Araştırma Makalesi
BibTex RIS Kaynak Göster

Yıl 2025, Cilt: 13 Sayı: 3, 367 - 375
https://doi.org/10.17694/bajece.1624564

Öz

Kaynakça

  • [1] F. Zengin, “Akilli makine c¸a˘gi sinemasina giris¸: Sinema sanatinda yapay zekˆa teknolojilerinin kullanimi,” ˙Iletis¸im C¸ alıs¸maları Dergisi, vol. 6, no. 2, pp. 151–177, 2020.
  • [2] R. Das¸, B. Polat, and G. Tuna, “Derin ¨O ˘grenme ile resim ve videolarda nesnelerin tanınması ve takibi,” Fırat U¨ niversitesi Mu¨hendislik Bilimleri Dergisi, vol. 31, no. 2, p. 571–581, 2019.
  • [3] H. Ahmeto˘glu and R. Das¸, “Derin ¨O ˘grenme ile b¨uy¨uk veri kumelerinden saldırı t¨urlerinin sınıflandırılması,” in 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), 2019, pp. 1–9.
  • [4] D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, “Mesonet: a compact facial video forgery detection network,” 2018 10th Ieee International Workshop on Information Forensics and Security (Wifs), 2018. [Online]. Available: ⟨GotoISI⟩://WOS:000461290400003
  • [5] D. Pan, L. Sun, R. Wang, X. Zhang, and R. O. Sinnott, “Deepfake detection through deep learning,” in 2020 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), 2020, pp. 134–143. [Online]. Available: 10.1109/BDCAT50828.2020.00001
  • [6] N.-T. Do, I.-S. Na, and S.-H. Kim, “Forensics face detection from gans using convolutional neural network,” ISITC, vol. 2018, pp. 376–379, 2018.
  • [7] P. Kawa and P. Syga, “A note on deepfake detection with lowresources,” CoRR, vol. abs/2006.05183, 2020. [Online]. Available: https://arxiv.org/abs/2006.05183
  • [8] C. Yu, C. Chang, and Y. Ti, “Detecting deepfake-forged contents with separable convolutional neural network and image segmentation,” CoRR, vol. abs/1912.12184, 2019. [Online]. Available: http://arxiv.org/ abs/1912.12184
  • [9] D. G¨uera and E. J. Delp, “Deepfake video detection using recurrent neural networks,” in 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018, pp. 1–6. [Online]. Available: 10.1109/AVSS.2018.8639163
  • [10] M. S. Rana and A. H. Sung, “Deepfakestack: A deep ensemblebased learning technique for deepfake detection,” in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2020, pp. 70–75. [Online]. Available: 10.1109/CSCloud-EdgeCom49738.2020.00021
  • [11] S. S. Ali, I. I. Ganapathi, N.-S. Vu, S. D. Ali, N. Saxena, and N. Werghi, “Image forgery detection using deep learning by recompressing images,” Electronics, vol. 11, no. 3, 2022. [Online]. Available: https://www.mdpi.com/2079-9292/11/3/403
  • [12] K. D, S. S. Narayanan, M. I. M, A. Yekopalli, and S. K. S, “Deep fake image classification engine using inception-resnetv1 network,” in 2024 International Conference on Computing and Data Science (ICCDS), 2024, pp. 1–5. [Online]. Available: 10.1109/ICCDS60734.2024.10560424
  • [13] P. Joshi and N. V, “Deep fake image detection using xception architecture,” in 2024 5th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), 2024, pp. 533–537. [Online]. Available: 10.1109/ICRTCST61793.2024.10578398
  • [14] A. R¨ossler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Nießner, “FaceForensics++: Learning to detect manipulated facial images,” in International Conference on Computer Vision (ICCV), 2019.
  • [15] M. S. Rana, M. N. Nobi, B. Murali, and A. H. Sung, “Deepfake detection: A systematic literature review,” IEEE Access, vol. 10, pp. 25 494–25 513, 2022. [Online]. Available: 10.1109/ACCESS.2022. 3154404
  • [16] A. Creswell, T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, and A. A. Bharath, “Generative adversarial networks: An overview,” IEEE signal processing magazine, vol. 35, no. 1, pp. 53–65, 2018.
  • [17] D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” arXiv preprint arXiv:1312.6114, 2013.
  • [18] L. R. Medsker and L. Jain, “Recurrent neural networks,” Design and Applications, vol. 5, no. 64-67, p. 2, 2001.
  • [19] T. T. Nguyena, Q. Viet, H. Nguyenb, D. T. Nguyena, D. T. Nguyena, T. Huynh-Thec et al., “Deep learning for deepfakes creation and detection: A survey,” SSRN Electron. J, vol. 223, p. 103525, 2022.
  • [20] A. Heidari, N. Jafari Navimipour, H. Dag, and M. Unal, “Deepfake detection using deep learning methods: A systematic and comprehensive review,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, p. e1520, 2023.
  • [21] S. Khan, M. Naseer, M. Hayat, S. W. Zamir, F. S. Khan, and M. Shah, “Transformers in vision: A survey,” ACM computing surveys (CSUR), vol. 54, no. 10s, pp. 1–41, 2022.
  • [22] V. Bazarevsky, Y. Kartynnik, A. Vakunov, K. Raveendran, and M. Grundmann, “Blazeface: Sub-millisecond neural face detection on mobile gpus,” arXiv preprint arXiv:1907.05047, 2019.
  • [23] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam, “Mobilenets: Efficient convolutional neural networks for mobile vision applications,” arXiv preprint arXiv:1704.04861, 2017.
  • [24] M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 4510–4520.
  • [25] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” CoRR, vol. abs/1411.7923, 2014. [Online]. Available: http://arxiv.org/abs/1411.7923
  • [26] J. Dong, W. Wang, and T. Tan, “CASIA image tampering detection evaluation database,” in 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, Jul. 2013. [Online]. Available: https://doi.org/10.1109/chinasip.2013.6625374

Deepfake Detection for Digital Image Security using Deep Learning Methods

Yıl 2025, Cilt: 13 Sayı: 3, 367 - 375
https://doi.org/10.17694/bajece.1624564

Öz

With the rapid increase and proliferation of digital technologies, manipulated content is also increasing in parallel. With the widespread use of deepfake technology, the detection of manipulated content and deceptive content reduces the risks of manipulated data. This situation leads to serious security consequences at social, political, and personal levels with the creation of fake news, misleading videos, and audio recordings. This technology can also cause serious problems such as malicious use and violation of privacy. Therefore, it is vital to develop preventive measures such as deepfake detection and to use this technology correctly and ethically. The detection of images created using deepfake techniques aims to detect manipulations in media files such as video and audio using artificial intelligence and machine learning techniques. Deepfake detection is usually carried out using deep learning algorithms and models. In this study, a hybrid model consisting of transformer-based networks and Convolutional Neural Networks (CNNs) is used to classify fake and real images. When the results of the study were examined, it was seen that the hybrid model used gave more successful results compared to the literature. The applications were carried out on the Casia-WebFace dataset. According to the results obtained, the proposed artificial intelligence method plays an important role in the classification process of images produced using DeepFake techniques. 98.82% accuracy rate was achieved for the Casia-WebFace dataset. These results show that the proposed artificial intelligence model is effective and successful in predicting deepfake techniques.

Kaynakça

  • [1] F. Zengin, “Akilli makine c¸a˘gi sinemasina giris¸: Sinema sanatinda yapay zekˆa teknolojilerinin kullanimi,” ˙Iletis¸im C¸ alıs¸maları Dergisi, vol. 6, no. 2, pp. 151–177, 2020.
  • [2] R. Das¸, B. Polat, and G. Tuna, “Derin ¨O ˘grenme ile resim ve videolarda nesnelerin tanınması ve takibi,” Fırat U¨ niversitesi Mu¨hendislik Bilimleri Dergisi, vol. 31, no. 2, p. 571–581, 2019.
  • [3] H. Ahmeto˘glu and R. Das¸, “Derin ¨O ˘grenme ile b¨uy¨uk veri kumelerinden saldırı t¨urlerinin sınıflandırılması,” in 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), 2019, pp. 1–9.
  • [4] D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, “Mesonet: a compact facial video forgery detection network,” 2018 10th Ieee International Workshop on Information Forensics and Security (Wifs), 2018. [Online]. Available: ⟨GotoISI⟩://WOS:000461290400003
  • [5] D. Pan, L. Sun, R. Wang, X. Zhang, and R. O. Sinnott, “Deepfake detection through deep learning,” in 2020 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), 2020, pp. 134–143. [Online]. Available: 10.1109/BDCAT50828.2020.00001
  • [6] N.-T. Do, I.-S. Na, and S.-H. Kim, “Forensics face detection from gans using convolutional neural network,” ISITC, vol. 2018, pp. 376–379, 2018.
  • [7] P. Kawa and P. Syga, “A note on deepfake detection with lowresources,” CoRR, vol. abs/2006.05183, 2020. [Online]. Available: https://arxiv.org/abs/2006.05183
  • [8] C. Yu, C. Chang, and Y. Ti, “Detecting deepfake-forged contents with separable convolutional neural network and image segmentation,” CoRR, vol. abs/1912.12184, 2019. [Online]. Available: http://arxiv.org/ abs/1912.12184
  • [9] D. G¨uera and E. J. Delp, “Deepfake video detection using recurrent neural networks,” in 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018, pp. 1–6. [Online]. Available: 10.1109/AVSS.2018.8639163
  • [10] M. S. Rana and A. H. Sung, “Deepfakestack: A deep ensemblebased learning technique for deepfake detection,” in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2020, pp. 70–75. [Online]. Available: 10.1109/CSCloud-EdgeCom49738.2020.00021
  • [11] S. S. Ali, I. I. Ganapathi, N.-S. Vu, S. D. Ali, N. Saxena, and N. Werghi, “Image forgery detection using deep learning by recompressing images,” Electronics, vol. 11, no. 3, 2022. [Online]. Available: https://www.mdpi.com/2079-9292/11/3/403
  • [12] K. D, S. S. Narayanan, M. I. M, A. Yekopalli, and S. K. S, “Deep fake image classification engine using inception-resnetv1 network,” in 2024 International Conference on Computing and Data Science (ICCDS), 2024, pp. 1–5. [Online]. Available: 10.1109/ICCDS60734.2024.10560424
  • [13] P. Joshi and N. V, “Deep fake image detection using xception architecture,” in 2024 5th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), 2024, pp. 533–537. [Online]. Available: 10.1109/ICRTCST61793.2024.10578398
  • [14] A. R¨ossler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Nießner, “FaceForensics++: Learning to detect manipulated facial images,” in International Conference on Computer Vision (ICCV), 2019.
  • [15] M. S. Rana, M. N. Nobi, B. Murali, and A. H. Sung, “Deepfake detection: A systematic literature review,” IEEE Access, vol. 10, pp. 25 494–25 513, 2022. [Online]. Available: 10.1109/ACCESS.2022. 3154404
  • [16] A. Creswell, T. White, V. Dumoulin, K. Arulkumaran, B. Sengupta, and A. A. Bharath, “Generative adversarial networks: An overview,” IEEE signal processing magazine, vol. 35, no. 1, pp. 53–65, 2018.
  • [17] D. P. Kingma and M. Welling, “Auto-encoding variational bayes,” arXiv preprint arXiv:1312.6114, 2013.
  • [18] L. R. Medsker and L. Jain, “Recurrent neural networks,” Design and Applications, vol. 5, no. 64-67, p. 2, 2001.
  • [19] T. T. Nguyena, Q. Viet, H. Nguyenb, D. T. Nguyena, D. T. Nguyena, T. Huynh-Thec et al., “Deep learning for deepfakes creation and detection: A survey,” SSRN Electron. J, vol. 223, p. 103525, 2022.
  • [20] A. Heidari, N. Jafari Navimipour, H. Dag, and M. Unal, “Deepfake detection using deep learning methods: A systematic and comprehensive review,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, p. e1520, 2023.
  • [21] S. Khan, M. Naseer, M. Hayat, S. W. Zamir, F. S. Khan, and M. Shah, “Transformers in vision: A survey,” ACM computing surveys (CSUR), vol. 54, no. 10s, pp. 1–41, 2022.
  • [22] V. Bazarevsky, Y. Kartynnik, A. Vakunov, K. Raveendran, and M. Grundmann, “Blazeface: Sub-millisecond neural face detection on mobile gpus,” arXiv preprint arXiv:1907.05047, 2019.
  • [23] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam, “Mobilenets: Efficient convolutional neural networks for mobile vision applications,” arXiv preprint arXiv:1704.04861, 2017.
  • [24] M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 4510–4520.
  • [25] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” CoRR, vol. abs/1411.7923, 2014. [Online]. Available: http://arxiv.org/abs/1411.7923
  • [26] J. Dong, W. Wang, and T. Tan, “CASIA image tampering detection evaluation database,” in 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, Jul. 2013. [Online]. Available: https://doi.org/10.1109/chinasip.2013.6625374
Toplam 26 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Hüseyin Alperen Dağdögen 0000-0003-2862-8257

Resul Daş 0000-0002-6113-4649

İbrahim Türkoğlu 0000-0003-4938-4167

Erken Görünüm Tarihi 10 Ekim 2025
Yayımlanma Tarihi 14 Ekim 2025
Gönderilme Tarihi 21 Ocak 2025
Kabul Tarihi 15 Şubat 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 13 Sayı: 3

Kaynak Göster

APA Dağdögen, H. A., Daş, R., & Türkoğlu, İ. (2025). Deepfake Detection for Digital Image Security using Deep Learning Methods. Balkan Journal of Electrical and Computer Engineering, 13(3), 367-375. https://doi.org/10.17694/bajece.1624564

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisans