SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 2582~2587
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2582-2587  2582
Journal homepage: http://ijece.iaescore.com
Fast discrimination of fake video manipulation
Wildan Jameel Hadi1
, Suhad Malallah Kadhem2
, Ayad Rodhan Abbas2
1
Department of Computer Science, Baghdad University, Baghdad, Iraq
2
Department of Computer Science, Al-Technology University, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jul 28, 2021
Revised Nov 10, 2021
Accepted Nov 30, 2021
Deepfakes have become possible using artificial intelligence techniques,
replacing one person’s face with another person’s face (primarily a public
figure), making the latter do or say things he would not have done.
Therefore, contributing to a solution for video credibility has become a
critical goal that we will address in this paper. Our work exploits the visible
artifacts (blur inconsistencies) which are generated by the manipulation
process. We analyze focus quality and its ability to detect these artifacts.
Focus measure operators in this paper include image Laplacian and image
gradient groups, which are very fast to compute and do not need a large
dataset for training. The results showed that i) the Laplacian group operators,
as a value, may be lower or higher in the fake video than its value in the real
video, depending on the quality of the fake video, so we cannot use them for
deepfake detection and ii) the gradient-based measure (GRA7) decreases its
value in the fake video in all cases, whether the fake video is of high or low
quality and can help detect deepfake.
Keywords:
Deepfake
Focus measures
Multimedia forensics
Video manipulation
Visible artifacts
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wildan Jameel Hadi
Department of Computer Science, Baghdad University
Bagdad, Iraq
Email: wildanjh_comp@csw.uobaghdad.edu.iq
1. INTRODUCTION
At present, when we talk about artificial intelligence, we do not just mean a set of theories; on the
contrary, it has entered many practical applications [1]–[6]. It has become an essential part of many
industries. On the other hand, by looking at artificial intelligence algorithms that depend on deep learning, we
see the potential of these algorithms to solve complex problems because they try to simulate the human mind.
Also, with advanced deep learning techniques, tampering with media is possible, provided large amounts of
data are obtained for training. The main concern here is using these artificial intelligence (AI) tools for
malicious purposes, such as creating vulgar videos or creating false advertising campaigns. In recent years,
fake multimedia has become a problem that must be focused on and solved, especially after the emergence of
so-called deepfakes. Deepfakes are images and video clips that were tampered with using artificial
intelligence [7], such as generative adversarial networks (GANs) [8]–[11] or auto encoders (AEs) [12], [13].
The term deepfake came from a Reddit user who converted celebrity faces into porn videos by
developing a machine learning algorithm [14]. Technology companies and those responsible for social media
platforms have made a wide effort to uncover so-called deepfakes attacks. For example, Microsoft designed
software to detect deepfakes. This program checks the images and videos and then generates a percentage
indicating the extent to which the input material is artificially created [15]. In 2019, Facebook announced the
deepfake detection challenge (DFDC) in cooperation with major technology companies. This initiative
stimulated the creation of new methods that detect deepfakes. They created a giant database of more than
100,000 videos [16]. Facebook also banned all the videos created using artificial intelligence in a way that
Int J Elec & Comp Eng ISSN: 2088-8708 
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2583
could not be detected by the users of this platform [17]. The defense advanced research projects agency
(DARPA) and the air force research laboratory (AFRL) have funded the media forensics research project
(MediFor), whose purpose is to find solutions and technologies to ensure the integrity of digital images and
videos [18]. Three main components are considered in the MediFor program, namely: i) digital integrity,
ii) physical integrity, and iii) semantic integrity [19].
In many cases, video evidence is assumed in criminal investigations to be reliable. But with the
development of technology, where it became possible to tamper with videos, and audio recordings, it is likely
soon to subject such evidence to a test to ensure its authenticity [20]. Therefore, finding ways to help detect
deepfakes is of great importance to preserve the legitimacy of digital evidence.
In this paper, we investigate the detection of these tampered video contents, especially deepfake
videos. Our method uses four focus measures (Laplacian and gradient) to evaluate the amount of blur in the
frames belonging to the fake video and compare it to the real video. We focus on assessing the amount of
blurring because most deepfake applications use blurring to hide the border of the cropped face. Our
contribution to this work can be summarized as follows: i) we use a simple way to detect the blurring residual
in fake videos using the focus measures; ii) a small dataset is used to implement our work without using a
large dataset for training; and iii) our method uses simple measures to detect the forgery instead of using deep
learning methods, which do not easily detect blurring residuals.
2. RELATED WORK
This section will briefly mention some of the works related to deepfake detection and focus on
methods that explore artifacts in fake video frames. Concerning the detection of deepfakes, image
manipulation is not a new problem that has been highlighted since the emergence of deepfakes; for example,
image modification with Photoshop tools is being used up to the present day. Also, multimedia forensics
science is still dealing with this problem [17]. Deepfake algorithms leave traces on media that are difficult to
detect with the naked eye, so more research is devoted to helping detect deepfakes. Figure 1 shows the
number of research papers that have provided solutions in the field of deepfake detection.
Figure 1. The number of research papers that are implemented in terms of deepfake detection [21]
Methods for detecting fakes in a video can be classified into two categories [7]: techniques that
depend on temporal features and those that rely on visible artifacts within frames. We concentrate on the
second type, which breaks down the video into frames and then works on each frame by searching for the
visual artifacts to obtain distinctive properties or features and then feeding them to a classifier. For example,
Koopman et al. [20] used photo response non-uniformity (PRNU) to detect deepfakes manipulation. The
analysis of PRNU is an attractive method because it finds that tampering with the facial area region affects
the local value of the PRNU pattern in video frames. This analysis is widely used in the field of video
forensics [22]. Compression artifacts are also exploited in this area. It was found that when the manipulated
JPEG-image is compressed a second time, the whole image has the effects of double compression, except for
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587
2584
the fake face area [23]. In addition to the defects generated by recompression, the process of deepfakes also
generates a set of precious traces, which need post-processing operations to hide those traces or defects.
Bahrami et al. [24] divided the blurred image into blocks to extract the characteristics of the blur type.
Finally, these local blur characteristics are combined to classify the image blocks into motion or out of focus.
These artifacts, especially the artifacts resulting from blurring the border of the fake face, were used in this
experiment for detecting fakes in videos.
3. FOCUS MEASURES
Focus measures (FM) are useful for the measurement of the amount of blur contained in an image.
Pertuz et al. [25] divided these measures into six categories: gradient-based (GB) and Laplacian-based (LB)
operators, which are based on the first derivative (gradient) and second derivative to measure the degree of
focus and the number of edges found in the input image, respectively. Wavelet-based (WB) and
DCT-based (DCT-B) operators use the fact that the coefficients of the discrete wavelet transform and discrete
cosine transform can be used to measure the focus level. Statistics-based (SB) operators use image statistics
to find focus levels. Finally, miscellaneous operators, which do not belong to any of the prior groups, can
measure the amount of blur founded in the image.
Our work was based on the focus measures operators mentioned in [25]. The selection fell on the
Laplacian family because of its good performance in common imaging conditions. Also, we use the
gradient-based operator because it showed promising results from among the 11 high-performance scales
tested in [25]. We did not refer to other standards, such as deep cryogenic treatment (DCT), due to their
dependence on their applications. All focus measures considered in this paper are presented in Table 1, along
with their exact abbreviation from [25].
Table 1. Focus measures used and their abbreviation
Focus Measure Abbr.
Energy of Laplacian LAP1
Modified Laplacian LAP2
Diagonal Laplacian LAP3
Tenengrad Variance GRA7
4. METHOD
4.1. Dataset
The dataset used in our experiment is the UADFV dataset [26]. It is simple and has only 49 videos
with two classes, fake and real. Figure 2 shows a sample of this dataset. We use ten videos from this dataset
to implement our experiment.
(a) (b)
Figure 2. Sample of the dataset used (a) is an example of deepfakes with low quality (notable edges), while
(b) shows an example of deepfakes with high quality (polished edges)
4.2. Focus measure operators’ analysis
Each video in the dataset is converted into a series of frames. This step is followed by cropping each
frame into eight parts to apply the focus measure mentioned in Table 1 on each part. Figure 3 shows how to
divide each frame into eight parts. Before applying the focus measure operators to the split image, the
grayscale channel of the image is taken into consideration. After applying each measure on each part, the
average value of the eight measure values is calculated for each frame image. This process is repeated for all
video frames, whether real or fake, to calculate the final value of the focus measure operators.
Int J Elec & Comp Eng ISSN: 2088-8708 
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2585
Figure 3. Overall steps for analyzing the quality of focus measures. The video frames are cropped into eight
parts where an average value of the focus measure (FM) is calculated for each frame
5. RESULTS
The focus measure for each video was calculated. Figures 4(a)-(d) show the results energy of
Laplacian, modified Laplacian, Laplacian variance, and Tenengrad variance, respectively. From these results,
we note that the values of the Laplacian-based operators were lower or higher than their values in the real
video, depending on the number of edges present in the fake video. We know that the edges decrease as more
blurring is applied to the image.
(a) (b)
(c) (d)
Figure 4. The results of applying focus measure operators: (a) energy of Laplacian, (b) modified Laplacian,
(c) Laplacian variance, and (d) Tenengrad variance, per fake videos against real one
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587
2586
By looking at the results achieved by the gradient-based operator, we find that the value of this
measure is less than its value in a real video in all cases, whether the fake video is of high quality or low. The
results indicate that we can use the gradient-based measure to detect deepfakes. This explains the algorithm’s
performance in terms of deepfake detection. As for time, the response time of a single video is measured in
seconds, so if we compare the time taken for all videos, it is negligible in relation to the time taken by deep
learning-based methods.
6. CONCLUSION
In this analysis, a methodology for deepfake detection is suggested. Our method exploits the visible
artifacts (blur inconsistencies) generated via post-processing steps applied on fake videos. Compared to other
methods that use deep learning, our method does not require high computational power and extensive data
for training. Still, it is based only on the comparison of the performance of various focus measure operators.
The selection of operators has been chosen after a comprehensive review of the results of much recent
literature. Four focus measure operators are selected to evaluate the degree of focus between fake videos and
real ones. Various mathematical principles were used in the analysis and testing of the focus measure
operators. Out of 36 operators, the best four operators were selected to analyze and compare their
performance. The selection fell on the Laplacian family and the gradient-based operator. Experiments have
been implemented on a test set of both fake and real videos. Experiments showed that the values of the
Laplacian-based operators were lower or higher than their values in the real video, depending on the number
of edges present in the fake video. This means the Laplacian family cannot be used in deepfake detection. On
the other hand, the gradient-based measure (GRA7) can distinguish fake videos from real ones. The dataset
used in our experiment is overly small to subedit guidelines for likelihood ratios, as is desired in forensic
sciences. Nevertheless, we have a simple collection of the focus measures. However, better results could
have been achieved with more complex collection strategies. Due to the increasing sophistication of deepfake
technology, it becomes necessary to keep pace with these developments and establish robust detection
methods. Because the multimedia forensic tools worked on studying and detecting malicious manipulations
in multimedia content before the occurrence of deep learning technology, so it was necessary to take
advantage of these methods and combine them with deep learning techniques to build a strong detection
model.
REFERENCES
[1] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Classifying political arabic articles using support vector machine with different feature
extraction,” in Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 79–94.
[2] A. R. Abbas and A. O. Farooq, “Human skin colour detection using bayesian rough decision tree,” in Communications in
Computer and Information Science, Springer International Publishing, 2018, pp. 240–254.
[3] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Political articles categorization based on different naïve bayes models,” in
Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 286–301.
[4] E. A. Kadhim, H. B. A. Wahab, and M. Suhad, “Proposed approach for key generation based on elliptic curve (EC) algebra and
metaheuristic algorithms,” Engineering Technology Journal, vol. 32, no. 2, pp. 333–346, 2014.
[5] A. T. Sadiq and A. G. Hamad, “BSA: a hybrid bees’ simulated annealing algorithm to solve optimization and NP-complete
problems,” Engineering Technology Journal, vol. 28, no. 2, pp. 271–281, 2010.
[6] H. H. Salih, A. T. Sadiq, and I. K. Ali, “Attack on the Simple Substitution Ciphers Using Particle Swarm Optimization,” Eng. &
Tech. Journal, vol. 28, no. 11, 2010.
[7] L. Verdoliva, “Media forensics and DeepFakes: an overview,” IEEE Journal of Selected Topics in Signal Processing, vol. 14,
no. 5, pp. 910–932, Aug. 2020, doi: 10.1109/JSTSP.2020.3002101.
[8] X. Mao and Q. Li, Generative adversarial networks for image generation. Singapore: Springer Singapore, 2021.
[9] X. Wang, W. Li, G. Mu, D. Huang, and Y. Wang, “Facial expression synthesis by U-Net conditional generative adversarial
networks,” in Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, Jun. 2018, pp. 283–290, doi:
10.1145/3206025.3206068.
[10] T. Karras, S. Laine, and T. Aila, “A style-based generator architecture for generative adversarial networks,” in 2019 IEEE/CVF
Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2019, pp. 4396–4405, doi: 10.1109/CVPR.2019.00453.
[11] Y. Yu, Z. Gong, P. Zhong, and J. Shan, “Unsupervised representation learning with deep convolutional neural network for remote
sensing images,” in International Conference on Image and Graphics, 2017, pp. 97–108.
[12] Y. Zhou and B. E. Shi, “Photorealistic facial expression synthesis by the conditional difference adversarial autoencoder,” in 2017
Seventh International Conference on Affective Computing and Intelligent Interaction (ACII), Oct. 2017, pp. 370–376, doi:
10.1109/ACII.2017.8273626.
[13] H. Zhu, Q. Zhou, J. Zhang, and J. Z. Wang, “Facial aging and rejuvenation by conditional multi-adversarial autoencoder with
ordinal regression,” arXiv:1804.02740, Apr. 2018.
[14] M. Westerlund, “The emergence of Deepfake technology: a review,” Technology Innovation Management Review, vol. 9, no. 11,
pp. 39–52, Jan. 2019, doi: 10.22215/timreview/1282.
[15] V. Mehta, P. Gupta, R. Subramanian, and A. Dhall, “FakeBuster: a deepfakes detection tool for video conferencing scenarios,” in
26th International Conference on Intelligent User Interfaces, Apr. 2021, pp. 61–63, doi: 10.1145/3397482.3450726.
[16] A. A. Pokroy and A. D. Egorov, “EfficientNets for DeepFake detection: comparison of pretrained models,” in 2021 IEEE
Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Jan. 2021, pp. 598–600, doi:
Int J Elec & Comp Eng ISSN: 2088-8708 
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2587
10.1109/ElConRus51938.2021.9396092.
[17] L. Guarnera, O. Giudice, C. Nastasi, and S. Battiato, “Preliminary forensics analysis of DeepFake images,” in 2020 AEIT
International Annual Conference (AEIT), Sep. 2020, pp. 1–6, doi: 10.23919/AEIT50178.2020.9241108.
[18] L. Verdoliva and P. Bestagini, “Multimedia forensics,” in Proceedings of the 27th ACM International Conference on Multimedia,
Oct. 2019, pp. 2701–2702, doi: 10.1145/3343031.3350542.
[19] M. Hogan, “Replicating reality advantages and limitations of weaponized deepfake technology PIPS.” The Project on
International Peace and Security, Global Research Institute, College of William & Mary, 2020.
[20] M. Koopman, A. M. Rodriguez, and Z. Geradts, “Detection of deepfake video manipulation,” in Proceedings of the 20th Irish
Machine Vision and Image Processing conference, 2018, pp. 133–136.
[21] Digital Science & Research Solutions Inc., “Number of research papers in terms of deepfake detection,” Dimensions.
https://app.dimensions.ai/discover/publication?search_mode=content&search_text=Deepfake
Detection&search_type=kws&search_field=full_search (accessed Nov. 05, 2021).
[22] W.-C. Yang, J. Jiang, and C.-H. Chen, “A fast source camera identification and verification method based on PRNU analysis for
use in video forensic investigations,” Multimedia Tools and Applications, vol. 80, no. 5, pp. 6617–6638, Feb. 2021, doi:
10.1007/s11042-020-09763-z.
[23] T. Pevný and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” in
Proceedings of SPIE-The International Society for Optical Engineering, Feb. 2008, doi: 10.1117/12.759155.
[24] K. Bahrami, A. C. Kot, Leida Li, and Haoliang Li, “Blurred image splicing localization by exposing blur type inconsistency,”
IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 999–1009, 2015, doi: 10.1109/TIFS.2015.2394231.
[25] S. Pertuz, D. Puig, and M. A. Garcia, “Analysis of focus measure operators for shape-from-focus,” Pattern Recognition, vol. 46,
no. 5. pp. 1415–1432, May 2013, doi: 10.1016/j.patcog.2012.11.011.
[26] X. Yang, Y. Li, and S. Lyu, “Exposing deep fakes using inconsistent head poses,” in 2019 IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), 2019, pp. 8261–8265, doi: 10.1109/ICASSP.2019.8683164.
BIOGRAPHIES OF AUTHORS
Wildan Jameel Hadi has received her bachelor’s degree in computer science
from Baghdad University in the year 2006. She has completed her master’s degree in
Computer Science from the University of Technology in the Year 2008. She is currently
pursuing her Ph.D. degree in computer science at Technology University, Iraq, and working in
the Department of Computer Science, College of Science for women, University of Baghdad,
Iraq. Her research interests include image processing, video analysis, deep learning, face
detection. She can be contacted at email: wildanjh_comp@csw.uobaghdad.edu.iq.
Suhad Malallah Kadhem has finished her Ph.D. in Computer Science from the
Department of Computer Science at the Technology University. She has completed her
bachelor’s and master’s degree in Computer Science from the University of Technology
(UOT), Baghdad, Iraq in 1997. Suhad is a faculty member in the Computer Science
Department at UOT since 1997, where she became the Head of the artificial intelligent branch
at UOT in 2003. Her research interests focus on artificial intelligence, natural language
processing (especially Arabic language processing), and computer security (especially
steganography). She can be contacted at email: 110102@uotechnology.edu.iq.
Ayad Rodhan Abbas has finished his Ph.D., Artificial Intelligent, Wuhan
University, School of Computer Science, China, 2009, M.SC., Computer Science, University
of Technology, Computer Science Department, Iraq, 2005, B.S., Computer Science,
University of Technology, Computer Science Department, Iraq, 2003, B.S., Chemical
Engineering, University of Baghdad, Chemical Engineering Department, Iraq, 1999. His
research interests focus on artificial intelligent, machine learning, natural language
processing, deep learning, data mining, web mining, information retrieval, soft computing,
E-learning, E-Commerce, and recommended system. He can be contacted at email:
110010@uotechnology.edu.iq.

More Related Content

Similar to Fast discrimination of fake video manipulation

Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
IRJET Journal
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
IRJET Journal
 
The power of_deep_learning_models_applications
The power of_deep_learning_models_applicationsThe power of_deep_learning_models_applications
The power of_deep_learning_models_applications
Drjabez
 
The power of deep learning models applications
The power of deep learning models applicationsThe power of deep learning models applications
The power of deep learning models applications
Sameera Sk
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
IJECEIAES
 
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
IRJET Journal
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
IJECEIAES
 
BTP Report.pdf
BTP Report.pdfBTP Report.pdf
BTP Report.pdf
niveditJain
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
 
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesEncry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
SoumyaShaw4
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
ijtsrd
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
vivatechijri
 
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
csandit
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for Animation
IRJET Journal
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET Journal
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
IRJET Journal
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
IJARIIT
 
76201950
7620195076201950
76201950
IJRAT
 

Similar to Fast discrimination of fake video manipulation (20)

Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
 
The power of_deep_learning_models_applications
The power of_deep_learning_models_applicationsThe power of_deep_learning_models_applications
The power of_deep_learning_models_applications
 
The power of deep learning models applications
The power of deep learning models applicationsThe power of deep learning models applications
The power of deep learning models applications
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
 
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
 
BTP Report.pdf
BTP Report.pdfBTP Report.pdf
BTP Report.pdf
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesEncry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in Images
 
A Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection TechniquesA Review on Various Forgery Detection Techniques
A Review on Various Forgery Detection Techniques
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
 
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
Motion capture for Animation
Motion capture for AnimationMotion capture for Animation
Motion capture for Animation
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
IRJET- Framework for Image Forgery Detection
IRJET-  	  Framework for Image Forgery DetectionIRJET-  	  Framework for Image Forgery Detection
IRJET- Framework for Image Forgery Detection
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
76201950
7620195076201950
76201950
 

More from IJECEIAES

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 

More from IJECEIAES (20)

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 

Recently uploaded

Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 

Recently uploaded (20)

Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 

Fast discrimination of fake video manipulation

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 12, No. 3, June 2022, pp. 2582~2587 ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2582-2587  2582 Journal homepage: http://ijece.iaescore.com Fast discrimination of fake video manipulation Wildan Jameel Hadi1 , Suhad Malallah Kadhem2 , Ayad Rodhan Abbas2 1 Department of Computer Science, Baghdad University, Baghdad, Iraq 2 Department of Computer Science, Al-Technology University, Baghdad, Iraq Article Info ABSTRACT Article history: Received Jul 28, 2021 Revised Nov 10, 2021 Accepted Nov 30, 2021 Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian group operators, as a value, may be lower or higher in the fake video than its value in the real video, depending on the quality of the fake video, so we cannot use them for deepfake detection and ii) the gradient-based measure (GRA7) decreases its value in the fake video in all cases, whether the fake video is of high or low quality and can help detect deepfake. Keywords: Deepfake Focus measures Multimedia forensics Video manipulation Visible artifacts This is an open access article under the CC BY-SA license. Corresponding Author: Wildan Jameel Hadi Department of Computer Science, Baghdad University Bagdad, Iraq Email: wildanjh_comp@csw.uobaghdad.edu.iq 1. INTRODUCTION At present, when we talk about artificial intelligence, we do not just mean a set of theories; on the contrary, it has entered many practical applications [1]–[6]. It has become an essential part of many industries. On the other hand, by looking at artificial intelligence algorithms that depend on deep learning, we see the potential of these algorithms to solve complex problems because they try to simulate the human mind. Also, with advanced deep learning techniques, tampering with media is possible, provided large amounts of data are obtained for training. The main concern here is using these artificial intelligence (AI) tools for malicious purposes, such as creating vulgar videos or creating false advertising campaigns. In recent years, fake multimedia has become a problem that must be focused on and solved, especially after the emergence of so-called deepfakes. Deepfakes are images and video clips that were tampered with using artificial intelligence [7], such as generative adversarial networks (GANs) [8]–[11] or auto encoders (AEs) [12], [13]. The term deepfake came from a Reddit user who converted celebrity faces into porn videos by developing a machine learning algorithm [14]. Technology companies and those responsible for social media platforms have made a wide effort to uncover so-called deepfakes attacks. For example, Microsoft designed software to detect deepfakes. This program checks the images and videos and then generates a percentage indicating the extent to which the input material is artificially created [15]. In 2019, Facebook announced the deepfake detection challenge (DFDC) in cooperation with major technology companies. This initiative stimulated the creation of new methods that detect deepfakes. They created a giant database of more than 100,000 videos [16]. Facebook also banned all the videos created using artificial intelligence in a way that
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Fast discrimination of fake video manipulation (Wildan Jameel Hadi) 2583 could not be detected by the users of this platform [17]. The defense advanced research projects agency (DARPA) and the air force research laboratory (AFRL) have funded the media forensics research project (MediFor), whose purpose is to find solutions and technologies to ensure the integrity of digital images and videos [18]. Three main components are considered in the MediFor program, namely: i) digital integrity, ii) physical integrity, and iii) semantic integrity [19]. In many cases, video evidence is assumed in criminal investigations to be reliable. But with the development of technology, where it became possible to tamper with videos, and audio recordings, it is likely soon to subject such evidence to a test to ensure its authenticity [20]. Therefore, finding ways to help detect deepfakes is of great importance to preserve the legitimacy of digital evidence. In this paper, we investigate the detection of these tampered video contents, especially deepfake videos. Our method uses four focus measures (Laplacian and gradient) to evaluate the amount of blur in the frames belonging to the fake video and compare it to the real video. We focus on assessing the amount of blurring because most deepfake applications use blurring to hide the border of the cropped face. Our contribution to this work can be summarized as follows: i) we use a simple way to detect the blurring residual in fake videos using the focus measures; ii) a small dataset is used to implement our work without using a large dataset for training; and iii) our method uses simple measures to detect the forgery instead of using deep learning methods, which do not easily detect blurring residuals. 2. RELATED WORK This section will briefly mention some of the works related to deepfake detection and focus on methods that explore artifacts in fake video frames. Concerning the detection of deepfakes, image manipulation is not a new problem that has been highlighted since the emergence of deepfakes; for example, image modification with Photoshop tools is being used up to the present day. Also, multimedia forensics science is still dealing with this problem [17]. Deepfake algorithms leave traces on media that are difficult to detect with the naked eye, so more research is devoted to helping detect deepfakes. Figure 1 shows the number of research papers that have provided solutions in the field of deepfake detection. Figure 1. The number of research papers that are implemented in terms of deepfake detection [21] Methods for detecting fakes in a video can be classified into two categories [7]: techniques that depend on temporal features and those that rely on visible artifacts within frames. We concentrate on the second type, which breaks down the video into frames and then works on each frame by searching for the visual artifacts to obtain distinctive properties or features and then feeding them to a classifier. For example, Koopman et al. [20] used photo response non-uniformity (PRNU) to detect deepfakes manipulation. The analysis of PRNU is an attractive method because it finds that tampering with the facial area region affects the local value of the PRNU pattern in video frames. This analysis is widely used in the field of video forensics [22]. Compression artifacts are also exploited in this area. It was found that when the manipulated JPEG-image is compressed a second time, the whole image has the effects of double compression, except for
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587 2584 the fake face area [23]. In addition to the defects generated by recompression, the process of deepfakes also generates a set of precious traces, which need post-processing operations to hide those traces or defects. Bahrami et al. [24] divided the blurred image into blocks to extract the characteristics of the blur type. Finally, these local blur characteristics are combined to classify the image blocks into motion or out of focus. These artifacts, especially the artifacts resulting from blurring the border of the fake face, were used in this experiment for detecting fakes in videos. 3. FOCUS MEASURES Focus measures (FM) are useful for the measurement of the amount of blur contained in an image. Pertuz et al. [25] divided these measures into six categories: gradient-based (GB) and Laplacian-based (LB) operators, which are based on the first derivative (gradient) and second derivative to measure the degree of focus and the number of edges found in the input image, respectively. Wavelet-based (WB) and DCT-based (DCT-B) operators use the fact that the coefficients of the discrete wavelet transform and discrete cosine transform can be used to measure the focus level. Statistics-based (SB) operators use image statistics to find focus levels. Finally, miscellaneous operators, which do not belong to any of the prior groups, can measure the amount of blur founded in the image. Our work was based on the focus measures operators mentioned in [25]. The selection fell on the Laplacian family because of its good performance in common imaging conditions. Also, we use the gradient-based operator because it showed promising results from among the 11 high-performance scales tested in [25]. We did not refer to other standards, such as deep cryogenic treatment (DCT), due to their dependence on their applications. All focus measures considered in this paper are presented in Table 1, along with their exact abbreviation from [25]. Table 1. Focus measures used and their abbreviation Focus Measure Abbr. Energy of Laplacian LAP1 Modified Laplacian LAP2 Diagonal Laplacian LAP3 Tenengrad Variance GRA7 4. METHOD 4.1. Dataset The dataset used in our experiment is the UADFV dataset [26]. It is simple and has only 49 videos with two classes, fake and real. Figure 2 shows a sample of this dataset. We use ten videos from this dataset to implement our experiment. (a) (b) Figure 2. Sample of the dataset used (a) is an example of deepfakes with low quality (notable edges), while (b) shows an example of deepfakes with high quality (polished edges) 4.2. Focus measure operators’ analysis Each video in the dataset is converted into a series of frames. This step is followed by cropping each frame into eight parts to apply the focus measure mentioned in Table 1 on each part. Figure 3 shows how to divide each frame into eight parts. Before applying the focus measure operators to the split image, the grayscale channel of the image is taken into consideration. After applying each measure on each part, the average value of the eight measure values is calculated for each frame image. This process is repeated for all video frames, whether real or fake, to calculate the final value of the focus measure operators.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Fast discrimination of fake video manipulation (Wildan Jameel Hadi) 2585 Figure 3. Overall steps for analyzing the quality of focus measures. The video frames are cropped into eight parts where an average value of the focus measure (FM) is calculated for each frame 5. RESULTS The focus measure for each video was calculated. Figures 4(a)-(d) show the results energy of Laplacian, modified Laplacian, Laplacian variance, and Tenengrad variance, respectively. From these results, we note that the values of the Laplacian-based operators were lower or higher than their values in the real video, depending on the number of edges present in the fake video. We know that the edges decrease as more blurring is applied to the image. (a) (b) (c) (d) Figure 4. The results of applying focus measure operators: (a) energy of Laplacian, (b) modified Laplacian, (c) Laplacian variance, and (d) Tenengrad variance, per fake videos against real one
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587 2586 By looking at the results achieved by the gradient-based operator, we find that the value of this measure is less than its value in a real video in all cases, whether the fake video is of high quality or low. The results indicate that we can use the gradient-based measure to detect deepfakes. This explains the algorithm’s performance in terms of deepfake detection. As for time, the response time of a single video is measured in seconds, so if we compare the time taken for all videos, it is negligible in relation to the time taken by deep learning-based methods. 6. CONCLUSION In this analysis, a methodology for deepfake detection is suggested. Our method exploits the visible artifacts (blur inconsistencies) generated via post-processing steps applied on fake videos. Compared to other methods that use deep learning, our method does not require high computational power and extensive data for training. Still, it is based only on the comparison of the performance of various focus measure operators. The selection of operators has been chosen after a comprehensive review of the results of much recent literature. Four focus measure operators are selected to evaluate the degree of focus between fake videos and real ones. Various mathematical principles were used in the analysis and testing of the focus measure operators. Out of 36 operators, the best four operators were selected to analyze and compare their performance. The selection fell on the Laplacian family and the gradient-based operator. Experiments have been implemented on a test set of both fake and real videos. Experiments showed that the values of the Laplacian-based operators were lower or higher than their values in the real video, depending on the number of edges present in the fake video. This means the Laplacian family cannot be used in deepfake detection. On the other hand, the gradient-based measure (GRA7) can distinguish fake videos from real ones. The dataset used in our experiment is overly small to subedit guidelines for likelihood ratios, as is desired in forensic sciences. Nevertheless, we have a simple collection of the focus measures. However, better results could have been achieved with more complex collection strategies. Due to the increasing sophistication of deepfake technology, it becomes necessary to keep pace with these developments and establish robust detection methods. Because the multimedia forensic tools worked on studying and detecting malicious manipulations in multimedia content before the occurrence of deep learning technology, so it was necessary to take advantage of these methods and combine them with deep learning techniques to build a strong detection model. REFERENCES [1] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Classifying political arabic articles using support vector machine with different feature extraction,” in Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 79–94. [2] A. R. Abbas and A. O. Farooq, “Human skin colour detection using bayesian rough decision tree,” in Communications in Computer and Information Science, Springer International Publishing, 2018, pp. 240–254. [3] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Political articles categorization based on different naïve bayes models,” in Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 286–301. [4] E. A. Kadhim, H. B. A. Wahab, and M. Suhad, “Proposed approach for key generation based on elliptic curve (EC) algebra and metaheuristic algorithms,” Engineering Technology Journal, vol. 32, no. 2, pp. 333–346, 2014. [5] A. T. Sadiq and A. G. Hamad, “BSA: a hybrid bees’ simulated annealing algorithm to solve optimization and NP-complete problems,” Engineering Technology Journal, vol. 28, no. 2, pp. 271–281, 2010. [6] H. H. Salih, A. T. Sadiq, and I. K. Ali, “Attack on the Simple Substitution Ciphers Using Particle Swarm Optimization,” Eng. & Tech. Journal, vol. 28, no. 11, 2010. [7] L. Verdoliva, “Media forensics and DeepFakes: an overview,” IEEE Journal of Selected Topics in Signal Processing, vol. 14, no. 5, pp. 910–932, Aug. 2020, doi: 10.1109/JSTSP.2020.3002101. [8] X. Mao and Q. Li, Generative adversarial networks for image generation. Singapore: Springer Singapore, 2021. [9] X. Wang, W. Li, G. Mu, D. Huang, and Y. Wang, “Facial expression synthesis by U-Net conditional generative adversarial networks,” in Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, Jun. 2018, pp. 283–290, doi: 10.1145/3206025.3206068. [10] T. Karras, S. Laine, and T. Aila, “A style-based generator architecture for generative adversarial networks,” in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2019, pp. 4396–4405, doi: 10.1109/CVPR.2019.00453. [11] Y. Yu, Z. Gong, P. Zhong, and J. Shan, “Unsupervised representation learning with deep convolutional neural network for remote sensing images,” in International Conference on Image and Graphics, 2017, pp. 97–108. [12] Y. Zhou and B. E. Shi, “Photorealistic facial expression synthesis by the conditional difference adversarial autoencoder,” in 2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII), Oct. 2017, pp. 370–376, doi: 10.1109/ACII.2017.8273626. [13] H. Zhu, Q. Zhou, J. Zhang, and J. Z. Wang, “Facial aging and rejuvenation by conditional multi-adversarial autoencoder with ordinal regression,” arXiv:1804.02740, Apr. 2018. [14] M. Westerlund, “The emergence of Deepfake technology: a review,” Technology Innovation Management Review, vol. 9, no. 11, pp. 39–52, Jan. 2019, doi: 10.22215/timreview/1282. [15] V. Mehta, P. Gupta, R. Subramanian, and A. Dhall, “FakeBuster: a deepfakes detection tool for video conferencing scenarios,” in 26th International Conference on Intelligent User Interfaces, Apr. 2021, pp. 61–63, doi: 10.1145/3397482.3450726. [16] A. A. Pokroy and A. D. Egorov, “EfficientNets for DeepFake detection: comparison of pretrained models,” in 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Jan. 2021, pp. 598–600, doi:
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Fast discrimination of fake video manipulation (Wildan Jameel Hadi) 2587 10.1109/ElConRus51938.2021.9396092. [17] L. Guarnera, O. Giudice, C. Nastasi, and S. Battiato, “Preliminary forensics analysis of DeepFake images,” in 2020 AEIT International Annual Conference (AEIT), Sep. 2020, pp. 1–6, doi: 10.23919/AEIT50178.2020.9241108. [18] L. Verdoliva and P. Bestagini, “Multimedia forensics,” in Proceedings of the 27th ACM International Conference on Multimedia, Oct. 2019, pp. 2701–2702, doi: 10.1145/3343031.3350542. [19] M. Hogan, “Replicating reality advantages and limitations of weaponized deepfake technology PIPS.” The Project on International Peace and Security, Global Research Institute, College of William & Mary, 2020. [20] M. Koopman, A. M. Rodriguez, and Z. Geradts, “Detection of deepfake video manipulation,” in Proceedings of the 20th Irish Machine Vision and Image Processing conference, 2018, pp. 133–136. [21] Digital Science & Research Solutions Inc., “Number of research papers in terms of deepfake detection,” Dimensions. https://app.dimensions.ai/discover/publication?search_mode=content&search_text=Deepfake Detection&search_type=kws&search_field=full_search (accessed Nov. 05, 2021). [22] W.-C. Yang, J. Jiang, and C.-H. Chen, “A fast source camera identification and verification method based on PRNU analysis for use in video forensic investigations,” Multimedia Tools and Applications, vol. 80, no. 5, pp. 6617–6638, Feb. 2021, doi: 10.1007/s11042-020-09763-z. [23] T. Pevný and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” in Proceedings of SPIE-The International Society for Optical Engineering, Feb. 2008, doi: 10.1117/12.759155. [24] K. Bahrami, A. C. Kot, Leida Li, and Haoliang Li, “Blurred image splicing localization by exposing blur type inconsistency,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 999–1009, 2015, doi: 10.1109/TIFS.2015.2394231. [25] S. Pertuz, D. Puig, and M. A. Garcia, “Analysis of focus measure operators for shape-from-focus,” Pattern Recognition, vol. 46, no. 5. pp. 1415–1432, May 2013, doi: 10.1016/j.patcog.2012.11.011. [26] X. Yang, Y. Li, and S. Lyu, “Exposing deep fakes using inconsistent head poses,” in 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019, pp. 8261–8265, doi: 10.1109/ICASSP.2019.8683164. BIOGRAPHIES OF AUTHORS Wildan Jameel Hadi has received her bachelor’s degree in computer science from Baghdad University in the year 2006. She has completed her master’s degree in Computer Science from the University of Technology in the Year 2008. She is currently pursuing her Ph.D. degree in computer science at Technology University, Iraq, and working in the Department of Computer Science, College of Science for women, University of Baghdad, Iraq. Her research interests include image processing, video analysis, deep learning, face detection. She can be contacted at email: wildanjh_comp@csw.uobaghdad.edu.iq. Suhad Malallah Kadhem has finished her Ph.D. in Computer Science from the Department of Computer Science at the Technology University. She has completed her bachelor’s and master’s degree in Computer Science from the University of Technology (UOT), Baghdad, Iraq in 1997. Suhad is a faculty member in the Computer Science Department at UOT since 1997, where she became the Head of the artificial intelligent branch at UOT in 2003. Her research interests focus on artificial intelligence, natural language processing (especially Arabic language processing), and computer security (especially steganography). She can be contacted at email: 110102@uotechnology.edu.iq. Ayad Rodhan Abbas has finished his Ph.D., Artificial Intelligent, Wuhan University, School of Computer Science, China, 2009, M.SC., Computer Science, University of Technology, Computer Science Department, Iraq, 2005, B.S., Computer Science, University of Technology, Computer Science Department, Iraq, 2003, B.S., Chemical Engineering, University of Baghdad, Chemical Engineering Department, Iraq, 1999. His research interests focus on artificial intelligent, machine learning, natural language processing, deep learning, data mining, web mining, information retrieval, soft computing, E-learning, E-Commerce, and recommended system. He can be contacted at email: 110010@uotechnology.edu.iq.