Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Feb 22:8:e881.
doi: 10.7717/peerj-cs.881. eCollection 2022.

Deep learning model for deep fake face recognition and detection

Affiliations

Deep learning model for deep fake face recognition and detection

Suganthi St et al. PeerJ Comput Sci. .

Abstract

Deep Learning is an effective technique and used in various fields of natural language processing, computer vision, image processing and machine vision. Deep fakes uses deep learning technique to synthesis and manipulate image of a person in which human beings cannot distinguish the fake one. By using generative adversarial neural networks (GAN) deep fakes are generated which may threaten the public. Detecting deep fake image content plays a vital role. Many research works have been done in detection of deep fakes in image manipulation. The main issues in the existing techniques are inaccurate, consumption time is high. In this work we implement detecting of deep fake face image analysis using deep learning technique of fisherface using Local Binary Pattern Histogram (FF-LBPH). Fisherface algorithm is used to recognize the face by reduction of the dimension in the face space using LBPH. Then apply DBN with RBM for deep fake detection classifier. The public data sets used in this work are FFHQ, 100K-Faces DFFD, CASIA-WebFace.

Keywords: DBN; Deep fake; Deep learning; Fisherface; LBPH; RBM.

PubMed Disclaimer

Conflict of interest statement

The authors declare there are no competing interests.

Figures

Figure 1
Figure 1. Architecture of proposed work.
Figure 2
Figure 2. Pre-processing.
Figure 3
Figure 3. DBN with RBM.
Figure 4
Figure 4. Error rate in accuracy.
Figure 5
Figure 5. Computation time.
Figure 6
Figure 6. Training & validation accuracy and loss in proposed work.

References

    1. Afchar D, Nozick V, Yamagishi J, Echizen I. Mesonet: a compact facial video forgery detection network. 2018 IEEE international workshop on information forensics and security (WIFS); Piscataway. 2018. pp. 1–7.
    1. Allcott H, Gentzkow M. Social media and fake news in the 2016 election. Journal of economic perspectives. 2017;31(2):211–36. doi: 10.1257/jep.31.2.211. - DOI
    1. Arasaratnam I, Haykin S, Hurd TR. Cubature Kalman filtering for continuous-discrete systems: theory and simulations. IEEE Transactions on Signal Processing. 2010;58(10):4977–4993. doi: 10.1109/TSP.2010.2056923. - DOI
    1. Arunkumar P, Kannimuthu S. Mining big data streams using business analytics tools: a birds eye view on moa and samoa. International Journal of Business Intelligence and Data Mining. 2020;17(2):226–236.
    1. Badale A, Castelino L, Darekar C, Gomes J. Deep fake detection using neural networks. 15th IEEE international conference on advanced video and signal based surveillance (AVSS); Piscataway. 2018.

LinkOut - more resources