0% found this document useful (0 votes)
16 views24 pages

Deepfake Project

The document is a mini project report on 'Deepfake Detection' submitted to Jawaharlal Nehru Technological University Hyderabad as part of a Bachelor's degree in Computer Science and Engineering. It outlines the project's objectives, methodologies, and the importance of detecting deepfakes to prevent misinformation and identity theft. The report includes acknowledgments, a declaration of originality, and an abstract detailing the use of advanced deep learning techniques for identifying manipulated media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views24 pages

Deepfake Project

The document is a mini project report on 'Deepfake Detection' submitted to Jawaharlal Nehru Technological University Hyderabad as part of a Bachelor's degree in Computer Science and Engineering. It outlines the project's objectives, methodologies, and the importance of detecting deepfakes to prevent misinformation and identity theft. The report includes acknowledgments, a declaration of originality, and an abstract detailing the use of advanced deep learning techniques for identifying manipulated media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

DEEPFAKE DETECTION

An Industry Oriented Mini Project Report Submitted to

Jawaharlal Nehru Technological University Hyderabad

In partial fulfillment of the


requirements for the award of the
degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

By
A.ROHIT 22E11A6201
D.SAI SHIVA RAM REDDY 22E11A6213
K.ESHWAR 22E11A6228
N.VENKATESH 22E11A6241
P.MANIDEEP 22E11A6245

Under the guidance of


DR.Ms.Nazneen Fathima
Assistant Professor
Department of Computer Science and Engineering

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE, EEE & Mechanical)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Ibrahimpatnam -501 510, Hyderabad, Telangana
JUNE 2025
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE, EEE & Mechanical)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Ibrahimpatnam -501 510, Hyderabad, Telangana

Certificate
This is to certify that the Industry Oriented Mini Project work
entitled
“DEEPFAKE DETECTION” is the bonafide work done
By

A.ROHIT 22E11A6201
D.SAI SHIVA RAM REDDY 22E11A6213
K.ESHWAR 22E11A6228
N.VENKATESH 22E11A6241
P.MANIDEEP 22E11A6245
in the Department of Computer Science and Engineering, BHARAT
INSTITUTE OF ENGINEERING AND TECHNOLOGY, Ibrahimpatnam is
submitted to Jawaharlal Nehru Technological University,
Hyderabad in partial fulfillment of the requirements for the award of
B.Tech degree in Computer Science and Engineering during 2024-
2025.

Supervisor: Dr.Ms.Nazneen Fathima Department I/C Dr.Ms.Nazneen Fathima


Assistant Professor Assistant Professor
Dept of Computer Science and Engineering Dept of Computer Science and Engineering
Bharat Institute of Engineering and Technology Bharat Institute of Engineering and Technology
Ibrahimpatnam–501 510, Hyderabad Ibrahimpatnam– 501 510, Hyderabad
Viva-Voce held on……………………………………………

Internal Examiner External Examiner

ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of the task would be put
incomplete without the mention of the people who made it possible, whose constant guidance
and encouragement crown all the efforts with success.

We avail this opportunity to express our deep sense of gratitude and hearty thanks to Sri
CH. Venugopal Reddy, Chairman & Secretary of BIET, for providing congenial atmosphere
and encouragement.

We would like to thank Prof. G. Kumaraswamy Rao, Former Director & O.S. of DLRL
Ministry of Defence, Sr. Director R&D, BIET, and Dr. V Srinivasa Rao, Dean CSE, for having
provided all the facilities and support.

We would like to thank our Department Incharge / HOD Ms.Nazneen Fathima, for
encouragement at various levels of our Project.

We are thankful to our Project Coordinator Ms.Nazneen Fathima, Assistant Professor,


Computer Science and Engineering for her support and cooperation throughout the process of
this project.

We are thankful to our guide Ms.Nazneen Fathima, Assistant Professor, Computer


Science and Engineering for his sustained inspiring Guidance and cooperation throughout the
process of this project. His wise counsel and suggestions were invaluable.

We express our deep sense of gratitude and thanks to all the Teaching and Non-Teaching
Staff of our college who stood with us during the project and helped us to make it a successful
venture.

We place highest regards to our Parent, our Friends and Well-wishers who helped a lot in
making the report of this project
A.ROHIT [22E11A6201]
D.SAI SHIVA RAM REDDY [22E11A6213]
K.ESHWAR [22E11A6228]
N.VENKATESH [22E11A6241]
P.MANIDEEP [22E11A6245]
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE, EEE & Mechanical)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Ibrahimpatnam -501 510, Hyderabad, Telangana

Declaration
We hereby declare that this Industry Oriented Mini Project is titled DEEPFAKE

DETECTION is a genuine Industry Oriented Mini Project work carried out by us, in
B.Tech {Computer Science and Engineering (CYBER SECURITY)}
degree course of Jawaharlal Nehru Technology University
Hyderabad, Hyderabad and has not been submitted to any other course or
university for the award of my degree by me.

Signatures of the Project team members

1.

2.

3.

4.

5.
ABSTRACT

This Industry Oriented Mini Project titled “DEEP FAKE” is a web application focuses on
identifying manipulated human faces in images or videos created using advanced deep
learning techniques like GANs and autoencoders. These forgeries often exhibit subtle
inconsistencies in facial features, expressions, eye blinking, head movements, or skin texture.
Detection methods leverage convolutional neural networks (CNNs) to analyze spatial and
temporal anomalies in facial regions. Techniques such as frequency analysis and
physiological cue detection further enhance accuracy. Datasets like FaceForensics++ and
Celeb-DF are commonly used for training. Effective facial deepfake detection is critical for
preventing misinformation, identity fraud, and digital impersonation.

Keywords: Deepfake Detection, Facial Manipulation

{
P
TABLE OF CONTENTS

Chapter Page
Title
No. No.
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii

Abstract.............................................................................................................................................................................. v

Table of Contents..............................................................................................................................................................vi

List of Figures..................................................................................................................................................................viii

List of Tables......................................................................................................................................................................ix

List of Symbols and Abbreviations.....................................................................................................................................x

1 Introduction………………………………………………………………………………………… 1
1.1 Android Technical Environment……………………………………………… 1

1.2 App Components………………………………………………..…………………… 2

1.3 Activating components…………………………………………….……………… 4 1.4 Introduction to deepfake


detection…………………………………………………………..

2 Related Work……………………………………………………………………………………….. 7
3 Motivation……………………………………………………………………………………………. 8
4 Objectives……………………………………………………………………………………………. 9
5 Problem Statement……………………………………………………………………………… 11
6 Design Methodology……………………………………………………………………………… 12

6.1 Architecture……………………………………………………………………………………. 12

6.2 Modules………………………………………………………………………………………… 14

6.3 Requirements Specifications…………………………………………………………. 21

6.3. UML Diagrams………………………………………………………………………………. 22

7 Experimental Studies…………………………………………………………………………… 28

P
7.1 Test Cases……………………………………………………………………………………… 31

7.2 Results Analysis…………………………….………………………………………………. 32

{
8 Conclusion and Future Scope………………………………………………................................ 36

References………………………………………………………………………………………………………. 37

{
P
LIST OF FIGURES

Figure Caption Page No.


No.
6.1 System Analysis Architecture……………………………………………………………….. 12

6.2 Technical architecture of proposed system ………………………………………………. 13

6.3 Use case diagram for deepfake detection……………………………………………………………. 22


6.4 Class diagram for deepfake detection ………………………………………………………………….. 23

{
PA
{
PA
LIST OF SYMBOLS AND ABBREVIATIONS

LIST OF ABBREVIATIONS
Symbol Description
APK Android Application Package
RFID Radio Frequency identification
OMA Open Mobile Alliance
DS Data Synchronization

{
PA
2024-2025

1. INTRODUCTION
1.1. Overview of Deepfakes
Deepfakes are synthetic media, such as images or videos, created using artificial
intelligence (AI) and machine learning (ML) techniques. These manipulated media can
be incredibly realistic, making it challenging to distinguish between authentic and fake
content.
1.2.Impact of Deepfakes
Deepfakes have significant implications for various aspects of society, including:
- Misinformation and disinformation: Deepfakes can be used to spread false information,
potentially influencing public opinion or causing harm to individuals or organizations.
- Identity theft and impersonation: Deepfakes can be used to impersonate individuals,
potentially leading to identity theft or reputational damage.
1.3.Importance of Detection
Detecting deepfakes is crucial to mitigate their potential harm. Effective detection methods can
help:

- Prevent the spread of misinformation


- Protect individuals' identities and reputations
- Maintain trust in digital media

2. RELATED WORK
Existing Deepfake Detection Methods
Several methods have been proposed for detecting deepfakes, including:

- Machine learning-based approaches: These methods use ML algorithms to classify media as


real or fake.
- Deep learning-based approaches: These methods use deep neural networks to detect
deepfakes.

Facial Detection in Deepfake Detection

{ PAGE } |
Page
2024-2025
Facial detection plays a crucial role in deepfake detection, as it can help identify manipulated
faces in images or videos.

Limitations of Current Methods


Current deepfake detection methods have limitations, including:

- Limited accuracy: Detection methods may not always accurately distinguish between real
and fake media.
- Vulnerability to adversarial attacks: Detection methods can be vulnerable to adversarial
attacks, which can compromise their effectiveness..

3. MOTIVATION
Need for Accurate Detection
There is a pressing need for accurate and reliable deepfake detection methods to
mitigate the potential harm caused by deepfakes.

Potential Applications
Deepfake detection has various potential applications, including:

- Cybersecurity: Deepfake detection can help prevent cyber attacks that utilize
deepfakes.
- Law enforcement: Deepfake detection can aid law enforcement agencies in
investigating crimes involving deepfakes.

4. OBJECTIVES
Primary Objective

The primary objective of this project is to detect deepfakes using facial detection.

Secondary Objectives

The secondary objectives include:

- Improving detection accuracy

- Enhancing robustness and efficiency

{ PAGE } |
Page
2024-2025
4.1 FEASIBILITY STUDY:
The feasibility of the project is analyzed in this phase. “All projects are feasible given
unlimited resources and infinite time”. But in reality both resources and time are scarce.
Project should confirm to time bounce and should be optimal in there consumption of
resources. These places a constant are approval of any project. Feasibility has applied to
Maintenance of Elementary School Data pertains to the following areas:

• TECHNICAL FEASIBILITY

• OPERATIONAL FEASIBILITY

• ECONOMICAL FEASIBILITY

TECHNICAL FEASIBILITY:

To determine whether the proposed system is technically feasible, we should take into
consideration the technical issues involved behind the system. Maintenance of Elementary
School Data uses the web technologies, which is rampantly employed these days worldwide.
The world without the web is incomprehensible today. That goes to proposed system is
technically feasible.

OPERATIONAL FEASIBILITY:

To determine the operational feasibility of the system we should take into consideration the
awareness level of the users. This system is operational feasible since the users are familiar
with the technologies and hence there is no need to gear up the personnel to use system.
Also the system is very friendly and to use.

ECONOMIC FEASIBILITY

To decide whether a project is economically feasible, we have to consider various factors


as:

• Cost benefit analysis

• Long-term returns

{ PAGE } | P
age
2024-2025
• Maintenance costs

The proposed Maintenance of Elementary School Data is computer based. It requires


average computing capabilities and access to internet, which are very basic requirements
and can be afforded by any organization hence it doesn’t incur additional economic
overheads, which renders the system economically feasible.

5. PROBLEM STATEMENT

Deepfake Detection Challenge


Detecting deepfakes is a challenging task due to the sophistication of deepfake generation
methods.

Facial Detection in Deepfakes


Using facial detection for deepfake detection poses specific challenges, including:

- Identifying manipulated faces


- Distinguishing between real and fake facial expressions

5.1 Existing System:


In the existing system, now a days finding the right application has become a tedious task and
to use them with ease of access is not the status quo. Lot of precious productive time is
perhaps wasted upon the pursuit of finding a free app which facilitates our needs with
efficiency and ease-of-access. Existing system doesn’t have display of the medicine by using
images along with the alarm system. Users have to pay money to use the facilities provided by
the application and it needs a lot of hardware equipments when implemented using
IOT(internet of things).

5.2 Proposed System:


System Components

- Facial Detection: The system uses facial detection algorithms, such as MTCNN Face
detector, to identify faces in images or videos.

- Deepfake Detection Model: The detected faces are then fed into a deepfake detection model,
which classifies them as real or fake. This model can be based on various architectures, such
as convolutional neural networks (CNNs) or vision transformers (ViTs).

{ PAGE } |
Page
2024-2025
- Patch-Wise Deep Learning Model: Another approach uses a patch-wise deep learning model,
which analyzes specific regions of the face to detect deepfakes ¹ ².

Techniques Used

- Single-Modal Detection: This involves analyzing a single modality, such as images or


videos, to detect deepfakes.

- Multi-Modal Detection: This approach combines multiple modalities, such as audio and
visual information, to improve detection accuracy.

- Frequency Analysis: Some systems use frequency analysis techniques to identify forgery
patterns in images or videos.

- Dynamic Face Augmentation: This technique involves augmenting face data to improve the
robustness of deepfake detection models

6. DESIGN METHODOLOGY

6.1 SYSTEM ARCHITECTURE

The System architecture consists of all the modules of the main module (Utility Shack.exe)
are shown below. However, it also shows how the modules access the resources and how
they interact with each other and communicate with each other. It also shows the input,
output and processing pathways of the application and also the flow of direction of input,
output and processing directions of the application.

{ PAGE } | P
age
2024-2025

Figure 6.1: System analysis architecture

6.2 MODULES:
6.2.1 Home page:
Home page is the First page visible for the user which contains two buttons named:
i. REGISTER BUTTON
ii. LOGIN BUTTON
If the user have no account in the application then the user has to press the “Register
Button” and if the user already have an account he then press the button named “Login”.

Abstract Source code:


from flask import Flask,
render_template, request
from tensorflow.keras.models import load_model
from tensorflow.keras.preprocessing.image img_to_array,
load_img
import numpy as np
import os
app = Flask(name)
model = load_model('deepfake_detection_model.h5’)

{ PAGE } |
Page
2024-2025
@app.route('/’)
def index():
return render_template('index.html’)
@app.route('/predict', methods=['POST’])
def predict():
image = request.files['image']
image_path = os.path.join('static', image.filename)
image.save(image_path)
img = load_img(image_path, target_size=(256, 256))
img = img_to_array(img) / 255.0
img = np.expand_dims(img, axis=0)
prediction = model.predict(img)[0][0]
result = "Fake" if prediction > 0.5 else "Real“
return render_template('index.html', result=result, image=image_path)
if name == 'main':
app.run(debug=True)

6.2.3 LOGIN PAGE:

If the user already have an account in the application then the user has to click the login
button in the home page and the application navigates the user to the “Login page”.

6.2.4 Admin Home Page:


Admin is the person who have control over all the users in the application and also have
control on the database.

6.3 Requirement Specifications:

6.3.1 Minimum Software Requirements

 Operating systems : WINDOWS 7/10/XP


 IDE ; ANDROID STUDIO SDK VERSION 3
 Back end : JAVA SE 11.0.3 jdk-8u231-windows-x64
 Front end : XML VERSION 1.0

 Database : FIREBASE 6.11.0

{ PAGE } | P
age
2024-2025
6.3.2 Minimum Hardware Requirements
• Processor : Intel i9
• RAM Capacity : 512 MB (or) Higher
• Cache : 256 MB
• Hard Disk : 10 GB

{ PAGE } |
Page
2024-2025

6.4 UML diagrams:

6.4.1 Use case diagram for deepfake detection

Figure 6.3: Use case diagram for deepfake detection

A use case diagram for medping shows as set of use cases and actors (admin ,user) and their
relationships .This Use case diagram is especially important in organizing and modeling
behavior of a medping system. It shows the action that are to be performed by the both the
user and admin.

{ PAGE } | P
age
2024-2025
6.4.2 Class diagram for deepfake detection

Figure 6.4: Class diagram for deepfake detection

This class diagram shows the set of classes, interfaces, collaboration and their relationships.
This Class diagram for medping includes all the active classes that are used to address this
static process view of a system.

{ PAGE } |
Page
2024-2025
7. EXPERIMENTAL STUDIES

7.1 Testing Process:


Black-box Testing and White-box Testing:

Black box testing is the Software testing method which is used to test the software without
knowing the internal structure of code or program. White box testing is the software
testing method in which internal Structure is being known o tester who is going to test the
software.

A strategy for system testing integrates system test cases and design techniques into a well
planned series of steps that results in the successful construction of software. The testing
strategy must cooperate test planning, test case design, test execution, and the resultant
data collection and evaluation. A strategy for software testing must accommodate lowlevel
tests that are necessary to verify that a small source code segment has been correctly
implemented as well as high level tests that validate major system functions against user
requirements.

Software testing is a critical element of software quality assurance and represents the
ultimate review of specification design and coding. Testing represents an interesting
anomaly for the software. Thus, a series of testing are performed for the proposed system
before the system is ready for user acceptance testing.

Testing Methodologies:

The following are the testing Methodologies:

• Unit Testing

• Integration Testing

• User Acceptance Testing

• Output Testing

• Validation Testing

{ PAGE } | P
age
2024-2025

Unit Testing:

Unit testing is essentially for the verification of the code produced during the coding phase
and the goal is test the internal logic of the module/program. In the Generic code project,
the unit testing is done during coding phase of data entry forms whether the functions are
working properly or not. In this phase all the drivers are tested they are rightly connected or
not.

Integration Testing:

All the tested modules are combined into sub systems, which are then tested. The goal is to
see if the modules are properly integrated, and the emphasis being on the testing interfaces
between the modules. In the generic code integration testing is done mainly on table
creation module and insertion module.

The following are the types of Integration Testing:

1. Top Down Integration

2. Bottom up Integration

User Acceptance Testing:

User acceptance of a system is the key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keeping in touch with the
prospective system users at the time of developing and making changes whenever required.
The system developed provides a friendly user interface that can easily be understood even
by a person who is new to the system.

Output Testing:

After performing the validation testing the next step is output testing of the proposed
system, since no system could be useful if it does not produce the required output in the
specified format.
Asking the users about the format required by them tests the outputs generated or displayed
by the system under consideration. Hence output format is considered in 2 ways- one is on
screen and another in printed format.

{ PAGE } |
Page
2024-2025

Validation Testing:

This testing concentrates on confirming that the software is error- free in all respects. All
the specified validations are verified and the software is subjected to hard-core testing. It
also aims at determining the degree of deviation that exists in the software designed from
the specification; they are listed out and are corrected.

8. CONCLUSION AND FUTURE WORK

CONCLUSION:
In conclusion, the proposed system for deepfake detection using facial detection has shown
promising results in identifying manipulated media. By leveraging facial detection algorithms
and deep learning models, this system can effectively distinguish between real and fake
content.

Key Findings
The study has demonstrated the effectiveness of using facial detection for deepfake detection,
with the proposed system achieving high accuracy in identifying manipulated faces. The use
of patch-wise deep learning models and frequency analysis techniques has also shown
potential in improving detection accuracy.

Implications
The findings of this study have significant implications for various fields, including
cybersecurity, law enforcement, and social media. By developing effective deepfake detection
methods, we can mitigate the potential harm caused by manipulated media and maintain trust
in digital content.

{ PAGE } | P
age
2024-2025

FUTURE WORK

1. Improving Robustness: Developing more robust deepfake detection methods that can
withstand adversarial attacks and various types of manipulation.

2. Real-Time Detection: Creating real-time deepfake detection systems that can identify
manipulated media in real-time.

3. Multi-Modal Detection: Exploring multi-modal detection approaches that combine


visual, audio, and other types of data to improve detection accuracy.

4. Explainability and Transparency: Developing methods to provide explanations and


insights into deepfake detection decisions, improving transparency and trust.

5. Large-Scale Evaluation: Conducting large-scale evaluations of deepfake detection


methods on diverse datasets to assess their performance and generalizability.

6. Adversarial Attack Detection: Developing methods to detect and mitigate adversarial


attacks designed to evade deepfake detection.

7. Integration with Existing Systems: Integrating deepfake detection with existing


cybersecurity and social media systems to prevent the spread of manipulated media.

Potential Applications

1. Social Media Monitoring: Using deepfake detection to monitor and mitigate the spread
of manipulated media on social media platforms.

2. Cybersecurity: Integrating deepfake detection with cybersecurity systems to prevent


cyber attacks that utilize deepfakes.

3. Law Enforcement: Assisting law enforcement agencies in investigating crimes involving


deepfakes.

4. Content Authentication: Developing methods to authenticate the authenticity of digital


content, ensuring its integrity and trustworthiness.

By exploring these future work directions, researchers and developers can continue to
improve the effectiveness and robustness of deepfake detection methods.

{ PAGE } |
Page

You might also like