{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:19:35Z","timestamp":1774444775965,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:00:00Z","timestamp":1743033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. The background of the study emphasizes the growing threat of deepfakes, which pose significant challenges in various domains, including social media, politics, and entertainment. Current methodologies primarily rely on visual features that are specific to the dataset and fail to generalize well across varying manipulation techniques. However, these techniques focus on either spatial or temporal features individually and lack robustness in handling complex deepfake artifacts that involve fused facial regions such as eyes, nose, and mouth. Key approaches include the use of CNNs, RNNs, and hybrid models like CNN-LSTM, CNN-GRU, and temporal convolutional networks (TCNs) to capture both spatial and temporal features during the detection of deepfake videos and images. The research incorporates data augmentation with GANs to enhance model performance and proposes an innovative fusion of artifact inspection and facial landmark detection for improved accuracy. The experimental results show near-perfect detection accuracy across diverse datasets, demonstrating the effectiveness of these models. However, challenges remain, such as the difficulty of detecting deepfakes in compressed video formats, the need for handling noise and addressing dataset imbalances. The research presents an enhanced hybrid model that improves detection accuracy while maintaining performance across various datasets. Future work includes improving model generalization to detect emerging deepfake techniques better. The experimental results reveal a near-perfect accuracy of over 99% across different architectures, highlighting their effectiveness in forensic investigations.<\/jats:p>","DOI":"10.3390\/info16040270","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:11:40Z","timestamp":1743135100000},"page":"270","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning"],"prefix":"10.3390","volume":"16","author":[{"given":"Saud","family":"Sohail","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, Air University, Islamabad 44000, Pakistan"}]},{"given":"Syed Muhammad","family":"Sajjad","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, Air University, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4826-7746","authenticated-orcid":false,"given":"Adeel","family":"Zafar","sequence":"additional","affiliation":[{"name":"School of Information Technology, Halmstad University, 30250 Halmstad, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6937-4161","authenticated-orcid":false,"given":"Zafar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9172-5212","authenticated-orcid":false,"given":"Zia","family":"Muhammad","sequence":"additional","affiliation":[{"name":"Department of Computing, Design, and Communication, University of Jamestown, Jamestown, ND 58405, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8533-7183","authenticated-orcid":false,"given":"Muhammad","family":"Kazim","sequence":"additional","affiliation":[{"name":"Industrial and Manufacturing Engineering Department, North Dakota State University, Fargo, ND 58105, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,27]]},"reference":[{"key":"ref_1","unstructured":"Koopman, M., Rodriguez, A.M., and Geradts, Z. (2018, January 10\u201312). Detection of deepfake video manipulation. Proceedings of the 20th Irish Machine Vision and Image Processing Conference (IMVIP), Belfast, Northern Ireland."},{"key":"ref_2","first-page":"1753","article-title":"Deep fakes: A looming challenge for privacy, democracy, and national security","volume":"107","author":"Chesney","year":"2019","journal-title":"Calif. Law Rev."},{"key":"ref_3","first-page":"99","article-title":"Deepfakes: False pornography is here and the law cannot protect you","volume":"17","author":"Harris","year":"2018","journal-title":"Duke Law Technol. Rev."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2022","journal-title":"Appl. Intell."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., Battiato, S., Guarnera, F., Ortis, A., Puglisi, G., Paratore, A., Bui, L.M.Q., Fontani, M., and Coccomini, D.A. (2022). The Face Deepfake Detection Challenge. J. Imaging, 8.","DOI":"10.3390\/jimaging8100263"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Patel, M., Gupta, A., Tanwar, S., and Obaidat, M. (2020, January 30\u201331). Trans-DF: A transfer learning-based end-to-end deepfake detector. Proceedings of the 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/ICCCA49541.2020.9250803"},{"key":"ref_7","unstructured":"CB Insights (2024, November 03). The Future of Information Warfare. Available online: https:\/\/www.cbinsights.com\/research\/future-of-information-warfare\/."},{"key":"ref_8","unstructured":"Bracken, B. (2022, November 30). Deepfake Attacks Are About to Surge, Experts Warn. Available online: https:\/\/threatpost.com\/deepfake-attacks-surge-experts-warn\/165798\/."},{"key":"ref_9","unstructured":"(2022, November 30). FakeApp. Available online: https:\/\/www.fakeapp.org\/."},{"key":"ref_10","unstructured":"(2022, November 30). FaceApp. Available online: https:\/\/www.faceapp.com\/."},{"key":"ref_11","unstructured":"Korshunov, P., and Marcel, S. (2018). Deepfakes: A new threat to face recognition? Assessment and detection. arXiv."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: An overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., and Guo, B. (2020, January 14\u201319). Face X-ray for more general face forgery detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., and Jain, A.K. (2020, January 14\u201319). On the detection of digital face manipulation. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"e881","DOI":"10.7717\/peerj-cs.881","article-title":"Deep learning model for deep fake face recognition and detection","volume":"8","author":"Suganthi","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"e730","DOI":"10.7717\/peerj-cs.730","article-title":"Deepfake video detection: YOLO-Face convolution recurrent approach","volume":"7","author":"Ismail","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chauhan, S.S., Jain, N., Pandey, S.C., and Chabaque, A. (2022, January 29\u201330). Deepfake Detection in Videos and Pictures: Analysis of Deep Learning Models and Dataset. Proceedings of the 2022 IEEE International Conference on Data Science and Information System (ICDSIS), Hassan, India.","DOI":"10.1109\/ICDSIS55133.2022.9915885"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"e2110013119","DOI":"10.1073\/pnas.2110013119","article-title":"Deepfake detection by human crowds, machines, and machine-informed crowds","volume":"119","author":"Groh","year":"2022","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kiran, B.R., Thomas, D.M., and Parakkal, R. (2018). An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J. Imaging, 4.","DOI":"10.3390\/jimaging4020036"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Raza, A., Munir, K., and Almutairi, M. (2022). A Novel Deep Learning Approach for Deepfake Image Detection. Appl. Sci., 12.","DOI":"10.3390\/app12199820"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3447","DOI":"10.1007\/s13369-021-06297-w","article-title":"A deep learning framework for audio deepfake detection","volume":"47","author":"Khochare","year":"2022","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Rana, M.S., and Sung, A.H. (2020, January 1\u20133). Deepfakestack: A deep ensemble-based learning technique for deepfake detection. Proceedings of the 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), New York, NY, USA.","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00021"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Huang, B., Wang, Z., Yang, J., Ai, J., Zou, Q., Wang, Q., and Ye, D. (2023, January 17\u201324). Implicit identity driven deepfake face swapping detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1109\/TIFS.2022.3169921","article-title":"Detect and locate: Exposing face manipulation by semantic-and noise-level telltales","volume":"17","author":"Kong","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhang, Y., Fan, Y., and Wu, B. (2023, January 2\u20136). UCF: Uncovering common features for generalizable deepfake detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Paris, France.","DOI":"10.1109\/ICCV51070.2023.02048"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Luo, A., Cai, R., Kong, C., Kang, X., Huang, J., and Kot, A.C. (2023). Forgery-aware adaptive vision transformer for face forgery detection. arXiv.","DOI":"10.1109\/TCSVT.2024.3522091"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Jia, S., Lyu, R., Zhao, K., Chen, Y., Yan, Z., Ju, Y., Hu, C., Li, X., Wu, B., and Lyu, S. (2024, January 16\u201322). Can ChatGPT detect deepfakes? A study of using multimodal large language models for media forensics. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPRW63382.2024.00436"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., and Stamminger, M. (2019, January 7\u201311). Exploiting visual artifacts to expose deepfakes and face manipulations. Proceedings of the 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), Waikoloa Village, HI, USA.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., and Echizen, I. (2019). Use of a capsule network to detect fake images and videos. arXiv.","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"ref_30","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Trinh, L., Tsang, M., Rambhatla, S., and Liu, Y. (2021, January 3\u20138). Interpretable and trustworthy deepfake detection via dynamic prototypes. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, Waikoloa, HI, USA.","DOI":"10.1109\/WACV48630.2021.00202"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.C., and Lyu, S. (2018). In ictu oculi: Exposing AI-generated fake face videos by detecting eye blinking. arXiv.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref_33","unstructured":"Alshaikh, A. (2019). Application of Cortical Learning Algorithms to Movement Classification Towards Automated Video Forensics, Diss. Staffordshire University. Available online: https:\/\/eprints.staffs.ac.uk\/5577\/."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/JSTSP.2020.2999185","article-title":"Recurrent convolutional structures for audio spoof and video deepfake detection","volume":"14","author":"Chintha","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., and Echizen, I. (2018, January 11\u201313). Mesonet: A compact facial video forgery detection network. Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., and Lyu, S. (2019, January 12\u201317). Exposing deepfakes using inconsistent head poses. Proceedings of the 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Kshirsagar, M., Suratkar, S., and Kazi, F. (2022, January 11\u201312). Deepfake Video Detection Methods using Deep Neural Networks. Proceedings of the 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), Kannur, India.","DOI":"10.1109\/ICICICT54557.2022.9917701"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake detection: A systematic literature review","volume":"10","author":"Rana","year":"2022","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ko\u00c7ak, A., and Alkan, M. (2022, January 19\u201320). Deepfake Generation, Detection and Datasets: A Rapid-review. Proceedings of the 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), Ankara, Turkey.","DOI":"10.1109\/ISCTURKEY56345.2022.9931802"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., and Jiang, Y.G. (2020, January 12\u201316). Wilddeepfake: A challenging real-world dataset for deepfake detection. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413769"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Shahzad, H.F., Rustam, F., Flores, E.S., Maz\u00f3n, J.L.V., Diez, I.T., and Ashraf, I. (2022). A Review of Image Processing Techniques for Deepfakes. Sensors, 22.","DOI":"10.3390\/s22124556"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Khalid, H.F., and Woo, S.S. (2020, January 14\u201319). OC-FakeDect: Classifying deepfakes using one-class variational autoencoder. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00336"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Malik, Y.S., Sabahat, N., and Moazzam, M.O. (2020, January 5\u20137). Image Animations on Driving Videos with DeepFakes and Detecting DeepFakes Generated Animations. Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan.","DOI":"10.1109\/INMIC50486.2020.9318064"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"101293","DOI":"10.1109\/ACCESS.2020.2998330","article-title":"An exploratory analysis on visual counterfeits using conv-lstm hybrid architecture","volume":"8","author":"Hashmi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_45","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Nie\u00dfner, M. (2024, November 03). FaceForensics++: Learning to Detect Manipulated Facial Images. Available online: http:\/\/github.com\/ondyari\/FaceForensics."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., and Aila, T. (2020). Analyzing and Improving the Image Quality of StyleGAN. arXiv.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref_47","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., and Gelly, S. (2021). An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. arXiv."},{"key":"ref_48","unstructured":"Grill, J.B., Strub, F., Altch\u00e9, F., Tallec, C., Richemond, P.H., Buchatskaya, E., Doersch, C., Pires, B.A., Guo, Z.D., and Azar, M.G. (2020). Bootstrap Your Own Latent\u2014A New Approach to Self-Supervised Learning. arXiv."},{"key":"ref_49","unstructured":"Ho, J., Salimans, T., Chan, W., Chen, B., Schulman, J., Sutskever, I., and Abbeel, P. (2021). Cascaded Diffusion Models for High Fidelity Image Generation. arXiv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/4\/270\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:03:21Z","timestamp":1760029401000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/4\/270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,27]]},"references-count":49,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["info16040270"],"URL":"https:\/\/doi.org\/10.3390\/info16040270","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,27]]}}}