Deep Fake Detection using machine learning.pptx

AhmedAlaini 19 views 18 slides Oct 01, 2024
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

It is a presentation about deepfake detection


Slide Content

Deep Fake Detection Using Machine Learning ~By: Mr. Ahmed Alaini , Mr. Shehab Alkehtani , Mr. Bessam Alarifi , Mr. Abdulwahab Alsamawai Guided By : Prof. Malek Algabri Sana’a University Faculty of Computer and Technology August 2024

Content Introduction Literature Review Research objectives Research problems Significance and expected contribution Research Methodology Timeline Conclusion

What is Deep Fake?

Introduction Deep fake refers to synthetically generated content, primarily fake images and videos, created using AI which appear to be real. Potential Benefits of Deep fake Technology. Potential Risks of Deep fake Technology. The Growing Problem of Deep fake. Need for Solutions.

Conclusion Publication Year Author Paper Name Sr No This survey provides a timely overview of deepfake creation and detection methods. 2019 Thanh Thi Nguyen, Cuong M. Ngunyen Deep Learning for DeepFakes Creation and Detection 1 In this paper, we have presented a brief review of some papers which describes different methods to detect deepfake videos and images. 2021 Karthik P C, Sanjana Review of DeepFake Detection Techniques 2 Our comprehensive experiments demonstrated the feasibility of building a general detection method to deal with manipulated images and videos. 2018 Huy H. Nguyen, Junichi Yamagishi , and Isao Echizen CAPSULE-FORENSICS: USING CAPSULE NETWORKS TO DETECT FORGED IMAGES AND VIDEOS 3 In this paper, we present FakeCatcher , a fake portrait video detector based on biological signals. 2020 Umur Aybars Ciftci , Ilke Demir , and Lijun Yin FakeCatcher : Detection of Synthetic Portrait Videos using Biological Signals 4 Literature Survey

Existing Gaps: Most existing models are trained on specific datasets and may not generalize well to different real-world scenarios. Deep fake detection models are often susceptible to adversarial attacks, which can manipulate the model's predictions. Making it difficult to understand their decision-making process

Research objectives 1- Overall Objective 2- Specific Objectives

Research objectives Overall Objective To develop and evaluate machine learning models for effective and accurate detection of deep fake video and images across real-word scinarios .

Research objectives Specific Objectives Ethical Considerations Dataset Exploration improve generalizability. Model Development Model Evaluation

Research problems Technical Challenges Data-Related Challenges Deployment and Integration Challenges Communicating Difficulties in the group of researchers

Significance and expected contributions 1- Significance : Growing Social Issue Law Enforcement Enhance Social Media Platforms Guiding Future Research

Significance and Expected Contributions 2- Expected contributions: Critical Evaluation of Deep Learning High-Performance Deep fake detection model Emphasis on Data Quality Identification of Research Gaps  

Research Methodology Data Collection and Preprocessing Model Development Model Evaluation Adversarial Testing

Data Collection and Preprocessing Gather a comprehensive dataset of real and deep fake media, ensuring diversity in content, generation techniques, and quality.

Model Development  Design and train a deep learning model using convolutional neural networks (CNNs), recurrent neural networks (RNNs), or other suitable architectures.

Model Evaluation Evaluate the model's performance on diverse datasets, including benchmark datasets and real-world examples.

Adversarial Testing Investigate the model's resistance to adversarial attacks and different deep fake generation techniques.

Timeline Weak 1 :  Dataset collection, preprocessing, and model selection. Weak 2 :  Model training and optimization, initial evaluation. Weak 3 :  Adversarial testing. Weak 4 :  Final evaluation, report writing, and dissemination of findings.