Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
Deep learning has proven to be particularly effective in tasks such as data analysis, computer vision, and human control. However, as this method has become more advanced, it has also led to the creation of DeepFake video sequences and images in which alterations can be made without immediately appe...
| Main Authors: | Muhammad Salihin, Saealal, Mohd Zamri, Ibrahim, Marlina, Yakno, Nurul Wahidah, Arshad |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Engineering and Technology Publishing
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39131/ http://umpir.ump.edu.my/id/eprint/39131/1/4.May_JAIT-V14N3-488.pdf |
Similar Items
Awareness to Deepfake: A resistance mechanism to Deepfake
by: Ahmed, Mohammad Faisal Bin, et al.
Published: (2021)
by: Ahmed, Mohammad Faisal Bin, et al.
Published: (2021)
In-The-Wild deepfake detection using adaptable CNN models with visual class activation mapping for improved accuracy
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
Detection of compressed DeepFake video drawbacks and technical developments
by: Humidan, Amna-Saga, et al.
Published: (2022)
by: Humidan, Amna-Saga, et al.
Published: (2022)
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008)
by: Teoh, Chin Yew
Published: (2008)
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016)
by: Tew, Yiqi
Published: (2016)
Using cascade CNN-LSTM-FCNs to identify AI-altered video based on eye state sequence
by: Muhammad Salihin, Saealal, et al.
Published: (2022)
by: Muhammad Salihin, Saealal, et al.
Published: (2022)
Human pose stream for multi-stream convolutional network in video action classification
by: Tan, Jackson Zhe Sheng
Published: (2018)
by: Tan, Jackson Zhe Sheng
Published: (2018)
Enhanced hand vein segmentation using generative adversarial network integrated with modified ECA module
by: Marlina, Yakno, et al.
Published: (2025)
by: Marlina, Yakno, et al.
Published: (2025)
'Deepfake tech becoming very sophisticated'
by: Babulal, Veena
Published: (2019)
by: Babulal, Veena
Published: (2019)
Digital verification and authentication system for test certificates (DVASTC-COVID-19)
by: Rassem, Taha H., et al.
Published: (2021)
by: Rassem, Taha H., et al.
Published: (2021)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Statistical Analysis of Video Frame Size Distribution
Originating from Scalable Video Codec (SVC)
by: Ahmadpour, Sima, et al.
Published: (2017)
by: Ahmadpour, Sima, et al.
Published: (2017)
Spotting events in football videos with a combination of two-stream convolutional neural network and dilated recurrent neural network / Behzad Mahaseni
by: Behzad , Mahaseni
Published: (2021)
by: Behzad , Mahaseni
Published: (2021)
Registration verification using image of an object / Sabariah Rawi
by: Rawi, Sabariah
Published: (2007)
by: Rawi, Sabariah
Published: (2007)
Multibiometric systems based verification technique
by: Anwar, Farhat, et al.
Published: (2009)
by: Anwar, Farhat, et al.
Published: (2009)
Verification of scholars and references in Islamic websites
by: Mahmud, Murni, et al.
Published: (2011)
by: Mahmud, Murni, et al.
Published: (2011)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Enhanced Semantic Image Segmentation Through Convolutional and Atrous Convolution Techniques
by: Meghana, H.V., et al.
Published: (2024)
by: Meghana, H.V., et al.
Published: (2024)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
A review of Convolutional Neural Networks in Remote Sensing Image
by: Liu, Xinni, et al.
Published: (2019)
by: Liu, Xinni, et al.
Published: (2019)
Dataset size and dimensionality reduction approaches for handwritten farsi digits and characters recognition / Mohammad Amin Shayegan
by: Shayegan, Mohammad Amin
Published: (2015)
by: Shayegan, Mohammad Amin
Published: (2015)
Medical certificate verification system using QR code
by: Lai, Chong Lan
Published: (2014)
by: Lai, Chong Lan
Published: (2014)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Convolutional Long Short-Term Memory for fileless malware detection
by: Kareegalan, Kunaprasan
Published: (2024)
by: Kareegalan, Kunaprasan
Published: (2024)
Multi-view video plus depth representation with saliency depth video
by: Mohd Noor, Norul Uyuun, et al.
Published: (2015)
by: Mohd Noor, Norul Uyuun, et al.
Published: (2015)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014)
by: Khoh, W. H., et al.
Published: (2014)
Convolutional hypercube pyramid for accurate RGB-D object category and instance recognition
by: Mohd Zaki, Hasan Firdaus, et al.
Published: (2016)
by: Mohd Zaki, Hasan Firdaus, et al.
Published: (2016)
Handwritten character recognition using convolutional neural network
by: Khandokar, I., et al.
Published: (2021)
by: Khandokar, I., et al.
Published: (2021)
Real-time hand detection by depth images: a survey
by: Karbasi, Mostafa, et al.
Published: (2016)
by: Karbasi, Mostafa, et al.
Published: (2016)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Facial Recognition Using Convolutional Neural Network Using Real-Time
Data
by: Bharath, Kumara J, et al.
Published: (2024)
by: Bharath, Kumara J, et al.
Published: (2024)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Integrated authentication model: face verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Md Nor, Norzaliza, et al.
Published: (2010)
by: Md Nor, Norzaliza, et al.
Published: (2010)
Driver identification and driver's emotion verification using KDE and MLP neural networks
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2011)
Similar Items
-
Awareness to Deepfake: A resistance mechanism to Deepfake
by: Ahmed, Mohammad Faisal Bin, et al.
Published: (2021) -
In-The-Wild deepfake detection using adaptable CNN models with visual class activation mapping for improved accuracy
by: Muhammad Salihin, Saealal, et al.
Published: (2023) -
Detection of compressed DeepFake video drawbacks and technical developments
by: Humidan, Amna-Saga, et al.
Published: (2022) -
Two-dimensional barcodes for hardcopy document integrity verification
by: Teoh, Chin Yew
Published: (2008) -
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016)