Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian group operators, as a value, may be lower or higher in the fake video than its value in the real video, depending on the quality of the fake video, so we cannot use them for deepfake detection and ii) the gradient-based measure (GRA7) decreases its value in the fake video in all cases, whether the fake video is of high or low quality and can help detect deepfake.
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfake detection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection of deepfakes, and iii) finally how in the future incorporating both deep learning technology and tools for forensics can increase the efficiency of deepfakes detection.
A SURVEY ON DEEPFAKES CREATION AND DETECTIONIRJET Journal
This document summarizes a survey on deepfake creation and detection techniques. It discusses four types of facial manipulations used in deepfakes: entire face synthesis, identity swap, attribute manipulation, and expression swap. Common deepfake generation techniques using autoencoders, GANs, and encoder-decoder pairs are described. Methods for detecting deepfakes include examining sequential attributes across video frames for anomalies and using deep learning to analyze individual frames. Challenges in detecting high-quality GAN-generated deepfakes are also noted. In conclusion, detection techniques continue improving but generating realistic deepfakes remains difficult to definitively verify.
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
Noteworthy advancements in the field of deep learning have led to the rise of highly realistic AI generated fake videos, these videos are commonly known as Deepfakes. They refer to manipulated videos, that are generated by sophisticated AI, that yield formed videos and tones that seem to be original. Although this technology has numerous beneficial applications, there are also significant concerns about the disadvantages of the same. So there is a need to develop a system that would detect and mitigate the negative impact of these AI generated videos on society. The videos that get transferred through social media are of low quality, so the detection of such videos becomes difficult. Many researchers in the past have done analysis on Deepfake detection which were based on Machine Learning, Support Vector Machine and Deep Learning based techniques such as Convolution Neural Network with or without LSTM .This paper analyses various techniques that are used by several researchers to detect Deepfake videos.
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
This document presents a neural network approach for detecting deepfake videos. Deepfakes are videos generated using artificial intelligence that can make people appear to say or do things they did not actually say or do. The proposed system uses a convolutional neural network (CNN) to extract frame-level features from videos, which are then used to train a recurrent neural network (RNN) to classify whether a video has been manipulated or not. The system aims to detect inconsistencies in deepfake videos caused during their creation. It is tested on several public deepfake datasets and shows potential for achieving competitive results in detecting such manipulated media.
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
This document discusses a method for detecting deepfake videos using image processing and hashing tools. Deepfake videos are digital videos that have been manipulated, often using machine learning, to deceive viewers. The proposed method uses Django tools and the MD5 hashing algorithm to analyze sample deepfake videos and detect manipulations. It aims to provide an easy and affordable way to identify deepfakes. The document provides background on how deepfakes are generated using techniques like autoencoders and generative adversarial networks. It also discusses potential applications and issues related to deepfakes, such as their use in pornography, politics, and compromising forensic evidence.
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
This document discusses applications of image and video deduplication techniques. It begins by providing background on the growth of multimedia data and need for deduplication to reduce redundant data. It then describes key aspects of image and video deduplication, including extracting fingerprints from images and frames to identify duplicates. The document reviews several studies on image and video deduplication applications, such as identifying near-duplicate images on social media, detecting spoofed face images, verifying image copy detection, and eliminating near-duplicates from visual sensor networks. Overall, the document surveys various real-world implementations of image and video deduplication.
Fake Video Creation and Detection: A ReviewIRJET Journal
This document summarizes research on fake video creation and detection using deep learning techniques. It discusses how advances in deep learning, particularly generative adversarial networks (GANs), have made it easier to generate realistic fake videos but also pose risks if misused. The document reviews methods for creating fake videos, such as face swapping and face reenactment using autoencoders, as well as methods for detecting fake videos by examining visual artifacts in frames or temporal inconsistencies across frames using classifiers like CNNs. Overall, the document provides an overview of the state of deepfake video generation and detection.
This document discusses a face mask detection system using machine learning. It presents an approach using TensorFlow, Keras, OpenCV and Scikit-Learn to detect if people in images are wearing masks. The method achieves 95.77% and 94.58% accuracy on two datasets. It involves preprocessing data, augmenting the datasets, training and testing a model for image segmentation to detect masks. The system could help monitor if people are following mask guidelines during the COVID-19 pandemic.
A survey of deepfakes in terms of deep learning and multimedia forensicsIJECEIAES
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfake detection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection of deepfakes, and iii) finally how in the future incorporating both deep learning technology and tools for forensics can increase the efficiency of deepfakes detection.
A SURVEY ON DEEPFAKES CREATION AND DETECTIONIRJET Journal
This document summarizes a survey on deepfake creation and detection techniques. It discusses four types of facial manipulations used in deepfakes: entire face synthesis, identity swap, attribute manipulation, and expression swap. Common deepfake generation techniques using autoencoders, GANs, and encoder-decoder pairs are described. Methods for detecting deepfakes include examining sequential attributes across video frames for anomalies and using deep learning to analyze individual frames. Challenges in detecting high-quality GAN-generated deepfakes are also noted. In conclusion, detection techniques continue improving but generating realistic deepfakes remains difficult to definitively verify.
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
Noteworthy advancements in the field of deep learning have led to the rise of highly realistic AI generated fake videos, these videos are commonly known as Deepfakes. They refer to manipulated videos, that are generated by sophisticated AI, that yield formed videos and tones that seem to be original. Although this technology has numerous beneficial applications, there are also significant concerns about the disadvantages of the same. So there is a need to develop a system that would detect and mitigate the negative impact of these AI generated videos on society. The videos that get transferred through social media are of low quality, so the detection of such videos becomes difficult. Many researchers in the past have done analysis on Deepfake detection which were based on Machine Learning, Support Vector Machine and Deep Learning based techniques such as Convolution Neural Network with or without LSTM .This paper analyses various techniques that are used by several researchers to detect Deepfake videos.
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
This document presents a neural network approach for detecting deepfake videos. Deepfakes are videos generated using artificial intelligence that can make people appear to say or do things they did not actually say or do. The proposed system uses a convolutional neural network (CNN) to extract frame-level features from videos, which are then used to train a recurrent neural network (RNN) to classify whether a video has been manipulated or not. The system aims to detect inconsistencies in deepfake videos caused during their creation. It is tested on several public deepfake datasets and shows potential for achieving competitive results in detecting such manipulated media.
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
This document discusses a method for detecting deepfake videos using image processing and hashing tools. Deepfake videos are digital videos that have been manipulated, often using machine learning, to deceive viewers. The proposed method uses Django tools and the MD5 hashing algorithm to analyze sample deepfake videos and detect manipulations. It aims to provide an easy and affordable way to identify deepfakes. The document provides background on how deepfakes are generated using techniques like autoencoders and generative adversarial networks. It also discusses potential applications and issues related to deepfakes, such as their use in pornography, politics, and compromising forensic evidence.
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
This document discusses applications of image and video deduplication techniques. It begins by providing background on the growth of multimedia data and need for deduplication to reduce redundant data. It then describes key aspects of image and video deduplication, including extracting fingerprints from images and frames to identify duplicates. The document reviews several studies on image and video deduplication applications, such as identifying near-duplicate images on social media, detecting spoofed face images, verifying image copy detection, and eliminating near-duplicates from visual sensor networks. Overall, the document surveys various real-world implementations of image and video deduplication.
Fake Video Creation and Detection: A ReviewIRJET Journal
This document summarizes research on fake video creation and detection using deep learning techniques. It discusses how advances in deep learning, particularly generative adversarial networks (GANs), have made it easier to generate realistic fake videos but also pose risks if misused. The document reviews methods for creating fake videos, such as face swapping and face reenactment using autoencoders, as well as methods for detecting fake videos by examining visual artifacts in frames or temporal inconsistencies across frames using classifiers like CNNs. Overall, the document provides an overview of the state of deepfake video generation and detection.
This document discusses a face mask detection system using machine learning. It presents an approach using TensorFlow, Keras, OpenCV and Scikit-Learn to detect if people in images are wearing masks. The method achieves 95.77% and 94.58% accuracy on two datasets. It involves preprocessing data, augmenting the datasets, training and testing a model for image segmentation to detect masks. The system could help monitor if people are following mask guidelines during the COVID-19 pandemic.
Deep Learning Assisted Tool for Face Mask DetectionIRJET Journal
This document presents a deep learning model for face mask detection. The model was developed using TensorFlow and Keras with a MobileNetV2 architecture. It involves collecting a dataset of images with and without masks, preprocessing the data, training a classifier to identify masks, and applying the trained model to detect masks in real-time video. The model analyzes each detected face and places a colored box around it to indicate if a mask is detected or not. Evaluation on test data showed the model achieved accurate mask detection from video streams in real-time.
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
This document describes a system that uses computer vision and machine learning to detect if individuals are wearing masks and maintaining proper social distancing in public places. The system uses a Raspberry Pi connected to a USB camera to take photos and video. Convolutional neural network models like CNN and YOLO are used to analyze the images, detect faces, and determine if masks are being worn correctly. If individuals are not wearing masks or social distancing, the system will provide an alert or sound from a connected speaker. The goal is to help enforce mask and distancing guidelines without needing human monitoring, in order to reduce virus spread during the COVID-19 pandemic.
The power of_deep_learning_models_applicationsDrjabez
This document discusses various applications of deep learning, including image processing, speech synthesis, sound generation, and video processing. It describes how generative adversarial networks (GANs) have been highly effective for image-to-image synthesis and style transfer. GANs have also shown promise for applications like steganography. The document also reviews recent work using deep learning for tasks like speech synthesis, generating sounds from videos, and video-to-video synthesis. Overall, the document provides examples of the power and versatility of deep learning across multiple domains.
The power of deep learning models applicationsSameera Sk
I have performed a detailed analysis of recent advances in deep-learning based research efforts applied in the domains of Image Processing, Audio Processing and Video Processing. I have identified 25 relevant papers and 17 web resources, examining the particular area and problem they address, models employed, datasets used and the images from respective papers are reproduced with proper citation.
i hope this information is useful who are doing research in this area.
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
This document reviews existing techniques for image forensics and their effectiveness. It discusses common image attacks like splicing, copy-move, and retouching. It explores research trends in tools, databases, and techniques used. While various techniques have been proposed, the document finds that most focus on splicing and copy-move attacks. It concludes there are still significant gaps in evaluating techniques' real-world effectiveness against the wide variety of possible attacks.
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...IRJET Journal
This document summarizes research on using a Generative Adversarial Network (GAN) called Cartoon GAN to transform real-world images and videos into cartoon images and videos. The researchers trained Cartoon GAN on 3000 real-world images to learn how to generate cartoon images by using content and adversarial loss functions. They were able to successfully convert both individual images and video clips into cartoon/animated versions. For video, they used the OpenCV library to divide videos into frames, pass each frame through the trained Cartoon GAN model, and then recombine the cartoonized frames into an output cartoon video. The researchers concluded that Cartoon GAN is an effective method for automatically transforming real media into cartoons and aims to improve the quality and resolution
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
1. The document summarizes a student project that aims to create a virtual try-on application using augmented reality. It surveys existing methods for tasks like clothing segmentation, human pose estimation, and virtual try-on that could be used to build the application.
2. It discusses approaches the students investigated like using depth cameras for measurements, non-depth based methods using computer vision, parsing clothes and humans, and existing work on 2D virtual try-on.
3. The students implemented initial modules for their pipeline including a U-Net for clothing segmentation trained on images and masks from the Viton dataset.
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
1. The document proposes a system using object and color recognition and convolutional neural networks to enhance the capabilities of visually impaired people.
2. The system uses a camera mounted on glasses to capture images which are then preprocessed, compressed, and used to train a classifier model to recognize common objects.
3. The proposed hardware implementation uses a Raspberry Pi for its small size and open source software support, including TensorFlow for training convolutional neural network models.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesSoumyaShaw4
We attempt to mystify the metadata that includes the location coordinates to address the privacy concern. We put forward an algorithm that performs randomized location hopping to compromise the algorithms targeted to extract sensitive data. The idea is to hide sensitive information that might be used otherwise without user knowledge.
A Review on Various Forgery Detection Techniquesijtsrd
This document provides a review of various techniques for detecting digital image forgeries. It begins by discussing the importance of authenticating digital images and the rise of image manipulation. The main types of forgeries are described as copy-move, image splicing, and image retouching. Techniques for forgery detection are classified as active/intrusive or passive/non-intrusive. Key passive techniques discussed include pixel-based analysis of statistical anomalies, format-based analysis exploiting properties of file formats like JPEG, and camera-based analysis of camera-related features. The document then focuses on copy-move forgery detection, outlining the general workflow and reviewing block-based and key-point based matching approaches. Specific algorithms
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...csandit
The paper introduces a case study of design and implementation of Intel-sponsored real-time
face detection system conducted in University of Michigan—Shanghai Jiao Tong University
Joint Institute (JI). This work is teamed up totally by 15 JI students and developed in three
phases during 2013 and 2014. The system design of face detection is based on Intel High
Definition (HD) 4000 graphics and OpenCL. With numerous techniques including the
accelerated pipeline over CPU and GPU, image decomposition, two-dimensional (2D) task
allocation, and the combination of Viola-Jones algorithm and continuously adaptive mean-shift
(Camshift) algorithm, the speed reaches 32 fps for real-time multi-view face detection. Plus, the
frontal view detection accuracy obtains 81% in Phase I and reaches 95% for multi-view
detection, in Phase III. Furthermore, an innovative application called face-detection game
controller (FDGC) is developed. At the time of this writing, the technology has been
implemented in wearable devices and mobile with Intel cores.
1) The document discusses copy-move forgery detection using the Discrete Wavelet Transform (DWT) method. Copy-move forgery involves copying and pasting a part of an image within the same image to conceal information.
2) Previous work has used the PCA algorithm to detect incompatible pixels, but this study proposes using the DWT and GLCM algorithms instead. The proposed algorithm is tested in MATLAB and evaluated based on PSNR and MSE values.
3) The study finds that the proposed DWT and GLCM algorithm performs better than the previous PCA-only approach, providing more accurate forgery detection while maintaining good performance metrics.
The document discusses using artificial intelligence and machine learning for lower-cost motion capture animation. It proposes a system that uses OpenCV and Unity to extract coordinates from uploaded video frames and generate animated character models without expensive motion capture suits. A Python script would detect 33 body points from a video and save the coordinates to a text file. Unity software would then use those coordinates to create animated spheres representing the body points and linking them to form a moving skeleton. The goal is to use AI and external software to enable affordable and innovative motion capture for the general public.
Real Time Moving Object Detection for Day-Night Surveillance using AIIRJET Journal
This document presents a project to develop a web application for real-time moving object detection for both day and night surveillance using artificial intelligence. The application can detect objects in images, videos, and real-time video streams from a user's device. It implements computer vision techniques using OpenCV for image processing. A YOLOv4 deep learning model is trained on a dataset containing dark images to enable nighttime object detection. The trained model is deployed as a web app using Streamlit and hosted on Heroku to be accessible across different devices and operating systems. The project aims to provide a solution for various object detection and image processing tasks.
IRJET- Framework for Image Forgery DetectionIRJET Journal
The document proposes a framework for detecting image forgeries using optical flow and stable parameters. It begins with coarse detection to find suspected tampered points by analyzing optical flow sum consistency. Then it performs fine detection for precise location of forgeries, including duplicated frame pair matching based on optical flow correlation and validation checks to reduce false detections. The framework is designed to balance detection efficiency, robustness, and applicability.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Fast discrimination of fake video manipulation
Deep Learning Assisted Tool for Face Mask DetectionIRJET Journal
This document presents a deep learning model for face mask detection. The model was developed using TensorFlow and Keras with a MobileNetV2 architecture. It involves collecting a dataset of images with and without masks, preprocessing the data, training a classifier to identify masks, and applying the trained model to detect masks in real-time video. The model analyzes each detected face and places a colored box around it to indicate if a mask is detected or not. Evaluation on test data showed the model achieved accurate mask detection from video streams in real-time.
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
This document describes a system that uses computer vision and machine learning to detect if individuals are wearing masks and maintaining proper social distancing in public places. The system uses a Raspberry Pi connected to a USB camera to take photos and video. Convolutional neural network models like CNN and YOLO are used to analyze the images, detect faces, and determine if masks are being worn correctly. If individuals are not wearing masks or social distancing, the system will provide an alert or sound from a connected speaker. The goal is to help enforce mask and distancing guidelines without needing human monitoring, in order to reduce virus spread during the COVID-19 pandemic.
The power of_deep_learning_models_applicationsDrjabez
This document discusses various applications of deep learning, including image processing, speech synthesis, sound generation, and video processing. It describes how generative adversarial networks (GANs) have been highly effective for image-to-image synthesis and style transfer. GANs have also shown promise for applications like steganography. The document also reviews recent work using deep learning for tasks like speech synthesis, generating sounds from videos, and video-to-video synthesis. Overall, the document provides examples of the power and versatility of deep learning across multiple domains.
The power of deep learning models applicationsSameera Sk
I have performed a detailed analysis of recent advances in deep-learning based research efforts applied in the domains of Image Processing, Audio Processing and Video Processing. I have identified 25 relevant papers and 17 web resources, examining the particular area and problem they address, models employed, datasets used and the images from respective papers are reproduced with proper citation.
i hope this information is useful who are doing research in this area.
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
This document reviews existing techniques for image forensics and their effectiveness. It discusses common image attacks like splicing, copy-move, and retouching. It explores research trends in tools, databases, and techniques used. While various techniques have been proposed, the document finds that most focus on splicing and copy-move attacks. It concludes there are still significant gaps in evaluating techniques' real-world effectiveness against the wide variety of possible attacks.
IRJET- Transformation of Realistic Images and Videos into Cartoon Images and ...IRJET Journal
This document summarizes research on using a Generative Adversarial Network (GAN) called Cartoon GAN to transform real-world images and videos into cartoon images and videos. The researchers trained Cartoon GAN on 3000 real-world images to learn how to generate cartoon images by using content and adversarial loss functions. They were able to successfully convert both individual images and video clips into cartoon/animated versions. For video, they used the OpenCV library to divide videos into frames, pass each frame through the trained Cartoon GAN model, and then recombine the cartoonized frames into an output cartoon video. The researchers concluded that Cartoon GAN is an effective method for automatically transforming real media into cartoons and aims to improve the quality and resolution
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
1. The document summarizes a student project that aims to create a virtual try-on application using augmented reality. It surveys existing methods for tasks like clothing segmentation, human pose estimation, and virtual try-on that could be used to build the application.
2. It discusses approaches the students investigated like using depth cameras for measurements, non-depth based methods using computer vision, parsing clothes and humans, and existing work on 2D virtual try-on.
3. The students implemented initial modules for their pipeline including a U-Net for clothing segmentation trained on images and masks from the Viton dataset.
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
1. The document proposes a system using object and color recognition and convolutional neural networks to enhance the capabilities of visually impaired people.
2. The system uses a camera mounted on glasses to capture images which are then preprocessed, compressed, and used to train a classifier model to recognize common objects.
3. The proposed hardware implementation uses a Raspberry Pi for its small size and open source software support, including TensorFlow for training convolutional neural network models.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesSoumyaShaw4
We attempt to mystify the metadata that includes the location coordinates to address the privacy concern. We put forward an algorithm that performs randomized location hopping to compromise the algorithms targeted to extract sensitive data. The idea is to hide sensitive information that might be used otherwise without user knowledge.
A Review on Various Forgery Detection Techniquesijtsrd
This document provides a review of various techniques for detecting digital image forgeries. It begins by discussing the importance of authenticating digital images and the rise of image manipulation. The main types of forgeries are described as copy-move, image splicing, and image retouching. Techniques for forgery detection are classified as active/intrusive or passive/non-intrusive. Key passive techniques discussed include pixel-based analysis of statistical anomalies, format-based analysis exploiting properties of file formats like JPEG, and camera-based analysis of camera-related features. The document then focuses on copy-move forgery detection, outlining the general workflow and reviewing block-based and key-point based matching approaches. Specific algorithms
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
DESIGN AND IMPLEMENTATION OF INTEL-SPONSORED REAL-TIME MULTIVIEW FACE DETECTI...csandit
The paper introduces a case study of design and implementation of Intel-sponsored real-time
face detection system conducted in University of Michigan—Shanghai Jiao Tong University
Joint Institute (JI). This work is teamed up totally by 15 JI students and developed in three
phases during 2013 and 2014. The system design of face detection is based on Intel High
Definition (HD) 4000 graphics and OpenCL. With numerous techniques including the
accelerated pipeline over CPU and GPU, image decomposition, two-dimensional (2D) task
allocation, and the combination of Viola-Jones algorithm and continuously adaptive mean-shift
(Camshift) algorithm, the speed reaches 32 fps for real-time multi-view face detection. Plus, the
frontal view detection accuracy obtains 81% in Phase I and reaches 95% for multi-view
detection, in Phase III. Furthermore, an innovative application called face-detection game
controller (FDGC) is developed. At the time of this writing, the technology has been
implemented in wearable devices and mobile with Intel cores.
1) The document discusses copy-move forgery detection using the Discrete Wavelet Transform (DWT) method. Copy-move forgery involves copying and pasting a part of an image within the same image to conceal information.
2) Previous work has used the PCA algorithm to detect incompatible pixels, but this study proposes using the DWT and GLCM algorithms instead. The proposed algorithm is tested in MATLAB and evaluated based on PSNR and MSE values.
3) The study finds that the proposed DWT and GLCM algorithm performs better than the previous PCA-only approach, providing more accurate forgery detection while maintaining good performance metrics.
The document discusses using artificial intelligence and machine learning for lower-cost motion capture animation. It proposes a system that uses OpenCV and Unity to extract coordinates from uploaded video frames and generate animated character models without expensive motion capture suits. A Python script would detect 33 body points from a video and save the coordinates to a text file. Unity software would then use those coordinates to create animated spheres representing the body points and linking them to form a moving skeleton. The goal is to use AI and external software to enable affordable and innovative motion capture for the general public.
Real Time Moving Object Detection for Day-Night Surveillance using AIIRJET Journal
This document presents a project to develop a web application for real-time moving object detection for both day and night surveillance using artificial intelligence. The application can detect objects in images, videos, and real-time video streams from a user's device. It implements computer vision techniques using OpenCV for image processing. A YOLOv4 deep learning model is trained on a dataset containing dark images to enable nighttime object detection. The trained model is deployed as a web app using Streamlit and hosted on Heroku to be accessible across different devices and operating systems. The project aims to provide a solution for various object detection and image processing tasks.
IRJET- Framework for Image Forgery DetectionIRJET Journal
The document proposes a framework for detecting image forgeries using optical flow and stable parameters. It begins with coarse detection to find suspected tampered points by analyzing optical flow sum consistency. Then it performs fine detection for precise location of forgeries, including duplicated frame pair matching based on optical flow correlation and validation checks to reduce false detections. The framework is designed to balance detection efficiency, robustness, and applicability.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 2582~2587
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2582-2587 2582
Journal homepage: http://ijece.iaescore.com
Fast discrimination of fake video manipulation
Wildan Jameel Hadi1
, Suhad Malallah Kadhem2
, Ayad Rodhan Abbas2
1
Department of Computer Science, Baghdad University, Baghdad, Iraq
2
Department of Computer Science, Al-Technology University, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jul 28, 2021
Revised Nov 10, 2021
Accepted Nov 30, 2021
Deepfakes have become possible using artificial intelligence techniques,
replacing one person’s face with another person’s face (primarily a public
figure), making the latter do or say things he would not have done.
Therefore, contributing to a solution for video credibility has become a
critical goal that we will address in this paper. Our work exploits the visible
artifacts (blur inconsistencies) which are generated by the manipulation
process. We analyze focus quality and its ability to detect these artifacts.
Focus measure operators in this paper include image Laplacian and image
gradient groups, which are very fast to compute and do not need a large
dataset for training. The results showed that i) the Laplacian group operators,
as a value, may be lower or higher in the fake video than its value in the real
video, depending on the quality of the fake video, so we cannot use them for
deepfake detection and ii) the gradient-based measure (GRA7) decreases its
value in the fake video in all cases, whether the fake video is of high or low
quality and can help detect deepfake.
Keywords:
Deepfake
Focus measures
Multimedia forensics
Video manipulation
Visible artifacts
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wildan Jameel Hadi
Department of Computer Science, Baghdad University
Bagdad, Iraq
Email: wildanjh_comp@csw.uobaghdad.edu.iq
1. INTRODUCTION
At present, when we talk about artificial intelligence, we do not just mean a set of theories; on the
contrary, it has entered many practical applications [1]–[6]. It has become an essential part of many
industries. On the other hand, by looking at artificial intelligence algorithms that depend on deep learning, we
see the potential of these algorithms to solve complex problems because they try to simulate the human mind.
Also, with advanced deep learning techniques, tampering with media is possible, provided large amounts of
data are obtained for training. The main concern here is using these artificial intelligence (AI) tools for
malicious purposes, such as creating vulgar videos or creating false advertising campaigns. In recent years,
fake multimedia has become a problem that must be focused on and solved, especially after the emergence of
so-called deepfakes. Deepfakes are images and video clips that were tampered with using artificial
intelligence [7], such as generative adversarial networks (GANs) [8]–[11] or auto encoders (AEs) [12], [13].
The term deepfake came from a Reddit user who converted celebrity faces into porn videos by
developing a machine learning algorithm [14]. Technology companies and those responsible for social media
platforms have made a wide effort to uncover so-called deepfakes attacks. For example, Microsoft designed
software to detect deepfakes. This program checks the images and videos and then generates a percentage
indicating the extent to which the input material is artificially created [15]. In 2019, Facebook announced the
deepfake detection challenge (DFDC) in cooperation with major technology companies. This initiative
stimulated the creation of new methods that detect deepfakes. They created a giant database of more than
100,000 videos [16]. Facebook also banned all the videos created using artificial intelligence in a way that
2. Int J Elec & Comp Eng ISSN: 2088-8708
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2583
could not be detected by the users of this platform [17]. The defense advanced research projects agency
(DARPA) and the air force research laboratory (AFRL) have funded the media forensics research project
(MediFor), whose purpose is to find solutions and technologies to ensure the integrity of digital images and
videos [18]. Three main components are considered in the MediFor program, namely: i) digital integrity,
ii) physical integrity, and iii) semantic integrity [19].
In many cases, video evidence is assumed in criminal investigations to be reliable. But with the
development of technology, where it became possible to tamper with videos, and audio recordings, it is likely
soon to subject such evidence to a test to ensure its authenticity [20]. Therefore, finding ways to help detect
deepfakes is of great importance to preserve the legitimacy of digital evidence.
In this paper, we investigate the detection of these tampered video contents, especially deepfake
videos. Our method uses four focus measures (Laplacian and gradient) to evaluate the amount of blur in the
frames belonging to the fake video and compare it to the real video. We focus on assessing the amount of
blurring because most deepfake applications use blurring to hide the border of the cropped face. Our
contribution to this work can be summarized as follows: i) we use a simple way to detect the blurring residual
in fake videos using the focus measures; ii) a small dataset is used to implement our work without using a
large dataset for training; and iii) our method uses simple measures to detect the forgery instead of using deep
learning methods, which do not easily detect blurring residuals.
2. RELATED WORK
This section will briefly mention some of the works related to deepfake detection and focus on
methods that explore artifacts in fake video frames. Concerning the detection of deepfakes, image
manipulation is not a new problem that has been highlighted since the emergence of deepfakes; for example,
image modification with Photoshop tools is being used up to the present day. Also, multimedia forensics
science is still dealing with this problem [17]. Deepfake algorithms leave traces on media that are difficult to
detect with the naked eye, so more research is devoted to helping detect deepfakes. Figure 1 shows the
number of research papers that have provided solutions in the field of deepfake detection.
Figure 1. The number of research papers that are implemented in terms of deepfake detection [21]
Methods for detecting fakes in a video can be classified into two categories [7]: techniques that
depend on temporal features and those that rely on visible artifacts within frames. We concentrate on the
second type, which breaks down the video into frames and then works on each frame by searching for the
visual artifacts to obtain distinctive properties or features and then feeding them to a classifier. For example,
Koopman et al. [20] used photo response non-uniformity (PRNU) to detect deepfakes manipulation. The
analysis of PRNU is an attractive method because it finds that tampering with the facial area region affects
the local value of the PRNU pattern in video frames. This analysis is widely used in the field of video
forensics [22]. Compression artifacts are also exploited in this area. It was found that when the manipulated
JPEG-image is compressed a second time, the whole image has the effects of double compression, except for
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587
2584
the fake face area [23]. In addition to the defects generated by recompression, the process of deepfakes also
generates a set of precious traces, which need post-processing operations to hide those traces or defects.
Bahrami et al. [24] divided the blurred image into blocks to extract the characteristics of the blur type.
Finally, these local blur characteristics are combined to classify the image blocks into motion or out of focus.
These artifacts, especially the artifacts resulting from blurring the border of the fake face, were used in this
experiment for detecting fakes in videos.
3. FOCUS MEASURES
Focus measures (FM) are useful for the measurement of the amount of blur contained in an image.
Pertuz et al. [25] divided these measures into six categories: gradient-based (GB) and Laplacian-based (LB)
operators, which are based on the first derivative (gradient) and second derivative to measure the degree of
focus and the number of edges found in the input image, respectively. Wavelet-based (WB) and
DCT-based (DCT-B) operators use the fact that the coefficients of the discrete wavelet transform and discrete
cosine transform can be used to measure the focus level. Statistics-based (SB) operators use image statistics
to find focus levels. Finally, miscellaneous operators, which do not belong to any of the prior groups, can
measure the amount of blur founded in the image.
Our work was based on the focus measures operators mentioned in [25]. The selection fell on the
Laplacian family because of its good performance in common imaging conditions. Also, we use the
gradient-based operator because it showed promising results from among the 11 high-performance scales
tested in [25]. We did not refer to other standards, such as deep cryogenic treatment (DCT), due to their
dependence on their applications. All focus measures considered in this paper are presented in Table 1, along
with their exact abbreviation from [25].
Table 1. Focus measures used and their abbreviation
Focus Measure Abbr.
Energy of Laplacian LAP1
Modified Laplacian LAP2
Diagonal Laplacian LAP3
Tenengrad Variance GRA7
4. METHOD
4.1. Dataset
The dataset used in our experiment is the UADFV dataset [26]. It is simple and has only 49 videos
with two classes, fake and real. Figure 2 shows a sample of this dataset. We use ten videos from this dataset
to implement our experiment.
(a) (b)
Figure 2. Sample of the dataset used (a) is an example of deepfakes with low quality (notable edges), while
(b) shows an example of deepfakes with high quality (polished edges)
4.2. Focus measure operators’ analysis
Each video in the dataset is converted into a series of frames. This step is followed by cropping each
frame into eight parts to apply the focus measure mentioned in Table 1 on each part. Figure 3 shows how to
divide each frame into eight parts. Before applying the focus measure operators to the split image, the
grayscale channel of the image is taken into consideration. After applying each measure on each part, the
average value of the eight measure values is calculated for each frame image. This process is repeated for all
video frames, whether real or fake, to calculate the final value of the focus measure operators.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2585
Figure 3. Overall steps for analyzing the quality of focus measures. The video frames are cropped into eight
parts where an average value of the focus measure (FM) is calculated for each frame
5. RESULTS
The focus measure for each video was calculated. Figures 4(a)-(d) show the results energy of
Laplacian, modified Laplacian, Laplacian variance, and Tenengrad variance, respectively. From these results,
we note that the values of the Laplacian-based operators were lower or higher than their values in the real
video, depending on the number of edges present in the fake video. We know that the edges decrease as more
blurring is applied to the image.
(a) (b)
(c) (d)
Figure 4. The results of applying focus measure operators: (a) energy of Laplacian, (b) modified Laplacian,
(c) Laplacian variance, and (d) Tenengrad variance, per fake videos against real one
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2582-2587
2586
By looking at the results achieved by the gradient-based operator, we find that the value of this
measure is less than its value in a real video in all cases, whether the fake video is of high quality or low. The
results indicate that we can use the gradient-based measure to detect deepfakes. This explains the algorithm’s
performance in terms of deepfake detection. As for time, the response time of a single video is measured in
seconds, so if we compare the time taken for all videos, it is negligible in relation to the time taken by deep
learning-based methods.
6. CONCLUSION
In this analysis, a methodology for deepfake detection is suggested. Our method exploits the visible
artifacts (blur inconsistencies) generated via post-processing steps applied on fake videos. Compared to other
methods that use deep learning, our method does not require high computational power and extensive data
for training. Still, it is based only on the comparison of the performance of various focus measure operators.
The selection of operators has been chosen after a comprehensive review of the results of much recent
literature. Four focus measure operators are selected to evaluate the degree of focus between fake videos and
real ones. Various mathematical principles were used in the analysis and testing of the focus measure
operators. Out of 36 operators, the best four operators were selected to analyze and compare their
performance. The selection fell on the Laplacian family and the gradient-based operator. Experiments have
been implemented on a test set of both fake and real videos. Experiments showed that the values of the
Laplacian-based operators were lower or higher than their values in the real video, depending on the number
of edges present in the fake video. This means the Laplacian family cannot be used in deepfake detection. On
the other hand, the gradient-based measure (GRA7) can distinguish fake videos from real ones. The dataset
used in our experiment is overly small to subedit guidelines for likelihood ratios, as is desired in forensic
sciences. Nevertheless, we have a simple collection of the focus measures. However, better results could
have been achieved with more complex collection strategies. Due to the increasing sophistication of deepfake
technology, it becomes necessary to keep pace with these developments and establish robust detection
methods. Because the multimedia forensic tools worked on studying and detecting malicious manipulations
in multimedia content before the occurrence of deep learning technology, so it was necessary to take
advantage of these methods and combine them with deep learning techniques to build a strong detection
model.
REFERENCES
[1] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Classifying political arabic articles using support vector machine with different feature
extraction,” in Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 79–94.
[2] A. R. Abbas and A. O. Farooq, “Human skin colour detection using bayesian rough decision tree,” in Communications in
Computer and Information Science, Springer International Publishing, 2018, pp. 240–254.
[3] D. H. Abd, A. T. Sadiq, and A. R. Abbas, “Political articles categorization based on different naïve bayes models,” in
Communications in Computer and Information Science, Springer International Publishing, 2020, pp. 286–301.
[4] E. A. Kadhim, H. B. A. Wahab, and M. Suhad, “Proposed approach for key generation based on elliptic curve (EC) algebra and
metaheuristic algorithms,” Engineering Technology Journal, vol. 32, no. 2, pp. 333–346, 2014.
[5] A. T. Sadiq and A. G. Hamad, “BSA: a hybrid bees’ simulated annealing algorithm to solve optimization and NP-complete
problems,” Engineering Technology Journal, vol. 28, no. 2, pp. 271–281, 2010.
[6] H. H. Salih, A. T. Sadiq, and I. K. Ali, “Attack on the Simple Substitution Ciphers Using Particle Swarm Optimization,” Eng. &
Tech. Journal, vol. 28, no. 11, 2010.
[7] L. Verdoliva, “Media forensics and DeepFakes: an overview,” IEEE Journal of Selected Topics in Signal Processing, vol. 14,
no. 5, pp. 910–932, Aug. 2020, doi: 10.1109/JSTSP.2020.3002101.
[8] X. Mao and Q. Li, Generative adversarial networks for image generation. Singapore: Springer Singapore, 2021.
[9] X. Wang, W. Li, G. Mu, D. Huang, and Y. Wang, “Facial expression synthesis by U-Net conditional generative adversarial
networks,” in Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, Jun. 2018, pp. 283–290, doi:
10.1145/3206025.3206068.
[10] T. Karras, S. Laine, and T. Aila, “A style-based generator architecture for generative adversarial networks,” in 2019 IEEE/CVF
Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2019, pp. 4396–4405, doi: 10.1109/CVPR.2019.00453.
[11] Y. Yu, Z. Gong, P. Zhong, and J. Shan, “Unsupervised representation learning with deep convolutional neural network for remote
sensing images,” in International Conference on Image and Graphics, 2017, pp. 97–108.
[12] Y. Zhou and B. E. Shi, “Photorealistic facial expression synthesis by the conditional difference adversarial autoencoder,” in 2017
Seventh International Conference on Affective Computing and Intelligent Interaction (ACII), Oct. 2017, pp. 370–376, doi:
10.1109/ACII.2017.8273626.
[13] H. Zhu, Q. Zhou, J. Zhang, and J. Z. Wang, “Facial aging and rejuvenation by conditional multi-adversarial autoencoder with
ordinal regression,” arXiv:1804.02740, Apr. 2018.
[14] M. Westerlund, “The emergence of Deepfake technology: a review,” Technology Innovation Management Review, vol. 9, no. 11,
pp. 39–52, Jan. 2019, doi: 10.22215/timreview/1282.
[15] V. Mehta, P. Gupta, R. Subramanian, and A. Dhall, “FakeBuster: a deepfakes detection tool for video conferencing scenarios,” in
26th International Conference on Intelligent User Interfaces, Apr. 2021, pp. 61–63, doi: 10.1145/3397482.3450726.
[16] A. A. Pokroy and A. D. Egorov, “EfficientNets for DeepFake detection: comparison of pretrained models,” in 2021 IEEE
Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Jan. 2021, pp. 598–600, doi:
6. Int J Elec & Comp Eng ISSN: 2088-8708
Fast discrimination of fake video manipulation (Wildan Jameel Hadi)
2587
10.1109/ElConRus51938.2021.9396092.
[17] L. Guarnera, O. Giudice, C. Nastasi, and S. Battiato, “Preliminary forensics analysis of DeepFake images,” in 2020 AEIT
International Annual Conference (AEIT), Sep. 2020, pp. 1–6, doi: 10.23919/AEIT50178.2020.9241108.
[18] L. Verdoliva and P. Bestagini, “Multimedia forensics,” in Proceedings of the 27th ACM International Conference on Multimedia,
Oct. 2019, pp. 2701–2702, doi: 10.1145/3343031.3350542.
[19] M. Hogan, “Replicating reality advantages and limitations of weaponized deepfake technology PIPS.” The Project on
International Peace and Security, Global Research Institute, College of William & Mary, 2020.
[20] M. Koopman, A. M. Rodriguez, and Z. Geradts, “Detection of deepfake video manipulation,” in Proceedings of the 20th Irish
Machine Vision and Image Processing conference, 2018, pp. 133–136.
[21] Digital Science & Research Solutions Inc., “Number of research papers in terms of deepfake detection,” Dimensions.
https://app.dimensions.ai/discover/publication?search_mode=content&search_text=Deepfake
Detection&search_type=kws&search_field=full_search (accessed Nov. 05, 2021).
[22] W.-C. Yang, J. Jiang, and C.-H. Chen, “A fast source camera identification and verification method based on PRNU analysis for
use in video forensic investigations,” Multimedia Tools and Applications, vol. 80, no. 5, pp. 6617–6638, Feb. 2021, doi:
10.1007/s11042-020-09763-z.
[23] T. Pevný and J. Fridrich, “Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images,” in
Proceedings of SPIE-The International Society for Optical Engineering, Feb. 2008, doi: 10.1117/12.759155.
[24] K. Bahrami, A. C. Kot, Leida Li, and Haoliang Li, “Blurred image splicing localization by exposing blur type inconsistency,”
IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 999–1009, 2015, doi: 10.1109/TIFS.2015.2394231.
[25] S. Pertuz, D. Puig, and M. A. Garcia, “Analysis of focus measure operators for shape-from-focus,” Pattern Recognition, vol. 46,
no. 5. pp. 1415–1432, May 2013, doi: 10.1016/j.patcog.2012.11.011.
[26] X. Yang, Y. Li, and S. Lyu, “Exposing deep fakes using inconsistent head poses,” in 2019 IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), 2019, pp. 8261–8265, doi: 10.1109/ICASSP.2019.8683164.
BIOGRAPHIES OF AUTHORS
Wildan Jameel Hadi has received her bachelor’s degree in computer science
from Baghdad University in the year 2006. She has completed her master’s degree in
Computer Science from the University of Technology in the Year 2008. She is currently
pursuing her Ph.D. degree in computer science at Technology University, Iraq, and working in
the Department of Computer Science, College of Science for women, University of Baghdad,
Iraq. Her research interests include image processing, video analysis, deep learning, face
detection. She can be contacted at email: wildanjh_comp@csw.uobaghdad.edu.iq.
Suhad Malallah Kadhem has finished her Ph.D. in Computer Science from the
Department of Computer Science at the Technology University. She has completed her
bachelor’s and master’s degree in Computer Science from the University of Technology
(UOT), Baghdad, Iraq in 1997. Suhad is a faculty member in the Computer Science
Department at UOT since 1997, where she became the Head of the artificial intelligent branch
at UOT in 2003. Her research interests focus on artificial intelligence, natural language
processing (especially Arabic language processing), and computer security (especially
steganography). She can be contacted at email: 110102@uotechnology.edu.iq.
Ayad Rodhan Abbas has finished his Ph.D., Artificial Intelligent, Wuhan
University, School of Computer Science, China, 2009, M.SC., Computer Science, University
of Technology, Computer Science Department, Iraq, 2005, B.S., Computer Science,
University of Technology, Computer Science Department, Iraq, 2003, B.S., Chemical
Engineering, University of Baghdad, Chemical Engineering Department, Iraq, 1999. His
research interests focus on artificial intelligent, machine learning, natural language
processing, deep learning, data mining, web mining, information retrieval, soft computing,
E-learning, E-Commerce, and recommended system. He can be contacted at email:
110010@uotechnology.edu.iq.