An Real-Time Deep Fakes and Face Forgery Using Transfer Learning Algorithm
DOI:
https://doi.org/10.15662/IJRAI.2025.0802009Keywords:
Deepfakes, Deep learning, Feature extraction, Generative adversarial networks, Residual neural networksAbstract
A novel deep learning architecture for deepfake detection was proposed that combines LSTM and CNN methods, implemented using Python on the Kaggle platform. The model was evaluated using two datasets: DFDC and Ciplab. Dataset preprocessing involved 19,148 real images and an equal number of fake images, with 80% allocated for training using 128 × 128 image sizes. Binary cross-entropy function 5.4 was used to calculate error rates during training iterations.The results demonstrated high accuracy rates of 97.32% and 98.24%, with low error rates of 0.15% and 0.26% for the respective datasets. These results confirm the model's adaptability for accurate deepfake prediction. The effectiveness stems from the complementary strengths of both approaches: LSTMs effectively capture sequential temporal dependencies between frames to identify deepfake inconsistencies, while CNNs evaluate frame content to detect visual artifacts, inconsistencies, or unusual patterns indicating manipulation. The hybrid approach leverages the strengths of both methods, resulting in a more efficient and effective model capable of adapting to various deepfake generation techniques. By combining temporal analysis capabilities of LSTMs with the spatial feature extraction abilities of CNNs, the architecture achieves a more comprehensive deepfake detection system.
References
1. Gordon, G. The Internet a Philosophical Inquiry; Routledge: London, UK; New York, NY, USA, 1999; 190p, ISBN 9780415197496. [Google Scholar]
2. Maras, M.-H.; Alexandrou, A. Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos. Int. J. Evid. Proof 2019, 23, 255–262. [Google Scholar] [CrossRef]
3. Dolhansky, B.; Bitton, J.; Pflaum, B.; Lu, J.; Howes, R.; Wang, M.; Ferrer, C. The deepfake detection challenge dataset. arXiv 2020, arXiv:2006.07397. [Google Scholar]
4. Hasan, H.R.; Salah, K. Combating Deepfake Videos Using Blockchain and Smart Contracts. IEEE Access 2019, 7, 41596–41606. [Google Scholar] [CrossRef]
5. De keersmaecker, J.; Roets, A. 'Fake news': Incorrect, but hard to correct. The role of cognitive ability on the impact of false information on social impressions. Intelligence 2017, 65, 107–110. [Google Scholar] [CrossRef]
6. Anderson, K.E. Getting to know social networks and apps: Social Media in 2017. Libr. Hi Tech News 2017, 34, 1–6.[Google Scholar] [CrossRef]Availableonline: https://edition.cnn.com/2019/06/11/tech/zuckerberg- deepfake/index.html (accessed on 7 June 2019).
7. Barsha, L.; Keshav, T.; Sung-Hyun, Y. Detection of Image Level Forgery with Multiple Constraints Using DFDC Full and Sample Datasets. Sensors 2022, 22, 9121. [Google Scholar] [CrossRef] [PubMed]
8. Zao Download Android, iPhone, iPad 2020. Available online: https://zaodownload.com/ (accessed on 12 December 2023).
9. DeepfakesWeb.com. Available online: https://deepfakesweb.com/ (accessed on 4 January 2023).
10. Anthropics Technology Ltd. Available online: https://www.anthropics.com/portraitpro/ (accessed on 4 January 2023).
11. Neocortext. Available online: https://hey.reface.ai/ (accessed on 4 January 2023).
12. TheAudacityTeam. Available online: https://voice.ai/hub/app/free-voice-changer-for- audacity/ (accessed on 21 September 2022).
13. Magix Software GmbH. Available online: https://www.magix.com/us/music-editing/sound- forge/ (accessed on 4 January 2023).
14. Deep Q-Network with Reinforcement Learning for Fault Detection in Cyber-Physical Systems J. Stanly JayaprakashM. Jasmine Pemeena Priyadarsini, B. D. Parameshachari Hamid Reza Karimi, and Sasikumar GurumoorthyJournal of Circuits, Systems and Computers 2022
15. Efficient Biometric Security System Using Intra-Class Finger-Knuckle Pose Variation Assessment Mr.J.Stanly Jayaprakash Dr.S.Arumugam, India International Journal of Computer Science & Engineering Technology (IJCSET) 2014
16. Cloud Data Authentication and Encryption based on Improved Merkle Hash Tree Technique J Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3, *, B. D. Parameshachari4 and Celestine Iwendi 2021.
17. Effective Biometric Security System Based on Intra- Class Finger-Knuckle Pose Variation Evaluation Mr.J.Stanly Jayaprakash Dr.S.Arumugam, India International Journal of Computer Science & Engineering Technology (IJCSET) 2014.
18. Cloud Data Encryption and Authentication Based on Improved Merkle Hash Tree Technique J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3, *, B. D. Parameshachari4 and Celestine Iwendi 2021.
19. Multimodal finger biometric score fusion verification based on coarse grained distribution function JS Jayaprakash, S Arumugam2015.
20. A new technique for fingerprint sparse coding analysis utilizing k-svd learning technique S Arthi, J Stanly Jayaprakash 2024
21. "A Fusion Attention Mechanism with Bi-LSTM-Based Sarcasm Detection for Selecting High-Profit Products". Journal of Circuits, Systems and Computers C. Gayathri., R. Samson Ravindran. (2025). https://doi.org/10.1142/S0218126625501439.
22. "Energy and Green IT Resource Management Analysis and Formation in Geographically Distributed Environmental Cloud Data Centre" Murugan G, Gayathri.C, Latha.S, Sathiya Kumar C, SudhakarSengan, Priya V(2020), in International Journal of Advanced Science and Technology Vol. 29, No. 6,pp 4144-4155(SCOPUSindexed)
23. Meiyalakan K. Published following article. Online Multi-Crop Procurement and Loan System. Volume 10, Issue 5, pp: 32-35,
24. Meiyalakan K. Published below article. Knowledge- Based Approach to Detect Potentially Risky. Websites. Volume 10, Issue 6, pp: 1353-1357
25. Durairam.R. Machine Learning Approches for Brain Disease Diagnosis. Volume 10, Issue 6, pp: 1092-1097.
26. R. DURAIRAM. Deduplication of Storage Drives Using Cloud Computing. Volume 10, Issue 6, pp: 171-172.
27. C. Anusuya et al., "Credit Card Fraud Detection using Machine Learning-Based Random Forest Algorithm," Int. J. Sci. Adv. Res. Technol., vol. 9, no. 3, Mar. 2023.
28. C. Anusuya et al., "Alzheimer Disease with Blood Plasma Proteins detected using Convolutional Neural Network (CNN)," Int. J. Innov. Res. Comput. Commun. Eng., vol. 11, no. 3, Mar. 2023.
29. Jayasutha, P. (2022).Secure Online BoookReselling Through Bidding Method. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), 10(6)





