<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1624564</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Deepfake Detection for Digital Image Security using Deep Learning Methods</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-2862-8257</contrib-id>
                                                                <name>
                                    <surname>Dağdögen</surname>
                                    <given-names>Hüseyin Alperen</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY, FACULTY OF TECHNOLOGY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-6113-4649</contrib-id>
                                                                <name>
                                    <surname>Daş</surname>
                                    <given-names>Resul</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY, FACULTY OF TECHNOLOGY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-4938-4167</contrib-id>
                                                                <name>
                                    <surname>Türkoğlu</surname>
                                    <given-names>İbrahim</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY, FACULTY OF TECHNOLOGY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250930">
                    <day>09</day>
                    <month>30</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>13</volume>
                                        <issue>3</issue>
                                        <fpage>367</fpage>
                                        <lpage>375</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250121">
                        <day>01</day>
                        <month>21</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250215">
                        <day>02</day>
                        <month>15</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>With the rapid increase and proliferation of digital technologies, manipulated content is also increasing in parallel. With the widespread use of deepfake technology, the detection of manipulated content and deceptive content reduces the risks of manipulated data. This situation leads to serious security consequences at social, political, and personal levels with the creation of fake news, misleading videos, and audio recordings. This technology can also cause serious problems such as malicious use and violation of privacy. Therefore, it is vital to develop preventive measures such as deepfake detection and to use this technology correctly and ethically. The detection of images created using deepfake techniques aims to detect manipulations in media files such as video and audio using artificial intelligence and machine learning techniques. Deepfake detection is usually carried out using deep learning algorithms and models. In this study, a hybrid model consisting of transformer-based networks and Convolutional Neural Networks (CNNs) is used to classify fake and real images. When the results of the study were examined, it was seen that the hybrid model used gave more successful results compared to the literature. The applications were carried out on the Casia-WebFace dataset. According to the results obtained, the proposed artificial intelligence method plays an important role in the classification process of images produced using DeepFake techniques. 98.82% accuracy rate was achieved for the Casia-WebFace dataset. These results show that the proposed artificial intelligence model is effective and successful in predicting deepfake techniques.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>DeepFake</kwd>
                                                    <kwd>  Vision Transformer</kwd>
                                                    <kwd>  Forgery</kwd>
                                                    <kwd>  Deep
Learning</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] F. Zengin, “Akilli makine c¸a˘gi sinemasina giris¸: Sinema sanatinda yapay zekˆa teknolojilerinin kullanimi,” ˙Iletis¸im C¸ alıs¸maları Dergisi, vol. 6, no. 2, pp. 151–177, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] R. Das¸, B. Polat, and G. Tuna, “Derin ¨O ˘grenme ile resim ve videolarda nesnelerin tanınması ve takibi,” Fırat U¨ niversitesi Mu¨hendislik Bilimleri Dergisi, vol. 31, no. 2, p. 571–581, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] H. Ahmeto˘glu and R. Das¸, “Derin ¨O ˘grenme ile b¨uy¨uk veri kumelerinden saldırı t¨urlerinin sınıflandırılması,” in 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), 2019, pp. 1–9.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, “Mesonet: a compact facial video forgery detection network,” 2018 10th Ieee International Workshop on Information Forensics and Security (Wifs), 2018. [Online]. Available: ⟨GotoISI⟩://WOS:000461290400003</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] D. Pan, L. Sun, R. Wang, X. Zhang, and R. O. Sinnott, “Deepfake detection through deep learning,” in 2020 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), 2020, pp. 134–143. [Online]. Available: 10.1109/BDCAT50828.2020.00001</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] N.-T. Do, I.-S. Na, and S.-H. Kim, “Forensics face detection from gans using convolutional neural network,” ISITC, vol. 2018, pp. 376–379, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] P. Kawa and P. Syga, “A note on deepfake detection with lowresources,” CoRR, vol. abs/2006.05183, 2020. [Online]. Available: https://arxiv.org/abs/2006.05183</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] C. Yu, C. Chang, and Y. Ti, “Detecting deepfake-forged contents with separable convolutional neural network and image segmentation,” CoRR, vol. abs/1912.12184, 2019. [Online]. Available: http://arxiv.org/ abs/1912.12184</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] D. G¨uera and E. J. Delp, “Deepfake video detection using recurrent neural networks,” in 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018, pp. 1–6. [Online]. Available: 10.1109/AVSS.2018.8639163</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] M. S. Rana and A. H. Sung, “Deepfakestack: A deep ensemblebased learning technique for deepfake detection,” in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2020, pp. 70–75. [Online]. Available: 10.1109/CSCloud-EdgeCom49738.2020.00021</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] S. S. Ali, I. I. Ganapathi, N.-S. Vu, S. D. Ali, N. Saxena, and N. Werghi, “Image forgery detection using deep learning by recompressing images,” Electronics, vol. 11, no. 3, 2022. [Online]. Available: https://www.mdpi.com/2079-9292/11/3/403</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] K. D, S. S. Narayanan, M. I. M, A. Yekopalli, and S. K. S, “Deep fake image classification engine using inception-resnetv1 network,” in 2024 International Conference on Computing and Data Science (ICCDS), 2024, pp. 1–5. [Online]. Available: 10.1109/ICCDS60734.2024.10560424</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] P. Joshi and N. V, “Deep fake image detection using xception architecture,” in 2024 5th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), 2024, pp. 533–537. [Online]. Available: 10.1109/ICRTCST61793.2024.10578398</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] A. R¨ossler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Nießner, “FaceForensics++: Learning to detect manipulated facial images,” in International Conference on Computer Vision (ICCV), 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] M. S. Rana, M. N. Nobi, B. Murali, and A. H. Sung, “Deepfake detection: A systematic literature review,” IEEE Access, vol. 10, pp. 25 494–25 513, 2022. [Online]. Available: 10.1109/ACCESS.2022. 3154404</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] A. Creswell, T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, and A. A. Bharath, “Generative adversarial networks: An overview,” IEEE signal processing magazine, vol. 35, no. 1, pp. 53–65, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” arXiv preprint arXiv:1312.6114, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] L. R. Medsker and L. Jain, “Recurrent neural networks,” Design and Applications, vol. 5, no. 64-67, p. 2, 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] T. T. Nguyena, Q. Viet, H. Nguyenb, D. T. Nguyena, D. T. Nguyena, T. Huynh-Thec et al., “Deep learning for deepfakes creation and detection: A survey,” SSRN Electron. J, vol. 223, p. 103525, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] A. Heidari, N. Jafari Navimipour, H. Dag, and M. Unal, “Deepfake detection using deep learning methods: A systematic and comprehensive review,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, p. e1520, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] S. Khan, M. Naseer, M. Hayat, S. W. Zamir, F. S. Khan, and M. Shah, “Transformers in vision: A survey,” ACM computing surveys (CSUR), vol. 54, no. 10s, pp. 1–41, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] V. Bazarevsky, Y. Kartynnik, A. Vakunov, K. Raveendran, and M. Grundmann, “Blazeface: Sub-millisecond neural face detection on mobile gpus,” arXiv preprint arXiv:1907.05047, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam, “Mobilenets: Efficient convolutional neural networks for mobile vision applications,” arXiv preprint arXiv:1704.04861, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24] M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 4510–4520.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” CoRR, vol. abs/1411.7923, 2014. [Online]. Available: http://arxiv.org/abs/1411.7923</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26] J. Dong, W. Wang, and T. Tan, “CASIA image tampering detection evaluation database,” in 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, Jul. 2013. [Online]. Available: https://doi.org/10.1109/chinasip.2013.6625374</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
