<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-3129</issn>
                                        <issn pub-type="epub">2147-3188</issn>
                                                                                            <publisher>
                    <publisher-name>Bitlis Eren University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17798/bitlisfen.1610300</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Artificial Intelligence (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yapay Zeka (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Deepfake Image Detection with Transfer Learning Models</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0006-0497-3178</contrib-id>
                                                                <name>
                                    <surname>Demir</surname>
                                    <given-names>Lutfi Emre</given-names>
                                </name>
                                                                    <aff>KAHRAMANMARAS SUTCU IMAM UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-2316-7893</contrib-id>
                                                                <name>
                                    <surname>Canbay</surname>
                                    <given-names>Yavuz</given-names>
                                </name>
                                                                    <aff>Kahramanmaraş Sütçü İmam Üniversitesi, Mühendislik ve Mimarlık Fakültesi, Bilgisayar Mühendisliği Bölümü</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250326">
                    <day>03</day>
                    <month>26</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>14</volume>
                                        <issue>1</issue>
                                        <fpage>546</fpage>
                                        <lpage>560</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241230">
                        <day>12</day>
                        <month>30</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250225">
                        <day>02</day>
                        <month>25</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2012, Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</copyright-statement>
                    <copyright-year>2012</copyright-year>
                    <copyright-holder>Bitlis Eren Üniversitesi Fen Bilimleri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Deepfake is a technology that employs artificial intelligence to generate fake images and videos that closely mimic real ones. The rapid growth and dissemination of digital modifications generate considerable concern in the media, politics, and social networking. Among the concerns faced include the dissemination of misinformation, reputational damage, and threats to physical security. Given these concerns, prompt and reliable identification of Deepfakes is crucial for protecting information security and mitigating its negative impacts. Therefore, the development of effective technologies for Deepfake detection is essential to counter this increasing threat. This study aims to identify Deepfake images and examine the efficiency of transfer learning algorithms in Deepfake identification. This study employed the most commonly utilized transfer learning models, including InceptionV3, EfficientNet, NASNet, ResNet, DenseNet, Xception and ConvNeXt, to perform the detection task. An extensive public dataset of 190,000 images, including both real and artificially generated, was utilized in the study. The performance of each model was assessed by using the metrics of accuracy, precision, recall, and F1-score. DenseNet was the most successful model with a test accuracy of 93%. The obtained results have shown that transfer learning models can effectively detect the Deepfake images, providing a practical approach to the challenge with reasonable performance scores.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Deepfake Detection</kwd>
                                                    <kwd>  Information Security</kwd>
                                                    <kwd>  Transfer Learning</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">M. S. Rana, M. N. Nobi, B. Murali, and A. H. Sung, &quot;Deepfake detection: A Systematic Literature Review,&quot; IEEE Access, vol. 10, pp. 25494-25513, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, &quot;Mesonet: A Compact Facial Video Forgery Detection Network,&quot; in 2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018: IEEE, pp. 1-7.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">P. Prajapati and C. Pollett, &quot;Mri-gan: A Generalized Approach to Detect Deepfakes Using Perceptual Image Assessment,&quot; arXiv preprint arXiv:2203.00108, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">C. Miao, Q. Chu, W. Li, T. Gong, W. Zhuang, and N. Yu, &quot;Towards Generalizable and Robust Face Manipulation Detection via Bag-Of-Local-Feature,&quot; arXiv preprint arXiv:2103.07915, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">H. Zhao, W. Zhou, D. Chen, T. Wei, W. Zhang, and N. Yu, &quot;Multi-attentional Deepfake Detection,&quot; in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2185-2194.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">S. Kanwal, S. Tehsin, and S. Saif, &quot;Exposing AI Generated Deepfake Images Using Siamese Network With Triplet Loss,&quot; Computing and Informatics, vol. 41, no. 6, pp. 1541–1562, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">R. Rafique, M. Nawaz, H. Kibriya, and M. Masood, &quot;Deepfake Detection Using Error Level Analysis and Deep Learning,&quot; in 2021 4th International Conference on Computing &amp; Information Sciences (ICCIS), 2021: IEEE, pp. 1-4.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">N. Nida, A. Irtaza, and N. Ilyas, &quot;Forged Face Detection Using ELA and Deep Learning Techniques,&quot; in 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), 2021: IEEE, pp. 271-275.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">M. Patel, A. Gupta, S. Tanwar, and M. Obaidat, &quot;Trans-DF: A Transfer Learning-Based End-To-End Deepfake Detector,&quot; in 2020 IEEE 5th International Conference on Computing Communication And Automation (ICCCA), 2020: IEEE, pp. 796-801.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">P. Joshi and V. Nivethitha, &quot;Deep Fake Image Detection using Xception Architecture,&quot; in 2024 5th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), 2024: IEEE, pp. 533-537.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">M. Liao and M. Chen, &quot;A New Deepfake Detection Method by Vision Transformers,&quot; in International Conference on Algorithms, High Performance Computing, and Artificial Intelligence (AHPCAI 2024), 2024, vol. 13403: SPIE, pp. 953-957.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">M. Karki. deepfake and real images: https://www.kaggle.com/datasets/manjilkarki/deepfake-and-real-images, (23.12.2024).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, &quot;Rethinking the Inception Architecture for Computer Vision,&quot; in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 2818-2826.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">M. Tan and Q. Le, &quot;Efficientnet: Rethinking Model Scaling for Convolutional Neural Networks,&quot; in International Conference on Machine Learning, 2019: PMLR, pp. 6105-6114.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">K. He, X. Zhang, S. Ren, and J. Sun, &quot;Deep Residual Learning For Image Recognition,&quot; in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770-778.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, &quot;Densely Connected Convolutional Networks,&quot; in Proceedings of The IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4700-4708.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">F. Chollet, &quot;Xception: Deep Learning with Depthwise Separable Convolutions,&quot; in Proceedings of The IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 1251-1258.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">B. Zoph, V. Vasudevan, J. Shlens, and Q. V. Le, &quot;Learning Transferable Architectures for Scalable Image Recognition,&quot; in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 8697-8710.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Z. Liu, H. Mao, C.-Y. Wu, C. Feichtenhofer, T. Darrell, and S. Xie, &quot;A Convnet for the 2020s,&quot; in Proceedings of the Ieee/Cvf Conference On Computer Vision and Pattern Recognition, 2022, pp. 11976-11986.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">D. M. Powers, &quot;Evaluation: From Precision, Recall and F-Measure to Roc, Informedness, Markedness and Correlation,&quot; Arxiv Preprint Arxiv:2010.16061, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">A. Utku, Z. Ayaz, D. Çiftçi, and M. A. Akcayol, &quot;Deep Learning Based Classification for Hoverflies (Diptera: Syrphidae),&quot; Journal of the Entomological Research Society, Vol. 25, No. 3, Pp. 529-544, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Y. Canbay, S. Adsiz, and P. Canbay, &quot;Privacy-Preserving Transfer Learning Framework for Kidney Disease Detection,&quot; Applied Sciences, Vol. 14, No. 19, P. 8629, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Y. Kaya, Z. Yiner, M. Kaya, and F. Kuncan, &quot;A New Approach to Covid-19 Detection from X-Ray Images Using Angle Transformation with Googlenet and Lstm,&quot; Measurement Science and Technology, Vol. 33, No. 12, P. 124011, 2022.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
