Skip to main content

πŸ” AI Content Detection

What is Detection?​

The Detection functionality allows you to identify whether a multimedia file has been generated or manipulated using Artificial Intelligence. This tool analyzes technical characteristics and patterns to determine content authenticity.

How It Works​

The system uses multiple specialized detectors that analyze:

  • Generation patterns: Typical characteristics of AI-generated content
  • Inconsistencies: Anomalies indicating manipulation
  • Visual/auditory characteristics: Deep content analysis
  • Security marks: Watermark and protection detection

Run Detection​

From File Details​

  1. Click the details button (☰) of the file in the list
  2. On the new page, click the "ANALYZE FILE" button
  3. The process will run automatically
  4. Results will appear in the "Detection" tab
Direct Execution

The analysis runs immediately without configuration options. Detector parameters are managed by the system administrator.

From Batch Actions​

To analyze multiple files at once:

  1. In the file list, select multiple files with checkboxes
  2. Click the "ANALYZE FILES" button at the top
  3. Analyses will run for all selected files

Results Interpretation​

Overall Result​

The system provides a final verdict which can be:

  • Authentic βœ…: Content is authentic, human-generated
  • Synthetic πŸ€–: Content has been AI-generated
  • Manipulated ⚠️: Content has been manipulated or edited

Details Panel​

In the right panel you'll see the list of executed detectors, each showing:

  • Detector name: Algorithm identifier used (e.g., image_synthetic_detection_onpremise, Security marks, Forgery)
  • Result status: Real, Genuine, Not detected, Manipulated, etc.
  • Percentage: Probability or confidence of the result
Interactive Radio Buttons

Each detector has a radio button. When clicked:

  • The preview image changes to that detector's output
  • Some detectors return heat maps showing manipulated areas
  • The "Input file" detector shows the original unprocessed image

Visualization by File Type​

Images​

  • Preview: Complete image visualization
  • Heat maps: When selecting certain detectors, you'll see colored areas indicating suspicious zones
  • Radio buttons: Toggle between different detector results

Audio​

  • Waveform: Visual representation of the audio signal
  • Playback controls: Play, pause, time navigation
  • Segment analysis: Detection results in different audio parts

Re-analyze File​

If you need to re-analyze a file:

  1. Go to file details
  2. Click "ANALYZE FILE" again
  3. The new analysis will overwrite previous results
Overwritten Results

Re-analyzing will replace previous results. No history of previous analyses is kept.

Comments and Notes​

At the bottom of the Detection tab you'll find the comments section:

  • Text field: Write comments or notes about results (maximum 500 characters)
  • Buttons: CLEAR and SEND
  • History: Your previous comments about this file
Private Comments

Comments are private and function as personal notes. Only you can see them.

General Reports​

To obtain consolidated reports of multiple files:

  • Go to Dashboard
  • Access the reports section
  • You can download general reports with statistics and detection results for all your files
Dashboard Reports

Individual file reports are not available for download, but you can generate general reports from the Dashboard.

Processing Time​

Analysis time varies depending on:

  • File size: Larger files take longer
  • System load: There may be a queue if many simultaneous analyses

Process Status​

During analysis, the status in the file list will show:

  • queued ⏳: Waiting in queue
  • processing βš™οΈ: Currently analyzing
  • ok βœ…: Analysis completed successfully
  • error ❌: Error during analysis
  • alert ⚠️: Completed with warnings

Limitations and Considerations​

Important Considerations
  • Detection is not 100% infallible
  • Results should be interpreted in context
  • Heavily compressed or low-quality files may give less accurate results
  • The system is continuously updated with new detectors and models
  • Detector parameters are configured by the system administrator