{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:24:11Z","timestamp":1772713451964,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T00:00:00Z","timestamp":1745193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Deepfake technology poses significant threats in various domains, including politics, cybersecurity, and social media. This study uses the golden frame selection technique to present a neural network ensemble method for deepfake classification. The proposed approach optimizes computational resources by extracting the most informative video frames, improving detection accuracy. We integrate multiple deep learning models, including ResNet50, EfficientNetB0, Xception, InceptionV3, and Facenet, with an XGBoost meta-model for enhanced classification performance. Experimental results demonstrate a 91% accuracy rate, outperforming traditional deepfake detection models. Additionally, feature importance analysis using Grad-CAM highlights how different architectures focus on distinct facial regions, enhancing overall model interpretability. The findings contribute to of robust and efficient deepfake detection techniques, with potential applications in digital forensics, media verification, and cybersecurity.<\/jats:p>","DOI":"10.3390\/bdcc9040109","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T20:38:26Z","timestamp":1745267906000},"page":"109","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Neural Network Ensemble Method for Deepfake Classification Using Golden Frame Selection"],"prefix":"10.3390","volume":"9","author":[{"given":"Khrystyna","family":"Lipianina-Honcharenko","sequence":"first","affiliation":[{"name":"Department of Information and Computing Systems and Control, Faculty of Computer Information Technologies, West Ukrainian National University, 46000 Ternopil, Ukraine"}]},{"given":"Nazar","family":"Melnyk","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Systems and Control, Faculty of Computer Information Technologies, West Ukrainian National University, 46000 Ternopil, Ukraine"}]},{"given":"Andriy","family":"Ivasechko","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Systems and Control, Faculty of Computer Information Technologies, West Ukrainian National University, 46000 Ternopil, Ukraine"}]},{"given":"Mykola","family":"Telka","sequence":"additional","affiliation":[{"name":"Department of Information and Computing Systems and Control, Faculty of Computer Information Technologies, West Ukrainian National University, 46000 Ternopil, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4672-6400","authenticated-orcid":false,"given":"Oleg","family":"Illiashenko","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Networks and Cybersecurity, Faculty of Radio Electronics, Computer Systems and Infocommunications, National Aerospace University \u201cKhAI\u201d, 61000 Kharkiv, Ukraine"},{"name":"The Institute of Informatics and Telematics of the National Research Council (IIT-CNR), Via Giuseppe Moruzzi 1, 56124 Pisa, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,21]]},"reference":[{"key":"ref_1","unstructured":"(2025, February 24). Teneo. Deepfakes in 2024 Are Suddenly Deeply Real: An Executive Briefing on the Threat and Trends. 2024. Available online: https:\/\/www.teneo.com\/insights\/articles\/deepfakes-in-2024-are-suddenly-deeply-real-an-executive-briefing-on-the-threat-and-trends\/."},{"key":"ref_2","unstructured":"(2025, February 24). Centre for Strategic & International Studies (CSIS). The Future of Hybrid Warfare. 2024. Available online: https:\/\/www.csis.org\/analysis\/future-hybrid-warfare."},{"key":"ref_3","unstructured":"(2025, February 24). Brookings. Deepfakes and International Conflict. 2023. Available online: https:\/\/www.brookings.edu\/wp-content\/uploads\/2023\/01\/FP_20230105_deepfakes_international_conflict.pdf."},{"key":"ref_4","unstructured":"Geneva Centre for Security Policy (GCSP) (2025, February 24). The War in Ukraine: Reality Check for Emerging Technologies and the Future of Warfare. Available online: https:\/\/www.gcsp.ch\/publications\/war-ukraine-reality-check-emerging-technologies-and-future-warfare."},{"key":"ref_5","unstructured":"RAND Corporation (2025, February 24). Ukraine\u2019s Lessons for the Future of Hybrid Warfare. Available online: https:\/\/www.rand.org\/pubs\/commentary\/2022\/11\/ukraines-lessons-for-the-future-of-hybrid-warfare.html."},{"key":"ref_6","first-page":"201","article-title":"A Cyclical Approach to Legal Document Analysis: Leveraging AI for Strategic Policy Evaluation","volume":"3736","author":"Maika","year":"2024","journal-title":"CEUR-WS"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Babeshko, I., Illiashenko, O., Kharchenko, V., and Leontiev, K. (2022). Towards Trustworthy Safety Assessment by Providing Expert and Tool-Based XMECA Techniques. Mathematics, 10.","DOI":"10.3390\/math10132297"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tran, V.-N., Lee, S.-H., Le, H.-S., and Kwon, K.-R. (2021). High Performance DeepFake Video Detection on CNN-Based with Attention Target-Specific Regions and Manual Distillation Extraction. Appl. Sci., 11.","DOI":"10.3390\/app11167678"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cheng, K., Sovernigo, G., and Lin, X. (2022, January 16\u201320). A Heterogeneous Feature Ensemble Learning Based Deepfake Detection Method. Proceedings of the ICC 2022\u2014IEEE International Conference on Communications, Seoul, Republic of Korea.","DOI":"10.1109\/ICC45855.2022.9838630"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Nadimpalli, A.V., and Rattani, A. (2023, January 15\u201317). Facial Forgery-Based Deepfake Detection Using Fine-Grained Features. Proceedings of the 2023 International Conference on Machine Learning and Applications, Jacksonville, FL, USA.","DOI":"10.1109\/ICMLA58977.2023.00328"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Guan, L., Liu, F., Zhang, R., Liu, J., and Tang, Y. (2023). MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning. Sensors, 23.","DOI":"10.3390\/s23218763"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1016\/j.icte.2024.09.018","article-title":"Comparative study of deep learning techniques for DeepFake video detection","volume":"10","author":"Khan","year":"2024","journal-title":"ICT Express"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"100677","DOI":"10.1016\/j.cosrev.2024.100677","article-title":"Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis","volume":"54","author":"Chakraborty","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"124260","DOI":"10.1016\/j.eswa.2024.124260","article-title":"Unmasking deepfakes: A systematic review of deepfake detection and generation techniques using artificial intelligence","volume":"252","author":"Abbas","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_15","first-page":"301795","article-title":"GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions","volume":"50","author":"Casu","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"e15090","DOI":"10.1016\/j.heliyon.2023.e15090","article-title":"Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors","volume":"9","author":"Firc","year":"2023","journal-title":"Heliyon"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lee, E.-G., Lee, I., and Yoo, S.-B. (2023). ClueCatcher: Catching Domain-Wise Independent Clues for Deepfake Detection. Mathematics, 11.","DOI":"10.3390\/math11183952"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Naitali, A., Ridouani, M., Salahdine, F., and Kaabouch, N. (2023). Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions. Computers, 12.","DOI":"10.3390\/computers12100216"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"109234","DOI":"10.1016\/j.compeleceng.2024.109234","article-title":"Golden ratio based deep fake video detection system with fusion of capsule networks","volume":"117","author":"Dincer","year":"2024","journal-title":"Comput. Electr. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Sumanth, S., Durga, T.C., Sai, C.Y., and Manne, S. (2025, February 24). Temporal Convulutional Network & Content-Based Frame Sampling Fusion for Semantically Enriched Video Summarization. Research Square. 2023. Available online: https:\/\/www.researchsquare.com\/article\/rs-3010938\/latest.","DOI":"10.21203\/rs.3.rs-3010938\/v1"},{"key":"ref_21","unstructured":"Gong, B., Chao, W.-L., and Grauman, K. (2025, February 24). Diverse Sequential Subset Selection for Supervised Video Summarization. NeurIPS. 2014. Available online: https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2014\/file\/5d3b9e06117de70a7e5076cc3ed89e18-Paper.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Leszczuk, M.I., and Duplaga, M. (2011). Algorithm for video summarization of bronchoscopy procedures. BioMed. Eng. OnLine, 10.","DOI":"10.1186\/1475-925X-10-110"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1002\/asi.21317","article-title":"Toward a conceptual framework of key-frame extraction and storyboard display for video summarization","volume":"61","author":"Kim","year":"2010","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Alarfaj, F.K., and Khan, J.A. (2023). Deep Dive into Fake News Detection: Feature-Centric Classification with Ensemble and Deep Learning Methods. Algorithms, 16.","DOI":"10.3390\/a16110507"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Koonce, B. (2021). ResNet 50. Convolutional Neural Networks with Swift for Tensorflow: Image Recognition and Dataset Categorization, Apress.","DOI":"10.1007\/978-1-4842-6168-2"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.procs.2024.04.007","article-title":"ResNet-50 vs. EfficientNet-B0: Multi-Centric Classification of Various Lung Abnormalities Using Deep Learning \u201cSession id: ICMLDsE. 004\u201d","volume":"235","author":"Kansal","year":"2024","journal-title":"Procedia Comput. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017, January 21\u201326). Xception: Deep learning with depthwise separable convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref_28","unstructured":"Xia, X., Xu, C., and Nan, B. (2017, January 2\u20134). Inception-v3 for flower classification. Proceedings of the 2017 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, China."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., and Philbin, J. (2015, January 7\u201312). Facenet: A unified embedding for face recognition and clustering. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"34345","DOI":"10.1007\/s11042-022-12387-0","article-title":"Research of image recognition method based on enhanced inception-ResNet-V2","volume":"81","author":"Peng","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Komar, M., Dorosh, V., Hladiy, G., and Sachenko, A. (2018, January 8\u201312). Deep neural network for detection of cyber attacks. Proceedings of the 2018 IEEE 1st International Conference on System Analysis and Intelligent Computing, SAIC 2018\u2014Proceedings, Kyiv, Ukraine.","DOI":"10.1109\/SAIC.2018.8516753"},{"key":"ref_32","unstructured":"Lipianina-Honcharenko, K., Yarych, V., Ivasechko, A., Filinyuk, A., Yurkiv, K., Lebid, T., and Soia, M. (2024, January 10\u201311). Evaluating the Effectiveness of Attention-Gated-CNN-BGRU Models for Historical Manuscript Recognition in Ukraine. Proceedings of the First International Workshop of Young Scientists on Artificial Intelligence for Sustainable Development, Ternopil, Ukraine."},{"key":"ref_33","unstructured":"Lipianina-Honcharenko, K., Telka, M., and Melnyk, N. (2024, January 5). Comparison of ResNet, EfficientNet, and Xception architectures for deepfake detection. Proceedings of the 1st International Workshop on Advanced Applied Information Technologies CEUR-WS, Khmelnytskyi, Ukraine, Zilina, Slovakia. Available online: https:\/\/ceur-ws.org\/Vol-3899\/paper3.pdf."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"136206","DOI":"10.1016\/j.snb.2024.136206","article-title":"Multi-task deep learning model for quantitative volatile organic compounds analysis by feature fusion of electronic nose sensing","volume":"417","author":"Ni","year":"2024","journal-title":"Sens. Actuators B Chem."},{"key":"ref_35","unstructured":"(2025, February 24). Kaggle. Deepfake Detection Challenge. 2020. Available online: https:\/\/www.kaggle.com\/competitions\/deepfake-detection-challenge\/data."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/JSEN.2023.3304355","article-title":"Classification and concentration predictions of volatile organic compounds using an electronic nose based on XGBoost-random forest algorithms","volume":"24","author":"Ni","year":"2023","journal-title":"IEEE Sens. J."},{"key":"ref_37","unstructured":"(2025, February 24). TruScanAI. (n.d.). Available online: https:\/\/sci-proj.wunu.edu.ua\/truscanai\/."},{"key":"ref_38","unstructured":"Illiashenko, O., Kharchenko, V., and Kovalenko, A. (2013, January 27\u201330). Cyber security lifecycle and assessment technique for FPGA-based I&C systems. Proceedings of the East-West DesignTest Symposium (EWDTS 2013), Rostov-on-Don, Russia."}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/4\/109\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:18:45Z","timestamp":1760030325000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/4\/109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,21]]},"references-count":38,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["bdcc9040109"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9040109","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,21]]}}}