Edited_file_latex
Edited_file_latex
BACHELOR OF ENGINEERING
(Computer Engineering)
BY
Nikhil Singh Joadha Exam No:
Khushi Solanki Exam No:
Tejas Mehtre Exam No:
Gitesh Deshmukh Exam No:
Dr. K. C. NALAVADE
Dr. D. P. Patil
Principal
Sandip Institute of Engineering & Management
Is verified for its originality in documentation, problem statement, proposed work and
implementation successfully completed by
at
The rapid advancement of artificial intelligence has fueled the creation of deepfake
videos, posing serious ethical and security challenges. These videos use AI algorithms to
manipulate visual and auditory content, creating hyper-realistic media that can mislead
and deceive audiences. This project aims to develop a robust deepfake detection system
using a hybrid approach that leverages Convolutional Neural Networks (CNN), Recur-
rent Neural Networks (RNN) with Long Short-Term Memory (LSTM), and Generative
Adversarial Network (GAN) verification. By combining these models, our approach ef-
fectively captures both spatial and temporal features crucial for distinguishing between
authentic and manipulated videos.
The effectiveness of our model is evaluated using a confusion matrix, which assesses
metrics such as accuracy, precision, and recall. Results from experiments show that this
hybrid model significantly improves deepfake detection accuracy, outperforming tradi-
tional single-model approaches. This project’s hybrid framework has broad applications
in digital forensics, media authenticity verification, and social media monitoring, con-
tributing a powerful tool to combat the rising threat of deepfake media.
I would like to take this opportunity to thank my internal guide Dr. K. C. Nalavade
for giving me all the help and guidance I needed. I am really grateful to them for their
kind support. Their valuable suggestions were very helpful.
In the end our special thanks to Dr. D. P. Patil for providing various resources such as
laboratory with all needed software platforms, continuous Internet connection, for Our
Project.
1 Synopsis 1
1.1 Project Title . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Project Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Internal Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Sponsorship and External Guide . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Technical Keywords (As per ACM Keywords) . . . . . . . . . . . . . . . 2
1.6 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.8 Goals and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.9 Relevant Mathematics associated with the Project . . . . . . . . . . . . . 4
1.10 Names of Conferences / Journals where papers can be published . . . . . 4
1.11 Review of Conference/Journal Papers supporting Project idea . . . . . . 4
1.12 Plan of Project Execution . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Technical Keywords 6
2.1 Area of Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 Technical Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3 Introduction 8
3.1 Project Idea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Motivation of the Project . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5 Project Plan 16
5.0.1 Reconciled Estimates . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.0.2 Project Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.1 Risk Management w.r.t. NP Hard analysis . . . . . . . . . . . . . . . . . 18
5.1.1 Risk Identification . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.1.2 Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.1.3 Overview of Risk Mitigation, Monitoring, Management . . . . . . 19
5.2 Project Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.1 Project task set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.2 Task network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.3 Timeline Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3 Team Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3.1 Team structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3.2 Management reporting and communication . . . . . . . . . . . . . 22
8 Project Implementation 32
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
8.2 Tools and Technologies Used . . . . . . . . . . . . . . . . . . . . . . . . . 33
8.3 Methodologies/Algorithm Details . . . . . . . . . . . . . . . . . . . . . . 33
8.3.1 Algorithm 1/Pseudo Code . . . . . . . . . . . . . . . . . . . . . . 33
8.3.2 Algorithm 2/Pseudo Code . . . . . . . . . . . . . . . . . . . . . . 33
8.4 Verification and Validation for Acceptance . . . . . . . . . . . . . . . . . 33
10 References 37
2. Machine Learning
3. Neural Networks
4. Computer Vision
5. Image Processing
7. Temporal Dynamics
8. Artificial Intelligence
1.7 Abstract
The rapid advancement of artificial intelligence has fueled the creation of deepfake
videos, posing serious ethical and security challenges. These videos use AI algorithms to
manipulate visual and auditory content, creating hyper-realistic media that can mislead
and deceive audiences. This project aims to develop a robust deepfake detection system
using a hybrid approach that leverages Convolutional Neural Networks (CNN), Recur-
rent Neural Networks (RNN) with Long Short-Term Memory (LSTM), and Generative
Adversarial Network (GAN) verification. By combining these models, our approach ef-
fectively captures both spatial and temporal features crucial for distinguishing between
authentic and manipulated videos.
The effectiveness of our model is evaluated using a confusion matrix, which assesses
metrics such as accuracy, precision, and recall. Results from experiments show that this
hybrid model significantly improves deepfake detection accuracy, outperforming tradi-
tional single-model approaches. This project’s hybrid framework has broad applications
in digital forensics, media authenticity verification, and social media monitoring, con-
tributing a powerful tool to combat the rising threat of deepfake media.
• To evaluate the system on challenging datasets and compare its performance with
existing methods.
• Input:
• Output:
• Identify data structures, classes, divide and conquer strategies to exploit distributed/parallel/concu
processing, constraints.
• Success Conditions:
• Failure Conditions:
• Conferences/workshops in IITs
• IEEE/ACM Conference/Journal 2
2. Machine Learning
3. Neural Networks
4. Computer Vision
5. Image Processing
7. Temporal Dynamics
8. Artificial Intelligence
CHAPTER 3
INTRODUCTION
3.1 Project Idea
The project aims to develop a deepfake video detection system using a hybrid deep
learning approach. With the rise of deepfake technology, it has become challenging to
distinguish real from fake content, posing risks in security, media, and personal privacy.
Our solution combines Convolutional Neural Networks (CNN) for spatial feature extrac-
tion and Recurrent Neural Networks (RNN) with Long Short-Term Memory (LSTM) for
temporal analysis. Additionally, Generative Adversarial Network (GAN) verification is
used to enhance accuracy. Using FFmpeg and OpenCV, frames are extracted and pro-
cessed from videos to train the model, which is then tested and evaluated using metrics
like accuracy and confusion matrix. This project aims to create a robust, automated
tool to detect deepfakes, providing a reliable method for content verification in real-world
applications.
• To evaluate the system on challenging datasets and compare its performance with
existing methods.
• Long Training Time: CGiven the complexity of the hybrid model (CNN, RNN,
GAN), training can take a considerable amount of time, especially when work-
ing with large datasets. Long training times can slow down model iterations and
improvements
The figure 4.1 illustrates the workflow of a deepfake detection project, starting with the
dataset (DDFMD), which includes both real and deepfake videos. In the processing stage,
the videos are split into individual frames, where face detection is performed to identify
facial regions. These detected faces are then cropped to focus on the relevant portions of
the frames, and the cropped videos are saved to form the processed dataset. This dataset
is subsequently split into training and testing subsets for model development.
A data loader manages loading these subsets in batches to optimize memory usage
during training. The deepfake detection model consists of a CNN for extracting spatial
features from the frames, an LSTM for learning temporal relationships between frames,
and a ResNext architecture for advanced feature extraction to enhance detection capabil-
ity. For model evaluation, a confusion matrix is used to analyze the model’s performance
in terms of true and false predictions. Finally, the trained model is exported for practical
use, while the processed dataset and results can be used iteratively for further model
refinement.
4.4 Outcome
The expected outcome is a highly accurate and robust DeepFake video detection system
that can identify manipulated videos in real-time. This system will significantly enhance
security and privacy by mitigating the risks associated with deceptive content. It will
offer a user-friendly interface, be scalable for various data loads, and integrate seamlessly
with existing platforms. Designed for continuous improvement, the system will adapt
to evolving DeepFake technologies and provide detailed reporting to support effective
decision-making and response.
4.5 Applications
• Social Media Moderation: Detects and removes deepfake videos to prevent
misinformation, protecting users from manipulated content.
1. Operating System:
2. IDE:
3. Programming Language
CHAPTER 5
PROJECT PLAN
5.0.1 Reconciled Estimates
This section provides a detailed, unified projection of the estimated costs and time
required to complete the project, adjusted to fit the constraints of a student budget
and schedule. This reconciled estimate consolidates various cost estimates, taking into
account available resources and optimizing for affordability and efficiency.
Impact
ID Risk Description Probability
Schedule Quality Overall
1 Computational complexity leads High High Medium High
to real-time detection bottlenecks
2 Resource constraints exceed Medium High Medium High
hardware capabilities
3 GAN verification instability caus- Medium-High Medium High High
ing model inconsistency
4 Latency in live video stream Medium-High High Medium High
processing
Risk ID 2
Risk Description Description 2
Category Requirements
Source Software Design Specification documentation review.
Probability Low
Impact High
Response Mitigate
Strategy Better testing will resolve this issue.
Risk Status Identified
6.2.2 Use-cases
All use-cases for the software are presented. Description of all main Use cases using use
case template is to be provided.
• Performance Requirements
I D E A
Increase Drive Educate Accelerate
Improve Deliver Evaluate Associate
Ignore Decrease Eliminate Avoid
Table A.1: IDEA Matrix
• Project problem statement feasibility assessment using NP-Hard, NP-Complete or satisfy ability
issues using modern algebra and/or relevant mathematical models.
• input x,output y, y=f(x)
ANNEXURE B
LABORATORY ASSIGNMENTS ON
PROJECT QUALITY AND RELIABILITY
TESTING OF PROJECT DESIGN
It should include assignments such as
• Use of divide and conquer strategies to exploit distributed/parallel/concurrent processing of the
above to identify object, morphisms, overloading in functions (if any), and functional relations
and any other dependencies (as per requirements). It can include Venn diagram, state diagram,
function relations, i/o relations; use this to derive objects, morphism, overloading
• Use of above to draw functional dependency graphs and relevant Software modeling methods,
techniques including UML diagrams or other necessities using appropriate tools.
• Testing of project problem statement using generated test data (using mathematical models, GUI,
Function testing principles, if any) selection and appropriate use of testing tools, testing of UML
diagram’s reliability. Write also test cases [Black box testing] for each identified functions. You
can use Mathematica or equivalent open source tool for generating test data.
• Additional assignments by the guide. If project type as Entreprenaur, Refer [?],[?],[?], [?]
ANNEXURE C
PROJECT PLANNER
Using planner or alike project management tool.
ANNEXURE D
REVIEWERS COMMENTS OF PAPER
SUBMITTED
(At-least one technical paper must be submitted in Term-I on the project design in the conferences/workshops
in IITs, Central Universities or UoP Conferences or equivalent International Conferences Sponsored by
IEEE/ACM)
1. Paper Title:
2. Name of the Conference/Journal where paper submitted :
3. Paper accepted/rejected :
4. Review comments by reviewer :
5. Corrective actions if any :
ANNEXURE E
PLAGIARISM REPORT
Plagiarism report
ANNEXURE F
INFORMATION OF PROJECT GROUP
MEMBERS
one page for each student .