Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

A Survey on Deepfake Detection Techniques

Ms.Bismi Fathima Nasar, Ms.Sajini. T , Ms.Elizabeth Rose Lalson , ,
1: Computer Science and Engineering, ER & DCI Institute of Technology, KTU, Thiruvananthapuram, India , 2: Knowledge Resource Centre, CDAC, Thiruvananthapuram, India; 3 : Computer Science and Engineering, ER & DCI Institute of Technology, KTU, Thiruvananthapuram, India

With the recent advancement in the Deep Learning algorithm, its application has been broadened over various fields ranging from big data analytics to human biometric systems. One such field where it takes up the hand is the implementation of various application like FaceApp, FakeApp etc. that is used in the generation of manipulated media files which is termed as Deepfake. These application has a wider increase in its popularity among common public due to its user friendly features and are used in various domains like Digital Fraud, Cyber Crimes, Politics and in even in Military Activities. So, it is very much important to develop some kind of detection techniques that can take away this kind of forgeries and put up a new step in video and audio forensics. In this paper, we present the various creation and detection techniques that is up now in research in Deepfake using various techniques like Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Long Short Term Memory (LSTM) etc. and thus provide a backbone in the implementation of a new scheme that would be more compactable and accurate in the detection of Deepfakes. Also we done a comparison study on various techniques under traditional and state of the art approach and brought up a conclusion that most of the techniques under traditional approach are time consuming process, need expertise knowledge over the technology for the user to use them etc. where as in the case of state of the art approach, the techniques require less time for processing and anyone with less knowledge over the technology can use this technologies for the creation and detection of Deepfake.

Ms.Bismi Fathima Nasar,Ms.Sajini. T,Ms.Elizabeth Rose Lalson."A Survey on Deepfake Detection Techniques". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 08,pp.49-55, August- 2020, URL:,

Keywords : Recurrent Neural Network, Long Short Term Memory, Convolutional Neural Network, Deepfake

[1] Raahat Devender Singh, Naveen Aggarwal,” Video content authentication techniques: a comprehensive survey”, Springer, Multimedia Systems, pp. 211- 240, 2018.
[2] David G’uera Edward J. Delp,” Deepfake Video Detection Using Recurrent Neural Networks”, Video and Image Processing Laboratory (VIPER), Purdue University,2018.
[3] Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, Prem Natarajan,” Recurrent Convolutional Strategies for Face Manipulation Detection in Videos”, In proceeding of the IEEE Xplore Final Publication, pp. 80-87, 2018.
[4] Xinyi Ding, Zohreh Razieiy, Eric C, Larson, Eli V, Olinick, Paul Krueger, Michael Hahsler,” Swapped Face Detection using Deep Learning and Subjective Assessment”, Research Gate, pp. 1-9, 2019.
[5] Peng Zhou, Xintong Han, Vlad I. Morariu Larry S. Davis,” Two-Stream Neural Networks for Tampered Face Detection”, IEEE Conference on Computer Vision and Pattern Recognition, 2019
[6] Chih-Chung Hsu, Yi-Xiu Zhuang, and Chia-Yen Lee,” Deep Fake Image Detection based on Pairwise Learning”, MDPI, Applied Science,2020, doi:10.3390/app10010370.
[7] Fang Liu, Licheng Jiao, Fellow, IEEE, and Xu Tang, Member” Task- Oriented GAN for PolSAR Image Classification and Clustering”, IEEE Transactions On Neural Networks and Learning Systems, Volume 30, Issue 9, 2019.
[8] Jawadul H. Bappy, Cody Simons, Lakshmanan Nataraj, B.S. Manjunath, and Amit K. Roy-Chowdhury,” Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries”, IEEE Transaction on Image Processing, Volume: 28 , Issue: 7 ,pp. 1-14, 2019.
[9] Xinsheng Xuan, Bo Peng, Wei Wang and Jing Dong,” On the Generalization of GAN Image Forensics”, Computer Vision and Pattern Recognition, Cornell University, Volume 1, pp. 1-8, 2019.
[10] Yuezun Li, Siwei Lyu,” Exposing DeepFake Videos by Detecting Face Warping Artifacts”, In Proceedings of the IEEE Xplore Final Publication, pp. 46- 52, 2019.
[11] Pavel Korshunov, S´ebastien Marcel,” Speaker Inconsistency Detection in Tampered Video”, 26th European Signal Processing Conference (EUSIPCO), 2018, ISBN 978-90-827970-1-5.
[12] Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen,” Capsule- Forensics: Using Capsule Networks to detect Forged Images and Videos”, ICASSP, pp. 2307 – 2311, 2019
[13] Li, Y., Chang, M. C., and Lyu, S, “Exposing AI created fake videos by detecting eye blinking”, In IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 1-7). 2018.
[14] Steven Fernandes, Sunny Raj, Rickard Ewetz, Jodh Singh Pannu, Sumit Kumar Jha, Eddy Ortiz, Iustina Vintila, Margaret Salte,” Detecting deepfake videos using attribution-based confidence metric”, In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (pp. 308-309), 2020.
[15] A.M. Rodriguez, Z. Geradts,” Detection of Deepfake Video Manipulation”, In Proceedings of the 20th Irish Machine Vision and Image Processing conference, Belfast, Northern Ireland, pp. 133-136, 2018, ISBN 978-0-9934207-3-3.
[16] Rohini Sawant and Manoj Sabnis,” A Review of Video Forgery and Its Detection”, IOSR Journal of Computer Engineering (IOSR-JCE) e- ISSN: 2278-0661, Volume 20, Issue 2, p-ISSN: 2278-8727, 2018.
[17] Thanh Thi Nguyen, Cuong M. Nguyen, Dung Tien Nguyen, Duc Thanh Nguyen and Saeid Nahavandi,” Deep Learning for Deepfakes Creation and Detection”, IEEE, pp. 1-12, 2019.

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal