0% found this document useful (0 votes)
34 views17 pages

Fyp Proposal 11

Uploaded by

atg2479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views17 pages

Fyp Proposal 11

Uploaded by

atg2479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 17

Project Title

Image Forgery Detection and Localization Tool

Submitted by:

Ahsan Tariq 2020-CS-501

Waleed Madni 2020-CS-511

Syed Abdul Samad 2020-CS-524

Aizaz Haider 2020-CS-526

Supervised By:
Dr Mubashar Sidique

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
Approval Form
This is to certify that Ahsan Tariq Roll No 2020-CS-501, Waleed Madni Roll No. 2020-CS-
511,Syed Abdul Samad Roll No 2020-CS-524 and Aizaz Haider Roll No 2020-CS-526 have
successfully submitted the project proposal document for project named as: Image
Forgery Detection and Localization Tool at the Department of Computer Science &
Engineering, University of Engineering & Technology Lahore, Narowal Campus. It is
supervised by Dr Mubashar Sidique and is accepted as final year project.

______________________ _____________________
Project Supervisor Internal Evaluation Panel
Faculty Of CS&E - UET

_____________________________ ________________________
External Examiner Chairman

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
Table of Contents
ABSTRACT........................................................................................................................4
1. INTRODUCTION.....................................................................................................4
1.1. TYPES OF IMAGE FORGERY..................................................................................5
1.2. APPLICATIONS OF IMAGE FORGERY DETECTION AND LOCALIZATION................6
2. LITERATURE REVIEW.........................................................................................6
3. PROBLEM STATEMENT.....................................................................................11
4. PROPOSED SOLUTION.......................................................................................11
9. HARDWARE AND SOFTWARE SPECIFICATION.........................................13
10. TOOLS AND TECHNOLOGIES...........................................................................14
References..........................................................................................................................14

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
Abstract
In an age of digital manipulation, image forgery detection is essential for maintaining
confidence and preventing misinformation. It is crucial for government institutions and
public to ensure the authenticity of visual evidence such as verifying meter readings,
verification of fake news, investigating crimes, fact checking etc. However, current
methods often fall short of reaching high accuracy across many datasets, frequently
falling below 60%. Further developments in this field are required due to the lack of
user-friendly tools that enable the public to identify and locate image forgeries. To
overcome the mentioned limitations in detecting image tampering, the aim is to
develop an advanced solution. For detecting and localizing image tampering, this
solution will combine deep learning and machine learning approaches to train a robust
and highly accurate model. The deep learning algorithm will identify forged images,
while also localizing forgery through analysis of color and illumination variations.
Transfer learning will be employed to enhance accuracy using diverse datasets. The
resulting model will be integrated into a userfriendly image forgery detection and
localization tool for various industries. The aim is to provide users with optimal
performance and accuracy in predicting image forgeries, facilitating easy identification
of modifie.

1. Introduction
The proliferation of smart devices equipped with high-quality cameras and advanced
image processing applications, along with the widespread availability of desktop
computers, has resulted in a scenario where individuals can easily amass, store, and
manipulate an unprecedented volume of digital visual data. This is facilitated by the
constant interconnectivity of these devices, which are nearly always linked to both each
other and remote data servers through the Internet.
As a result, sharing videos and images has become commonplace, and they are now
regarded as essential sources of information in a variety of settings. Even professionals
who use smartphones significantly contribute to the documentation of many
commonplace events and data [1]. Various digital technologies [2], including effective
compression methods, fast networks, and specialized user apps, enable the wide-scale
exchange of visual images. These programs include web platforms like social networks
(like Instagram) and forums like Reddit, enabling the quick distribution of user-
generated photographs and videos. Additional factors that contribute to this
phenomenon include readily available, user-friendly picture editing software, including

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
both paid (like Adobe Photoshop [3]) and open source (like GIMP) options. These tools
also include smartphone apps that enable quick, basic image adjustments.
These elements have contributed to the spread of misleading or manipulated images
and films, where the true meaning or context has been significantly altered. This change
is occasionally done maliciously, for reasons like political or financial gain [4]. Major
social network platforms will struggle to filter falsified data adequately by 2022 to stop
the quick and widespread spread of such false content, especially when it preys on the
most gullible individuals [5]. The division of legal liability for potentially damaging effects
brought on by the spread of fraudulent news is likewise becoming more complex [6].
These challenges result from the fact that people can be easily tricked and sometimes
find it difficult to recognize subtle changes in visual information. This is further
aggravated by the "change blindness" cognitive impact, which makes it challenging for
people to notice even very minor changes in the material [7, 8]. Therefore, to properly
handle this issue, carefully developed digital techniques are very necessary.

1.1. Types of Image Forgery


Image forgery involves altering images using various methods. Some methods are basic,
like copying and pasting elements from one image to another. Others are more
advanced, utilizing deep learning and Generative Adversarial Networks (GANs) to create
realistic forgeries. These techniques can range from simple copy-pasting to
sophisticated AI-driven alterations.

Copy-move: Copy-move forgery involves copying parts of an image and pasting them
elsewhere within the same image. This technique is used to conceal or duplicate
elements, like objects or people, significantly changing what the image conveys. For
instance, in Figure 1a, the tower on the right has been duplicated by copying the tower
on the left.

Splicing: This forgery is akin to copy-move, but instead of copying from within the same
image, parts of the image are cut from one or more different images and then pasted
into the target image. Splicing forgery is often done to either conceal certain content or
present a fabricated scenario. For example, in Figure 1b, an image shows two famous
people seemingly together, but it's a combination of two separate images.

Inpainting: This is a technique where a specific region or "hole" in an image is filled with
plausible content. It's commonly used to restore damaged areas in images. However, it
can also be used maliciously by attackers to hide information within an image or remove

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
a visible watermark. The filled region can be copied from another part of the image or
generated using a specific algorithm, such as a GAN network (Generative Adversarial
Network) [35]. It's worth noting that when the filled region is copied from another part
of the image, this attack can be seen as a type of copy-move forgery.

DeepFakes: DeepFake is a specific type of manipulation where a deep learning model,


like Generative Adversarial Networks (GANs) [35], is utilized to create artificial content
in images or videos. The term "deep" underscores the shift from the time before deep
learning (DL), when experts had to manually manipulate content using professional
editing tools, to the current era where deep models automate this process.

GAN-based face synthesization: This is a popular method for creating realistic faces of
entirely fictional individuals. It utilizes Generative Adversarial Networks (GANs) to
achieve this. The process involves inputting a model trained with random noise, which
the model transforms into a realistic face that does not resemble any existing person.
Unlike copying from an existing source, this approach generates a new fake image.
Nvidia introduced groundbreaking GAN architecture in [45], revolutionizing this
technology. Interactive demonstrations based on this architecture are available online
[39].

1.2. Applications of Image Forgery Detection and Localization


Image forgery detection serves a multitude of practical applications across diverse
domains. In the realm of forensic analysis, it is an invaluable tool for identifying
manipulated or tampered images, making it essential in legal contexts as it ensures
authenticity of digital photographs or videos used as evidence.[15]Within the sphere of
journalism and media, image forgery detection plays a pivotal role in verifying the
authenticity of news photographs and videos, thereby upholding the credibility and
trustworthiness of media outlets.[16] Moreover, the authentication of historical images
and artistic works relies heavily on image forgery detection to thwart the creation and
circulation of counterfeit or forged pieces of art.[17]In the medical field, image forgery
detection safeguards the integrity of medical images used for critical purposes such as
diagnosis and treatment.[18] Likewise, it plays a pivotal role in maintaining academic
and scientific integrity by preventing the submission of manipulated or fabricated
research results, ensuring the credibility of scholarly work.[19] On social media and
online platforms, it helps combat the spread of fake or manipulated images, maintaining
the credibility of user-generated content[20]. Lastly, image forgery detection is
instrumental in safeguarding a company's brand reputation by identifying and mitigating

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
the spread of counterfeit or manipulated images that could harm its standing in the
market [21]. These applications collectively contribute to enhancing the trustworthiness
and authenticity of digital content in various domains.

2. Literature Review
Image tampering detection and localization is a challenging task, as forgers are
developing increasingly sophisticated techniques to tamper with images. However,
researchers have also made significant progress in developing new and more effective
image forgery detection methods in recent years. One of the most promising trends in
image forgery detection is the use of deep learning. Deep learning models can learn
complex patterns in images, which can be used to detect forged regions with high
accuracy. Another promising trend is the use of hybrid methods, which combine deep
learning with traditional image processing techniques. Hybrid methods can often
achieve better performance than either deep learning or traditional methods alone.

The paper [9] proposes a deep learning framework for image tampering detection and
localization. The framework consists of two main components: a feature extraction
network and a tampering detection and localization network. The feature extraction
network extract features from the input image, and the tampering detection and
localization network uses these features to detect and localize tampered regions in the
image. The feature extraction network is a deep convolutional neural network (CNN).
The CNN consists of a series of convolutional layers and pooling layers. The
convolutional layers extract features from the image, and the pooling layers reduce the
size of the feature maps. The tampering detection and localization network is a fully
connected neural network. The fully connected neural network takes the features
extracted by the CNN as input and outputs a probability map for each pixel in the image.
The probability map indicates the probability that each pixel is tampered.

The method [10] proposes a robust detection and localization technique for copy-move
forgery in digital images. The proposed technique is based on a deep learning model
that is trained on a large dataset of copy-move forged images.
The proposed technique consists of two main steps:
 Feature extraction: The first step is to extract features from the input image. The
proposed technique uses a deep learning model to extract features from the
image. The deep learning model is trained on a large dataset of natural images,
and it learns to extract features that are representative of the image content.

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
 Tampering detection and localization: The second step is to detect and localize
tampered regions in the image. The proposed technique uses a support vector
machine (SVM) to classify each patch in the image as either tampered or non-
tampered.
The paper [11] proposes a deep learning-based image tampering detection and
localization method using attention mechanisms. The proposed method consists of two
main components: a feature extraction network and a tampering detection and
localization network. The feature extraction network is a deep convolutional neural
network (CNN). The CNN consists of a series of convolutional layers and pooling layers.
The convolutional layers extract features from the image, and the pooling layers reduce
the size of the feature maps. The tampering detection and localization network is a fully
connected neural network. The fully connected neural network takes the features
extracted by the CNN as input and outputs a probability map for each pixel in the image.
The probability map indicates the probability that each pixel is tampered. The proposed
method uses attention mechanisms to focus on the most important regions of the
image for tampering detection and localization. The attention mechanisms learn to
identify regions in the image that are most likely to be tampered. The proposed method
is evaluated on several public datasets, and it achieves state-of-the-art results on both
tampering detection and localization.

The paper [12] proposes a multi-semantic CRF-based attention model for image forgery
detection and localization. The proposed model consists of three main components: a
feature extraction network, an attention module, and a conditional random field (CRF)
layer. The feature extraction network is a deep convolutional neural network (CNN). The
CNN consists of a series of convolutional layers and pooling layers. The convolutional
layers extract features from the image, and the pooling layers reduce the size of the
feature maps. The attention module learns to focus on the most important regions of
the image for tampering detection and localization. The attention module learns to
identify regions in the image that are most likely to be tampered. The CRF layer is used
to refine the predictions of the attention module. The CRF layer considers the spatial
and contextual relationships between pixels in the image to produce more accurate
predictions. The proposed model is evaluated on several public datasets, and it achieves
state-of-the-art results on both tampering detection and localization.

In [13], a copy-move forgery detection method is introduced, which is entirely based on


Deep Learning (DL). Unlike traditional approaches, there's no preprocessing to compute
separate features. The authors devised a Convolutional Neural Network (CNN) with the

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
following architecture: Six convolutional layers, each followed by a max pooling layer. A
Global Average Pooling (GAP) layer, serving to reduce the network's parameters and
mitigate overfitting. This layer functions like a fully connected dense layer. A softmax
classification with two classes: authentic or forged. This architecture was designed to
effectively identify copy-move forgeries in images.

Table 1
Method Detected Acc% CASIA1 CASIA2 ImageNet MICC- MICC- MICC- Columbia CoMoFoD
Attacks Acc% Acc% Acc% F220 F60 F2000 Acc% Acc%
Acc% Acc% Acc%

Zhang, Copy- 98.50 - 98.50 - - - - - -


J., et Move
al. [9]
(2023)
Patel, Copy- 99.20 - - - - - 99.20 - -
V., et Move
al. [10]
(2023)
Li, Y., Copy- 97.80 - - 97.80 - - - - 97.50
et al. Move,
[11] Splicing
(2022)
Wang, Copy- 97.50 - - 97.50 - - - - 97.50
Y., et Move,
al. [13] Splicing
(2021)
Elaskily Copy- 100 - - - 100 100 99.7 - -
et al. move
[13],
(2020)

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
Chart 1

In reference [14], the authors created a system to identify DeepFakes in images. They
built upon the XceptionNet design, initially introduced by Google in another research
paper [15]. The standout feature of their model is the use of a specialized layer named
SeparableConv. This layer serves to separate the depth-wise convolution from the
spatial convolution, resulting in a reduction of the model's weight count.

In the research presented in [15], a fresh approach to detect forgeries called Capsule-
Forensic was introduced. This approach stands out by employing Capsule Networks, a
specific type of neural network introduced in [16], as the binary detector, rather than
the conventional convolutional neural networks. Capsule Networks were developed to
effectively represent hierarchical relationships among objects in an image. They not only
estimate the probability of object presence but also infer important details about their
positions and orientations.

In [24], the researchers introduced a deep learning approach designed to identify


DeepFakes. Their method was built upon a key insight: DeepFakes generation
algorithms often produce noticeable irregularities in the face region due to differences
in resolution between the source and target image or video. Specifically, face images
generated by Generative Adversarial Networks (GANs) are typically set at a fixed low

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
resolution. When applied to a target video, affine warping is necessary to align the
source face with the facial landmarks of the target face. However, if the resolutions of
the source and target videos don't match or if the facial landmarks of the target person
significantly deviate from the standard frontal view, these irregularities become
increasingly prominent and detectable.

Table 2
Method DFDC Acc% FaceForensic++ Acc Celeb-DF Acc%
%
Thing, Vrizlynn LL 76.30 92.29 84.35
[40] (2023)
Rossler et al. [ 14] 49.9 99.7 48.2
(2019)
Nguyen et al. [15] 53.3 96.6 57.5
(2019)

Chart 2

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
3. Problem Statement
The review of existing literature highlights a crucial issue: there isn't a single method
that excels across various benchmark datasets such as CASIA1, CASIA2, ImageNet, MICC-
F220, MICC-F60, MICC-F2000, Columbia, and CoMoFoD. This gap emphasizes the
necessity for a model that demonstrates superior performance on all these datasets,
ensuring accurate and efficient forgery detection. Currently, there is a lack of easily
accessible tool for users to comprehensively detect image forgery. To address the gap
stated earlier and to create a user-friendly forgery detection tool, it's vital to devise a
method that exhibits exceptional performance across all the mentioned datasets while
maintaining high accuracy in detection.

4. Proposed Solution
The problem at hand will be tackled through the implementation of a solution
leveraging the transformative power of the Transformers Architecture for image forgery
detection and localization. This entails training a robust model on comprehensive
datasets utilizing the Transformers Architecture, renowned for its prowess in various
natural language processing tasks. The Transformers' attention-based mechanism
facilitates effective feature extraction, allowing the model to discern intricate patterns
and irregularities indicative of image forgeries. The model will be rigorously trained on
diverse datasets, including CASIA1, CASIA2, ImageNet, MICC-F220, MICC-F60, MICC-
F2000, Columbia, and CoMoFoD. Once the model is trained, it will be made accessible
through APIs, seamlessly integrated into a user-friendly tool. This tool will empower
general users to easily detect and pinpoint forgeries in images, addressing the need for
a comprehensive and accessible forgery detection solution.

5. Functional Units
Our image forgery detection tool makes use of crucial functional units like deep
learning, machine learning, and transfer learning integrated with a variety of datasets
for strong training and long-term accuracy. Work is already being done in past but our
main goal is to greatly increase accuracy levels, ensuring the best real-time performance
and authenticating digital content and graphics to improve security and integrity.

The main objectives are to


 Deploy a flexible tool for classifying and localizing fake and real photos.
 Giving users the best possible experience while making it easier to spot
changed photos.

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
 Ensuring that the general public has wide accessibility.
 Exceeding current accuracy benchmarks.
 Improving fraud prevention and data integrity procedures.

6. Application Architecture

Our tool uses a simplified single-tier application architecture that maximizes hardware
resources primarily for effective model training while minimizing data loss.
The following essential elements are included in the comprehensive deployable suite:
 User Interface (UI)
 Authentication and Authorization
 User Data Storage
 Image Preprocessing
 Forgery Detection Module
 Localization Module
 Dataset Integration
 Website Integration Plug-in
 Machine Learning Model
 Deployment and Hosting
 Compliance and Regulation

7. Objectives and Goals


The primary objectives and goals of this project are to develop an advanced image
forgery detection and localization solution that combines deep learning and machine
learning techniques. The project is designed to meet the urgent demand for precise
visual evidence verification in a time of digital manipulation. The objective is to locate
the areas of tampering by using deep learning algorithms to recognize fake photos and
analyze differences in color and illumination variations. A major goal is to improve the
model's ability to recognize different types of picture alteration by improving accuracy
by training it on a variety of datasets. The final goal is to develop an approachable
Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
solution that enables users from various sectors to quickly spot image alteration for fact
checking and investigative process.

8. Scope
In today's digital age, there is a pressing need for the development of an innovative and
robust online image forgery detection system. This system is designed to address the
growing concerns surrounding the authenticity of digital images, enabling users to verify
the trustworthiness of digital content more efficiently and reliably.

The proliferation of misinformation and digital manipulation has made it increasingly


challenging to discern genuine content from fabricated or altered material. This project
aims to create a comprehensive solution that employs cutting-edge technologies,
including deep learning and machine learning, to accurately detect and localize digital
images across various platforms.

The scope of this FYP encompasses the creation of an adaptable and user-friendly tool
that can be utilized by individuals, organizations, and the wider public to verify the
authenticity of online images. It seeks to bridge the gap in current content verification
methods, offering a more efficient and accessible means to combat the spread of
misinformation and ensure the integrity of digital images.

Moreover, the project lays the foundation for potential future enhancements and
applications in multiple sectors where image authenticity verification is paramount, such
as journalism, academia, and online media. By addressing the critical need for content
trustworthiness, this project aims to contribute significantly to the ongoing efforts to
combat misinformation in the digital era.

9. Hardware and Software Specification


A 32GB DDR4 RAM configuration is ideal for our system, ensuring ample memory
capacity to handle multitasking, complex applications, and overall improved
performance. Our system will be equipped with four NVIDIA GeForce GTX 1070 GPUs,
each boasting 8GB of VRAM. This adds up to a total of 32GB of GPU RAM, providing
substantial graphics processing power for demanding tasks such as gaming, 3D
rendering, and machine learning applications. To run our system efficiently, we
recommend using a computer with the following specifications:
 Processor: Intel Core i5 or equivalent
 RAM: 8GB
Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
 Operating System: Windows 10 (64-bit)

10. Tools and technologies


We've chosen Figma as our design tool to streamline collaboration and create visually
stunning designs for our project. Python will be used in our project as a programming
language. Our project involves the use of Anaconda on Windows to run Python.We're
building our project using the MERN stack, which combines MongoDB, Express.js, React,
and Node.js. This powerful technology stack enables us to create dynamic and
responsive web applications efficiently.

References
1. López-García, X., et al., Mobile journalism: Systematic literature review. 2019.
2. Passarella, A., A survey on content-centric technologies for the current Internet:
CDN and P2P solutions. Computer Communications, 2012. 35(1): p. 1-32.
3. Adobe. Adobe Photoshop. [cited 2023; Available from:
https://www.adobe.com/it/products/photoshop.html.
4. Shen, C., et al., Fake images: The effects of source, intermediary, and digital
media literacy on contextual assessment of image credibility online. New media
& society, 2019. 21(2): p. 438-463.
5. Spohr, D., Fake news and ideological polarization: Filter bubbles and selective
exposure on social media. Business information review, 2017. 34(3): p. 150-160.
6. Goldman, E., The complicated story of FOSTA and section 230. First Amend. L.
Rev., 2018. 17: p. 279.
7. Nightingale, S.J., K.A. Wade, and D.G. Watson, Can people identify original and
manipulated photos of real-world scenes? Cognitive research: principles and
implications, 2017. 2(1): p. 1-21.
8. Schetinger, V., et al., Humans are easily fooled by digital images. Computers &
Graphics, 2017. 68: p. 142-151.
9. https://www.jetir.org/papers/JETIR2309239.pdf
10. https://www.sciencedirect.com/science/article/pii/S1319157822004323
11. https://www.mdpi.com/2227-7390/10/20/3852
12. https://www.sciencedirect.com/science/article/pii/S0165168421000906?
casa_token=lV0EUkOvdiwAAAAA:Q0GDEPBROY8ufYKKq0C5-
9r_D6oBGSViKhuMWtPckdSwqjY5XkqespJyI9jhLeBqT3YEiV2xEIw
Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
13. Elaskily M, Elnemr H, Sedik A, Dessouky M, El Banby G, Elaskily O, Khalaf AAM,
Aslan H, Faragallah O, El-Samie FA (2020) A novel deep learning framework for
copy-move forgery detection in images. Multimed Tools Appl 79.
https://doi.org/10.1007/s11042-020-08751-7
14. Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nießner M (2019)
Faceforensics++: learning to ¨ detect manipulated facial images
15. Nguyen H, Yamagishi J, Echizen I (2019) Use of a capsule network to detect fake
images and videos
16. Hinton GE, Krizhevsky A, Wang SD (2011) Transforming auto-encoders. In:
Honkela T, Duch W, Girolami M, Kaski S (eds) Artificial Neural Networks and
Machine Learning – ICANN 2011. Springer, Berlin, pp 44–51
17. Fridrich, J., Soukal, D., & Lukas, J. (2003). Detection of Copy-Move Forgery in
Digital Images.
18. Farid, H. (2009). Digital Image Forensics: A Primer.
19. Christlein, V., Riess, C., Jordan, J., & Riess, C. (2012). An Evaluation of Popular Copy-
Move Forgery Detection Approaches.
20. Liu, G., Zhang, T., Lu, W., & Ma, S. (2014). A Survey of Passive Image Tampering
Detection.
21. Hussain, M., Muhammad, G., & Bebis, G. (2017). A Survey of Image Forgery
Detection Techniques.
22. Bappy, J. H., Roy-Chowdhury, A. K., & Bunk, J. (2017). Exploiting Spatial Structure for
Localizing Manipulated Image Regions.
23. Johnson, M. K., & Farid, H. (2015). Exposing Digital Forgeries in Interlaced and
Deinterlaced Video.
24. Li Y, Lyu S (2018) Exposing deepfake videos by detecting face warping artifacts
40. Thing, Vrizlynn LL. "Deepfake Detection with Deep Learning: Convolutional Neural
Networks versus Transformers." arXiv preprint arXiv:2304.03698 (2023).

Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus
Department of Computer Science & Engineering

University of Engineering & Technology, Lahore


Narowal Campus

Narowal Campus

You might also like