{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:43:18Z","timestamp":1773002598265,"version":"3.50.1"},"reference-count":52,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T00:00:00Z","timestamp":1750982400000},"content-version":"vor","delay-in-days":177,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Artificial intelligence (AI) has made human tasks easier compared to earlier days. It has revolutionized various domains, from paper drafting to video editing. However, some individuals exploit AI to create deceptive content, such as fake videos, audios, and images, to mislead others. To address this, researchers and large corporations have proposed solutions for detecting fake content using classical deep learning models. However, these models often suffer from a large number of trainable parameters, which leads to large model sizes and, consequently, computational intensive. To overcome these limitations, we propose various hybrid classical\u2013quantum models that use a classical pre\u2010trained model as a front\u2010end feature extractor, followed by a quantum\u2010based LSTM network, that is, QLSTM. These pre\u2010trained models are based on the ResNet architecture, such as ResNet34, 50, and 101. We have compared the performance of the proposed models with their classical counterparts. These proposed models combine the strengths of classical and quantum systems for the detection of deepfake video (without audio). Our results indicate that the proposed models significantly reduce the number of trainable parameters, as well as quantum long short\u2010term memory (QLSTM) parameters, which leads to a smaller model size than the classical models. Despite the reduced parameter, the performance of the proposed models is either superior to or comparable with that of their classical equivalent. The proposed hybrid quantum models, that is, ResNet34\u2010QLSTM, ResNet50\u2010QLSTM, and ResNet101\u2010QLSTM, achieve a reduction of approximately 1.50%, 4.59%, and 5.24% in total trainable parameters compared to their equivalent classical models, respectively. Additionally, QLSTM linked with the proposed models reduces its trainable parameters by 99.02%, 99.16%, and 99.55%, respectively, compared to equivalent classical LSTM. This significant reduction highlights the efficiency of the quantum\u2010based network in terms of resource usage. The trained model sizes of the proposed models are 81.35, 88.06, and 162.79, and their equivalent classical models are 82.59, 92.28, and 171.76 in MB, respectively.<\/jats:p>","DOI":"10.1155\/int\/3990069","type":"journal-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T06:40:02Z","timestamp":1751006402000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Framework for Quantum\u2010Based Deepfake Video Detection (Without Audio)"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3106-4995","authenticated-orcid":false,"given":"Atul","family":"Pandey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7651-3820","authenticated-orcid":false,"given":"Bhawana","family":"Rudra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9399-1283","authenticated-orcid":false,"given":"Rajesh","family":"Kumar Krishnan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,6,27]]},"reference":[{"key":"e_1_2_17_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103525"},{"key":"e_1_2_17_2_2","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12031"},{"key":"e_1_2_17_3_2","unstructured":"LiY.andLyuS. Exposing Deepfake Videos by Detecting Face Warping Artifacts 2019 https:\/\/arxiv.org\/abs\/1811.00656."},{"key":"e_1_2_17_4_2","unstructured":"ZhaoY. GeW. LiW. WangR. ZhaoL. andMingJ. Capturing the Persistence of Facial Expression Features for Deepfake Video Detection International Conference on Information Communications and Signal Processing 2019 https:\/\/api.semanticscholar.org\/CorpusID:211216665."},{"key":"e_1_2_17_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"e_1_2_17_6_2","doi-asserted-by":"crossref","unstructured":"R\u00f6sslerA. CozzolinoD. VerdolivaL. RiessC. ThiesJ. andNie\u00dfnerM. Faceforensics++: Learning to Detect Manipulated Facial Images 2019 IEEE\/CVF International Conference on Computer Vision (ICCV) 2019 1\u201311 https:\/\/doi.org\/10.1109\/ICCV.2019.00009.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_2_17_7_2","doi-asserted-by":"crossref","unstructured":"AgarwalS. FaridH. FriedO. andAgrawalaM. Detecting Deep-Fake Videos From Phoneme-Viseme Mismatches 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2020 2814\u20132822 https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00338.","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"e_1_2_17_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3239223"},{"key":"e_1_2_17_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10810-6"},{"key":"e_1_2_17_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13053095"},{"key":"e_1_2_17_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-012-0309-y"},{"key":"e_1_2_17_12_2","unstructured":"ZamanK. MarchisioA. HanifM. A. andShafiqueM. A Survey on Quantum Machine Learning: Current Trends Challenges Opportunities and the Road Ahead 2023."},{"key":"e_1_2_17_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"e_1_2_17_14_2","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-022-00311-3"},{"key":"e_1_2_17_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/11766247_37"},{"key":"e_1_2_17_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31456-9_15"},{"key":"e_1_2_17_17_2","doi-asserted-by":"crossref","unstructured":"ZhangY. ZhengL. andThingV. L. L. Automated Face Swapping and its Detection 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP) 2017 15\u201319 https:\/\/doi.org\/10.1109\/SIPROCESS.2017.8124497 2-s2.0-85043457720.","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"e_1_2_17_18_2","unstructured":"AgarwalS.andVarshneyL. R. Limits of Deepfake Detection: A Robust Estimation Viewpoint 2019 https:\/\/arxiv.org\/abs\/1905.03493."},{"key":"e_1_2_17_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10098-y"},{"key":"e_1_2_17_20_2","unstructured":"KingmaD. P.andDhariwalP. Glow: Generative Flow With Invertible 1x1 Convolutions 2018 https:\/\/arxiv.org\/abs\/1807.03039."},{"key":"e_1_2_17_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.01475"},{"key":"e_1_2_17_22_2","doi-asserted-by":"crossref","unstructured":"G\u00fceraD.andDelpE. J. Deepfake Video Detection Using Recurrent Neural Networks 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2018 1\u20136 https:\/\/doi.org\/10.1109\/AVSS.2018.8639163 2-s2.0-85063065209.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_2_17_23_2","unstructured":"SabirE. ChengJ. JaiswalA. AbdAlmageedW. MasiI. andNatarajanP. Recurrent Convolutional Strategies for Face Manipulation Detection in Videos 2019 https:\/\/arxiv.org\/abs\/1905.00582."},{"key":"e_1_2_17_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.03.005"},{"key":"e_1_2_17_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905689"},{"key":"e_1_2_17_26_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.10148558"},{"key":"e_1_2_17_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13122398"},{"key":"e_1_2_17_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e25757"},{"key":"e_1_2_17_29_2","doi-asserted-by":"crossref","unstructured":"LiY. YangX. SunP. QiH. andLyuS. Celeb-df: A Large-Scale Challenging Dataset for Deepfake Forensics 2020 https:\/\/arxiv.org\/abs\/1909.12962.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_2_17_30_2","unstructured":"DolhanskyB. BittonJ. PflaumB.et al. The Deepfake Detection Challenge (Dfdc) Dataset 2020 https:\/\/arxiv.org\/abs\/2006.07397."},{"key":"e_1_2_17_31_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-80842-z"},{"key":"e_1_2_17_32_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13152947"},{"key":"e_1_2_17_33_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-40343-x"},{"key":"e_1_2_17_34_2","unstructured":"LinC.-H. A. LiuC.-Y. ChenS. Y.-C. andChenK.-C. Quantum-Trained Convolutional Neural Network for Deepfake Audio Detection 2024 https:\/\/arxiv.org\/abs\/2410.09250."},{"key":"e_1_2_17_35_2","unstructured":"KamalS. ChaharV. andSharmaS. Quantum Machine Learning-Based Detection of Fake News and Deep Fake Videos 2022."},{"key":"e_1_2_17_36_2","doi-asserted-by":"publisher","DOI":"10.55011\/STAIQC.2022.2103"},{"key":"e_1_2_17_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s44227-024-00028-x"},{"key":"e_1_2_17_38_2","unstructured":"ChangS. Y. ThanasilpS. Le SauxB. VallecorsaS. andGrossiM. Latent Style-Based Quantum GAN for High-Quality Image Generation 2024."},{"key":"e_1_2_17_39_2","unstructured":"SalekP. M. S. EngineerS. LiP. S. andChowdhuryP. M. A Hybrid Quantum-Classical Ai-Based Detection Strategy for Generative Adversarial Network-Based Deepfake Attacks on an Autonomous Vehicle Traffic Sign Classification System 2024 https:\/\/api.semanticscholar.org\/CorpusID:272910587."},{"key":"e_1_2_17_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102172"},{"key":"e_1_2_17_41_2","doi-asserted-by":"crossref","unstructured":"PandeyA.andRudraB. Deepfake Audio Detection Using Quantum Learning Models 2024 IEEE Middle East Conference on Communications and Networking (MECOM) 2024 1\u20136 https:\/\/doi.org\/10.1109\/MECOM61498.2024.10881096.","DOI":"10.1109\/MECOM61498.2024.10881096"},{"key":"e_1_2_17_42_2","doi-asserted-by":"crossref","unstructured":"PandeyA.andRudraB. Hybrid Classical Quantum Learning Model Framework for Detection of Deepfake Audio Proceedings of the 11th International Conference on Information Systems Security and Privacy-Volume 2: ICISSP INSTICC 2025 SciTePress 231\u2013239 https:\/\/doi.org\/10.5220\/0013258700003899.","DOI":"10.5220\/0013258700003899"},{"key":"e_1_2_17_43_2","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab4eb5"},{"key":"e_1_2_17_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96424-9"},{"key":"e_1_2_17_45_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_17_46_2","unstructured":"ChenS. Y.-C. YooS. andFangY.-L. L. Quantum Long Short-Term Memory 2020 https:\/\/arxiv.org\/abs\/2009.01783."},{"key":"e_1_2_17_47_2","unstructured":"GeitgeyA. The World\u2019s Simplest Facial Recognition Api for python and the Command Line 2020."},{"key":"e_1_2_17_48_2","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep Residual Learning for Image Recognition 2015 https:\/\/arxiv.org\/abs\/1512.03385."},{"key":"e_1_2_17_49_2","article-title":"The OpenCV Library","author":"Bradski G.","year":"2000","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"e_1_2_17_50_2","unstructured":"BergholmV. IzaacJ. SchuldM. GogolinC. AhmedS.et al. Pennylane: Automatic Differentiation of Hybrid Quantum-Classical Computations 2022 https:\/\/arxiv.org\/abs\/1811.04968."},{"key":"e_1_2_17_51_2","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/8729440"},{"key":"e_1_2_17_52_2","doi-asserted-by":"publisher","DOI":"10.3390\/computers13040099"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/3990069","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/3990069","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/3990069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:15:53Z","timestamp":1772993753000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/3990069"}},"subtitle":[],"editor":[{"given":"Guang","family":"Hua","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/3990069"],"URL":"https:\/\/doi.org\/10.1155\/int\/3990069","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-01-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3990069"}}