Implementation of Machine Learning Techniques to Assess the Authenticity of Multimedia Data

Authors

  • Shruthi S. Assistant Professor & Research Scholar, Computer Science Engineering, R R Institute of Technology, Bangalore-560 090, Visvesvaraya Technological University, Belagavi-590 018, India
  • Manjunath R. Professor & Head, Computer Science Engineering, R R Institute of Technology, Bangalore-560 090, Visvesvaraya Technological University, Belagavi-590 018, India.
  • Shivashankar Professor, Electronics & Communication Engineering, R R Institute of Technology, Bangalore, Visvesvaraya Technological University, Belagavi-590 018, India.

Keywords:

Convolution Neural Network, Generative adversarial networks, Repetitive Brain Organization, LSTM, Supervised learning

Abstract

Deep learning algorithms have become so strong because of expanded registering power that it is currently moderately simple to deliver endeavoring to utilize man-made brainpower (simulated intelligence). The casing level highlights are removed by our framework utilizing a Res-Next Convolution human-like counterfeit recordings, some of the time known as "profound fakes." The utilization of these life like face traded deepfakes to incite political turmoil, stage fear monger assaults, or blackmail individuals is effectively possible. In this paper, we give a clever profound learning-based framework that can effectively recognize between computerized reasoning produced bogus recordings and genuine ones. Naturally spotting substitution and re-order deepfakes is conceivable with our strategy. To battle man-made consciousness (computer based intelligence), we are brain organization, and these elements are then used to prepare the Long Momentary Memory (LSTM) based Repetitive Brain Organization to decide if the video has been controlled in any capacity, i.e., whether it is a deepfake or a genuine video. We test our strategy on a sizable amount of adjusted and blended informational collections made by joining the different open informational indexes like Face-Forensic++, Deepfake discovery challenge, and Celeb-DF to reenact continuous situations and work on the model's presentation on constant information. We likewise exhibit how our framework might create serious outcomes with an extremely clear and dependable methodology. In the mixed media information handling, the sight and sound information handling innovation is clearly better than the information mining innovation and information pressure innovation. At long last, under the help of profound learning information, we reason that sight and sound information handling innovation is generally utilized and cited in different fields. Accordingly, with the advancement of media, how much interactive media information is expanding; in this way, we ought to enthusiastically foster sight and sound information handling innovation in an overall manner.

Downloads

Download data is not yet available.

References

Yang Jing, Ma Haowei, Arshiya S. Ansari and G. Sucharitha, “Soft Computing Techniques for Detecting Cyberbullying in Social Multimedia Data”, ACM Journals, Journal of Data and Information Quality, Vol. 15, No. 3, pp 1–14, 2023.

Available online: https://theconversation.com/3-2-billion-images-and-720-000-hours-of-video-are-shared-online-daily-can-you-sort-real-from-fake-148630, 2023.

Xu Z, Hong Z, Ding C, Zhu Z, Han J, Liu J et.Al, “ MobileFaceSwap: A Lightweight Framework for Video Face Swapping”. Proceedings of the AAAI Conference on Artificial Intelligence, 28;36(3):2973–81, 2022.

Ehtiram Raza Khan, Saman Aisha, Deepak Kumar and Tabish Mufti, “A Systematic Review on Deepfake Technology”, In book: Proceedings of Data Analytics and Management, DOI:10.1007/978-981-19-7615-5_55, pp.669-685, 2023.

Jiacheng Lin, Yang Li and Guanci Yang, “Face de-identification method with generative adversarial networks for social robots”, Neural Networks, doi.org/10.1016/j.neunet.2020.09.001Vol. 133, pp.132-147, 2021.

Loc Trinh, Michael Tsang, Sirisha Rambhatla and Yan Liu, “Interpretable and Trustworthy Deep fake Detection via Dynamic Prototypes”, 2021 IEEE Winter Conference on Applications of Computer Vision, DOI:10.1109/WACV48630.2021.00202, 2021.

Yuming Gu, Mingming He, Koki Nagano, and Hao Li, “Protecting World Leaders Against Deep Fakes”, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 38-45, 2019.

Luca Guarnera, Oliver Giudice and Cristina Nastasi Sebastiano Battiato, “Preliminary Forensics Analysis of Deep Fake Images”, 2020 AEIT International Annual Conference (AEIT), doi.org/10.23919/AEIT50178.2020.9241108, 2020.

Ruben Tolosana, Ruben Vera-Rodriguez and Julian Fierrez, “Deep Fakes and Beyond:A Survey of Face Manipulation and Fake Detection”, Computer Vision and Pattern Recognition,

doi.org/10.48550/arXiv.2001.00179, Information Fusion, 2020.

Ming-Yu Liu, Xun Huang, Jiahui Yu, Ting-Chun Wang and Arun Mallya, “Generative Adversarial Networks for Image and Video Synthesis: Algorithms and Applications”, Proceedings of the IEEE, Vol.109, No.5, Pp.839 – 862, 2021.

SiweiLyu.(2020) Deepfake Detection, “Current Challenges And Next Steps”, IEEE International Conference on Multimedia & Expo Workshops, ISBN:978-1-7281-1486-6, 2020.

Deng Pan, Lixian Sun, Rui Wang, Xingjian Zhang and Richard O, “Deep fake Detection through Deep Learning”, IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, ISBN:978-1-6654-1567-5, 2020.

Dr.Manjunath R, S.Balaji, “Review & analysis of multimedia data miming tasks and models”, International Journal of Innovative Research in Computer and Communication Engineering, 2019.

Egor Zakharov, Aliaksandra Shysheya, Egor Burkov and Victor Lempitsky, “Few- Shot Adversarial Learning of Realistic Neural Talking Head Models”, IEEE/CVF International Conference on Computer Vision, ISBN:978-1-7281-4804-5, 2019.

Dr.Manjunath R, S.Balaji, “An Adapative Fuzzy C-means clustering method for retrieval of videos in multi media”, International Journal of Applied Engineering Research, 11 (9), 6680-6688, 2016.

T. O’Shea and J. Hoydis, “An introduction to deep learning for the physical layer,” IEEE Transactions on Cognitive Communications and Networking, vol. 11, no. 4, pp. 2715–2614, 2021.

Manjunath R, “Wireless Sensor Network Routing Protocols, Challenging Issues and Performance Comparison”, Journal of Theoretical and Applied Information Technology, ISSN: 1992-8645, . Vol.101, No 19 , 2023.

H. Frank, “Multimedia data maintaining and processing device,” Alexandria Engineering Journal, vol. 21, no. 2, pp. 1761–1524, 2021.

Dr. Manjunath R, “A Smart Biomedical Healthcare System to Detect Stress using Internet of Medical Things, Machine Learning and Artificial Intelligence”, International Journal of Intelligent Systems and Applications in Engineering, ISSN:2147-67992147, 2023.

Downloads

Published

23.02.2024

How to Cite

S., S. ., R., M. ., & Shivashankar, S. (2024). Implementation of Machine Learning Techniques to Assess the Authenticity of Multimedia Data. International Journal of Intelligent Systems and Applications in Engineering, 12(16s), 209–216. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4808

Issue

Section

Research Article