
some key research in deepfake detection along with
methods used and their strengths. This review of the
literature not only sheds light on existing tools and
methodologies in state-of-the-art but also reveals lim-
itations to be filled which becomes a backbone for our
proposed system.
2.1 Deepfake Detection Systems: A
Comparative Analysis
Most of the deepfake detection methods of manip-
ulated facial images explore other ways and means
in different approaches, for instance, developing the
system FaceForensics++ developed by R
¨
ossler et
al. (2019) , which utilizes trained XceptionNet and
MesoNet on a very extensive dataset to carry out ef-
fective detection without any issues for the detec-
tion of facial manipulation. Generally, one of its ap-
proaches is deemed to analyze posts after their up-
load and still contains delays, and thus calls for an
immediate, real-time solution in the implementation
by DeepSecure (R
¨
ossler et al., 2019).
Ivanov et al. (2020) proposed a deep learning sys-
tem combining ResNet50 CNN with FSRCNN to en-
hance the detection accuracy up to 95.5% by improv-
ing the image clarity. However, it is not easy to de-
ploy on mobile or in real-time due to its computa-
tion requirements. DeepSecure overcomes the limi-
tation of computational requirements because of op-
timized cloud-based processing, which allows for ef-
ficient and real-time detection while also managing
resource demands (Ivanov et al., 2020).
The morphed face detection system by Raghaven-
dra et al. (2017) makes use of VGG19 and
AlexNet models having P-CRC, which lends it an-
other strength for its digital as well as print scanned
morph detection. However because of the effective-
ness, one cannot apply it for better adaptability in
other manipulation because one has to constraint it
for morphing detection. DeepSecure advances this
method by expanding it in such a manner that it could
adapt itself to a number of wider manipulations in
making it multiple scenario adaptive (Raghavendra
et al., 2017).
Qurat-ul-ain et al. (2021) applied ELA using
VGG-16 and ResNet50 in detecting the forged faces.
The ELA techniques improved accuracy but small
datasets led to overfitting, which generally impacts
the real-world performance. DeepSecure is trained
over a large diverse dataset that makes it robust for
different applications in real life (ul ain et al., 2021).
The model by Kim and Cho (2021) utilizes
ResNet18 with a multi-channel convolutional ap-
proach to improve the detection on compressed im-
ages as well as even low-quality inputs. However, it
lacks real-time performance, thereby cannot be prac-
tically applied in the real world. DeepSecure has
been designed to perform at real-time, overcoming the
problem by offering instant detection-a need of the
hour, in order to prevent swift spread of manipulated
content (Kim and Cho, 2021).
Another important system by Zhang et al. (2018)
is based on SPN and SVM classification for morph
detection, which proves effective even with com-
pressed images. However, this is only morphing
and does not extend to other types of manipulations.
DeepSecure has stronger detection algorithms that
cover a wider range of manipulations, including deep-
fakes, thus making it more user-friendly across differ-
ent media platforms (Zhang et al., 2018).
Scherhag et al. (2019) conducted a survey on mor-
phing attacks and their detection techniques. This
study has a very wide survey of the morphing at-
tacks and its detection techniques with many theoret-
ical insights. However, it lacks practical implementa-
tion. The work was actually designed as being practi-
cal and deployable at the same time since it provides
real-time detection for immediate response (Scherhag
et al., 2019b).
The PRNU system developed by Scherhag et al.
(2019) combines spatial and spectral features toward
the goal of achieving very high detection rates, while
its high computational cost does not enable real-time
application. DeepSecure emphasizes scalability and
resource efficiency, which will be beneficial in mo-
bile and also real-time environments (Scherhag et al.,
2019a).
Abdullah et al. (2024) performed an in-depth re-
view of various deepfake detection techniques, es-
tablished their strength and weakness, but this did
not help in providing immediate solutions for real-
time applications. DeepSecure addresses the real-
time capabilities and offers a loop for improvement
because deepfake techniques change over time (Ab-
dullah et al., 2024).
Kuznetsov (2020) focused on remote sensing im-
age forgery detection using CNNs. It was highly ac-
curate for splicing and copy-move forgeries. Its do-
main specificity is less, so it cannot be applied gen-
erally in deepfake detection scenarios. DeepSecure,
a facial image manipulation detection technique de-
signed specifically, gives an efficient approach toward
applications in social media, news, and media verifi-
cation (Kuznetsov, 2020).
The current techniques have various drawbacks,
such as focusing on particular types of manipulation,
analysis offline, high computational cost, and lim-
ited adaptability. DeepSecure addresses the gap by
INCOFT 2025 - International Conference on Futuristic Technology
182