Deep Trace: Unravelling Deepfakes Through LSTM Analysis

Authors

  • D. Nandini Assistant Professor, Department of Information Science and Engineering, Jyothy Institute of Technology, Bengaluru, India
  • M. Abhishek UG Student, Department of Information Science and Engineering, Jyothy Institute of Technology, Bengaluru, India
  • M. Adithya UG Student, Department of Information Science and Engineering, Jyothy Institute of Technology, Bengaluru, India
  • G. Anirudha UG Student, Department of Information Science and Engineering, Jyothy Institute of Technology, Bengaluru, India
  • V. Charmyka Reddy UG Student, Department of Information Science and Engineering, Jyothy Institute of Technology, Bengaluru, India

Keywords:

Datasets, Deepfakes, Feature extraction, LSTM-CNN

Abstract

Due to the intense rising of deepfake data which is causing huge risk in maintaining and protecting the consistency of different variety of data like video, audio, images and some interactive elements. These deepfakes are also harming the wellbeing and harmony of the society. Therefore, this paper brings in solution for detecting deepfakes by employing combination of different technology is called dual architecture. The spectaculated structure flawlessly, unified both Res-Net and LSTM with CNN. The Res-Net mainly emphasizes on categorizing and distinguishing between original or manipulated images. Additionally, Res-Net filter- outs patterns from images which includes facial contours and embedded text. LSTM with CNN unit pin points on temporal coherence and it also recognizes the realness of the image. Transfer Learning ways are used where understanding and intelligence is gained by training the dataset to magnify the functionality and performance of the spectaculated structure. In, Overview the entire deep fake detection system demonstrates unified collaboration of Res-Net and LSTM- CNN for delivering, a effective deep fake system which helps from attacks that is being created from AI tools. From the proposed model by increasing the accuracy and robustness a reliable system is generated to solve the attacks happening in digital world.

Downloads

Download data is not yet available.

Downloads

Published

14-04-2024

Issue

Section

Articles

How to Cite

[1]
D. Nandini, M. Abhishek, M. Adithya, G. Anirudha, and V. C. Reddy, “Deep Trace: Unravelling Deepfakes Through LSTM Analysis”, IJRESM, vol. 7, no. 4, pp. 82–84, Apr. 2024, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2996