Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection

    Chengsheng Yuan1,2, Baojie Cui1,2, Zhili Zhou3, Xinting Li4,*, Qingming Jonathan Wu5

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 899-914, 2024, DOI:10.32604/cmc.2023.045854

    Abstract In recent years, deep learning has been the mainstream technology for fingerprint liveness detection (FLD) tasks because of its remarkable performance. However, recent studies have shown that these deep fake fingerprint detection (DFFD) models are not resistant to attacks by adversarial examples, which are generated by the introduction of subtle perturbations in the fingerprint image, allowing the model to make fake judgments. Most of the existing adversarial example generation methods are based on gradient optimization, which is easy to fall into local optimal, resulting in poor transferability of adversarial attacks. In addition, the perturbation added to the blank area of… More >

  • Open Access

    ARTICLE

    Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries

    Alaa Alsaheel, Reem Alhassoun, Reema Alrashed, Noura Almatrafi, Noura Almallouhi, Saleh Albahli*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2461-2482, 2023, DOI:10.32604/cmc.2023.040257

    Abstract With the increasing use of deep learning technology, there is a growing concern over creating deep fake images and videos that can potentially be used for fraud. In healthcare, manipulating medical images could lead to misdiagnosis and potentially life-threatening consequences. Therefore, the primary purpose of this study is to explore the use of deep learning algorithms to detect deep fake images by solving the problem of recognizing the handling of samples of cancer and other diseases. Therefore, this research proposes a framework that leverages state-of-the-art deep convolutional neural networks (CNN) and a large dataset of authentic and deep fake medical… More >

  • Open Access

    ARTICLE

    Reducing Dataset Specificity for Deepfakes Using Ensemble Learning

    Qaiser Abbas1, Turki Alghamdi1, Yazed Alsaawy1, Tahir Alyas2,*, Ali Alzahrani1, Khawar Iqbal Malik3, Saira Bibi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4261-4276, 2023, DOI:10.32604/cmc.2023.034482

    Abstract The emergence of deep fake videos in recent years has made image falsification a real danger. A person’s face and emotions are deep-faked in a video or speech and are substituted with a different face or voice employing deep learning to analyze speech or emotional content. Because of how clever these videos are frequently, Manipulation is challenging to spot. Social media are the most frequent and dangerous targets since they are weak outlets that are open to extortion or slander a human. In earlier times, it was not so easy to alter the videos, which required expertise in the domain… More >

  • Open Access

    ARTICLE

    Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning

    R. Saravana Ram1, M. Vinoth Kumar2, Tareq M. Al-shami3, Mehedi Masud4, Hanan Aljuaid5, Mohamed Abouhawwash6,7,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2449-2462, 2023, DOI:10.32604/iasc.2023.030486

    Abstract Deep learning-based approaches are applied successfully in many fields such as deepFake identification, big data analysis, voice recognition, and image recognition. Deepfake is the combination of deep learning in fake creation, which states creating a fake image or video with the help of artificial intelligence for political abuse, spreading false information, and pornography. The artificial intelligence technique has a wide demand, increasing the problems related to privacy, security, and ethics. This paper has analyzed the features related to the computer vision of digital content to determine its integrity. This method has checked the computer vision features of the image frames… More >

Displaying 1-10 on page 1 of 4. Per Page