Cort\u00e9s"},"description":"EDUCACI\u00d3N: \u2022 Graduado en Ingenier\u00eda Inform\u00e1tica por la UGR \u2022 M\u00e1ster Universitario Oficial en Ciencia de Datos e Ingenier\u00eda de Computadores por la UGR \u2022 Doctorando en tecnolog\u00edas de la informaci\u00f3n por la UGR EXPERIENCIA: \u2022 Docente en INESEM Business School \u2022 M\u00e1s de tres a\u00f1os de experiencia como cient\u00edfico de datos en el Repsol Technology Lab ESCRIBE SOBRE: Ciencia de datos \u00b7 Procesamiento de datos \u00b7 Aplicaci\u00f3n de datos en las tecnolog\u00edas industriales Experta en Tecnolog\u00edas de la Comunicaci\u00f3n. Cuenta con experiencia como docente e investigador","sameAs":["https:\/\/www.linkedin.com\/in\/jacortesibanez\/"],"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juanantonio-cortes"}]}},"autor_name":{"name":"Juan Antonio Cort\u00e9s"},"featured_image":{"attachment_meta":{"width":1620,"height":1080,"file":"2021\/02\/deepfake.jpg","sizes":{"medium":{"file":"deepfake-175x117.jpg","width":175,"height":117,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-175x117.jpg"},"large":{"file":"deepfake-1020x680.jpg","width":1020,"height":680,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-1020x680.jpg"},"thumbnail":{"file":"deepfake-345x180.jpg","width":345,"height":180,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-345x180.jpg"},"medium_large":{"file":"deepfake-768x512.jpg","width":768,"height":512,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-768x512.jpg"},"wysija-newsletters-max":{"file":"deepfake-600x400.jpg","width":600,"height":400,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-600x400.jpg"},"1536x1536":{"file":"deepfake-1536x1024.jpg","width":1536,"height":1024,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-1536x1024.jpg"},"thumb-small":{"file":"deepfake-59x42.jpg","width":59,"height":42,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-59x42.jpg"},"thumb-standard":{"file":"deepfake-110x110.jpg","width":110,"height":110,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-110x110.jpg"},"thumb-medium":{"file":"deepfake-196x166.jpg","width":196,"height":166,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-196x166.jpg"},"thumb-large":{"file":"deepfake-283x190.jpg","width":283,"height":190,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-283x190.jpg"},"thumb-anteriores":{"file":"deepfake-230x163.jpg","width":230,"height":163,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-230x163.jpg"},"thumb-inverso":{"file":"deepfake-369x261.jpg","width":369,"height":261,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-369x261.jpg"},"thumb-cercano":{"file":"deepfake-650x200.jpg","width":650,"height":200,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-650x200.jpg"},"thumb-slider":{"file":"deepfake-574x430.jpg","width":574,"height":430,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-574x430.jpg"},"thumb-busqueda":{"file":"deepfake-580x375.jpg","width":580,"height":375,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-580x375.jpg"},"thumb-formacion-continua":{"file":"deepfake-440x336.jpg","width":440,"height":336,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-440x336.jpg"},"advps-thumb-one":{"file":"deepfake-600x220.jpg","width":600,"height":220,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2021\/02\/deepfake-600x220.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/3248"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/91808"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=3248"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/3248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/3252"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=3248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=3248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}