IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

REAL-TIME DEEPFAKE RECOGNITION

AUTHORS:
Thivya Sri.S
Mentor
Dr. Anbarasi .C
Affiliation
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Deepfake technology has grown rapidly with the advancement of artificial intelligence and deep learning techniques, enabling the creation of highly realistic manipulated images and videos that are often difficult to distinguish from genuine content. While this technology has useful applications in media and entertainment, its misuse has raised serious concerns in areas such as identity verification, digital communication, and financial transactions. The increasing spread of fake videos across social media platforms has led to misinformation, identity fraud, and cyber security risks. Traditional verification methods are often slow and unreliable, especially when dealing with large volumes of digital content. Therefore, the development of an automated and efficient real-time detection system has become essential to ensure digital trust and security. This project presents a Real-Time Deepfake Recognition System designed to detect manipulated facial content using computer vision and deep learning techniques. The system captures screen content, detects human faces using OpenCV Haar Cascade classifiers, and classifies the detected faces using a Vision Transformer (ViT) model to determine whether the face is real or fake. To improve reliability, temporal smoothing techniques and a confidence threshold are applied to produce stable and accurate results. The final output is displayed visually with bounding boxes and labels indicating the classification result. By enabling fast and reliable detection of fake facial content, the proposed system enhances digital security and supports applications such as digital banking verification, online examinations, remote interviews, and identity authentication systems.

Keywords
Article Metrics
Article Views
59
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Sri.S, T. (2026). Real-Time Deepfake Recognition. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.055

Sri.S, Thivya. "Real-Time Deepfake Recognition." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.055.

Sri.S, Thivya. "Real-Time Deepfake Recognition." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.055.

References
1.Rössler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nießner, M. (2019). FaceForensics++: Learning to detect manipulated facial images. Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 1-11.

2.Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., & Canton Ferrer, C. (2020). The DeepFake Detection Challenge Dataset. arXiv:2006.07397.

3.Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). MesoNet: A compact facial video forgery detection network. IEEE International Workshop on Information Forensics and Security (WIFS), 1-7.

4.Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., & Houlsby, N. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. International Conference on Learning Representations.

5.Chollet, F. (2017). Xception: Deep learning with depthwise separable convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1251-1258.

6.Li, L., Bao, J., Yang, H., Chen, D., & Wen, F. (2020). Face X-ray for more general face forgery detection. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 5001-5010.

7.Zhang, X., Karaman, S., & Chang, S. F. (2019). Detecting and simulating artifacts in GAN fake images. IEEE International Workshop on Information Forensics and Security.

8.Korshunov, P., & Marcel, S. (2018). Deepfakes: A new threat to face recognition? Assessment and detection. arXiv:1812.08685.

9.Nguyen, H. H., Yamagishi, J., & Echizen, I. (2019). Capsule-forensics: Using capsule networks to detect forged images and videos. IEEE International Conference on Acoustics, Speech and Signal Processing.

10.Verdoliva, L. (2020). Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910-932.

 

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
An Analytical Study on the Strategic Evolution and Growth Trajectory of Unacademy Institutions in India
string(29) "Kodati Naga Satya Sai Prakash" Prakash, K. N. S. S.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.541
Edge-Based Adaptive Traffic Signal Control using Computer Vision and Reinforcement Learning
string(10) "Naitik Rai" Rai, N.
(2026)
DOI: 10.55041/ijsmt.v2i5.225
The Role of the Journal Madhar Marumanam in Women’s Emancipation
string(14) "Dr.R.Kalaivani" Dr.R.Kalaivani,
(2026)
DOI: 10.55041/ijsmt.v2i4.358
Scroll to Top