Deepfake detection using deep learning methods: A systematic and comprehensive review

被引:98
作者
Heidari, Arash [1 ]
Navimipour, Nima Jafari [1 ,2 ,3 ]
Dag, Hasan [4 ]
Unal, Mehmet [5 ]
机构
[1] Halic Univ, Dept Software Engn, TR-34060 Istanbul, Turkiye
[2] Kadir Has Univ, Dept Comp Engn, Istanbul, Turkiye
[3] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu, Taiwan
[4] Kadir Has Univ, Management Informat Syst, Istanbul, Turkiye
[5] Nisantasi Univ, Dept Comp Engn, Istanbul, Turkiye
关键词
deep learning; deepfake; detection; neural networks; review; DIGITAL TWINS; NETWORK; IMAGES; FACE; INTERFERENCE; OPTIMIZATION; MANIPULATION;
D O I
10.1002/widm.1520
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep Learning (DL) has been effectively utilized in various complicated challenges in healthcare, industry, and academia for various purposes, including thyroid diagnosis, lung nodule recognition, computer vision, large data analytics, and human-level control. Nevertheless, developments in digital technology have been used to produce software that poses a threat to democracy, national security, and confidentiality. Deepfake is one of those DL-powered apps that has lately surfaced. So, deepfake systems can create fake images primarily by replacement of scenes or images, movies, and sounds that humans cannot tell apart from real ones. Various technologies have brought the capacity to change a synthetic speech, image, or video to our fingers. Furthermore, video and image frauds are now so convincing that it is hard to distinguish between false and authentic content with the naked eye. It might result in various issues and ranging from deceiving public opinion to using doctored evidence in a court. For such considerations, it is critical to have technologies that can assist us in discerning reality. This study gives a complete assessment of the literature on deepfake detection strategies using DL-based algorithms. We categorize deepfake detection methods in this work based on their applications, which include video detection, image detection, audio detection, and hybrid multimedia detection. The objective of this paper is to give the reader a better knowledge of (1) how deepfakes are generated and identified, (2) the latest developments and breakthroughs in this realm, (3) weaknesses of existing security methods, and (4) areas requiring more investigation and consideration. The results suggest that the Conventional Neural Networks (CNN) methodology is the most often employed DL method in publications. According to research, the majority of the articles are on the subject of video deepfake detection. The majority of the articles focused on enhancing only one parameter, with the accuracy parameter receiving the most attention. This article is categorized under:Technologies > Machine LearningAlgorithmic Development > MultimediaApplication Areas > Science and Technology
引用
收藏
页数:45
相关论文
共 156 条
[1]   Central obesity accelerates leukocyte telomere length (LTL) shortening in apparently healthy adults: A systematic review and meta-analysis [J].
Abbasalizad-Farhangi, Mahdieh .
CRITICAL REVIEWS IN FOOD SCIENCE AND NUTRITION, 2023, 63 (14) :2119-2128
[2]  
Afchar D, 2018, IEEE INT WORKS INFOR
[3]   Edge computing-based person detection system for top view surveillance: Using CenterNet with transfer learning [J].
Ahmed, Imran ;
Ahmad, Misbah ;
Rodrigues, Joel J. P. C. ;
Jeon, Gwanggil .
APPLIED SOFT COMPUTING, 2021, 107
[4]  
Ahmed S. R. A., 2021, APPL NANOSCI, V13, P1485
[5]  
Akhtar Z., 2020, 2020 IEEE INT C HUM
[6]  
Albahar M., 2019, J THEORETICAL APPL I, V97, P3242, DOI DOI 10.4018/978-1-4666-0978-5.CH001
[7]   A systematic review on Deep Learning approaches for IoT security [J].
Aversano, Lerina ;
Bernardi, Mario Luca ;
Cimitile, Marta ;
Pecori, Riccardo .
COMPUTER SCIENCE REVIEW, 2021, 40
[8]   Machine learning algorithms for social media analysis: A survey [J].
Balaji, T. K. ;
Annavarapu, Chandra Sekhara Rao ;
Bablani, Annushree .
COMPUTER SCIENCE REVIEW, 2021, 40
[9]   A blockchain-based approach to smart cargo transportation using UHF RFID [J].
Baygin, Mehmet ;
Yaman, Orhan ;
Baygin, Nursena ;
Karakose, Mehmet .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 188
[10]  
Bekci B, 2020, Cross-Dataset Face Manipulation Detection