Skip to main content

Advertisement

Video authentication detection using deep learning: a systematic literature review

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Recent advancements in deep learning have notably influenced research across various data types, with a significant focus on video authentication. This area has emerged as a crucial aspect of ensuring the integrity and trustworthiness of video content amidst growing concerns over manipulation and falsification. It is emerging as a field ripe for exploration. This paper presents a systematic literature review (SLR) on using deep learning techniques for video authentication, addressing the urgent need for robust methods to verify video integrity amidst increasing manipulation threats. Reviewing literature from the past five years, this SLR reviews 99 research articles from the last five years and highlights the significant progress made through deep learning techniques (Convolution Neural Network (CNN), Recurrent Neural Network (RNN), Deep Neural Network (DNN), and Generative Adversarial Networks (GANs)). It aims to investigate applications, techniques, datasets, and challenges in video authentication, providing a comprehensive guide for researchers. This study encompasses a broad range of research articles, identifying key advancements and trends in combating video manipulation and focusing on maintaining digital media trustworthiness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

All articles reviewed are publicly available from the databases listed in the methodology section. Full references are provided in the reference list.

References

  1. Abbas Q, Alghamdi T, Alsaawy Y, Alyas T, Alzahrani A, Malik K, Bibi S (2023) Reducing Dataset Specificity for Deepfakes Using Ensemble Learning. CMC-Computers materials & continua. 74(2). https://doi.org/10.32604/cmc.2023.034482. WE - Science Citation Index Expanded (SCI-EXPANDED)

  2. Academic Press Inc (2024) Elsevier Science. Elsevier. Available from: https://booksite.elsevier.com/brochures/academicpress/. Accessed 12 Dec 2024

  3. Agarwal S, Farid H, El-Gaaly T, Lim S, IEEE (2020) Detecting Deep-Fake Videos from Appearance and Behavior. https://doi.org/10.1109/WIFS49906.2020.9360904 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  4. Akbari Y, Al Maadeed S, Elharrouss O, Ottakath N, Khelifi F (2024) Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone. Expert systems with applications. 238. https://doi.org/10.1016/j.eswa.2023.121603

  5. Akhtar N, Saddique M, Asghar K, Bajwa UI, Hussain M, Habib Z (2022) Digital video tampering detection and localization: review, representations, challenges and algorithm. Mathematics 10(2):168

    Article  Google Scholar 

  6. Alameri SA, Mohd M (2021) Comparison of fake news detection using machine learning and deep learning techniques. In: 2021 3rd International Cyber Resilience Conference (CRC). IEEE; p. 1–6. Available from: https://www.ftsm.ukm.my/v5/file/research/technicalreport/PS-FTSM-2020-032.pdf. Accessed 12 Dec 2024

  7. Alherbawi N, Shukur Z, Sulaiman R (2017) Current techniques in JPEG image authentication and forgery detection. J Eng Appl Sci 12(1):104–112

    Google Scholar 

  8. Ali NH, Harun F (2019) Video authentication using shot boundary detection technique—An overview. J Phys Conf Ser 1358(1):012061. Available from: https://iopscience.iop.org/article/10.1088/1742-6596/1358/1/012061/meta. Accessed 12 Dec 2024

  9. Alrawahneh A, Safei S (2021) A model of video watching concentration level measurement among students using head pose and eye tracking detection. J Theor Appl Inform Technol 99(17):4305–4315. Available from: https://www.jatit.org/volumes/Vol99No17/8Vol99No17.pdf. Accessed 12 Dec 2024

  10. Alsaheel A, Alhassoun R, Alrashed R, Almatrafi N, Almallouhi N, Albahli S (2023) Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries. CMC-COMPUTERS MATERIALS & CONTINUA, 76(2), 2461–2482. https://doi.org/10.32604/cmc.2023.040257 WE - Science Citation Index Expanded (SCI-EXPANDED)

  11. Amerini I, Anagnostopoulos A, Maiano L, Celsi L, IEEE (2021) Learning double-compression video fingerprints left from social-media platforms. https://doi.org/10.1109/ICASSP39728.2021.9413366 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  12. Anbu T, Milton Joe M, Murugeswari G (2022) A comprehensive survey of detection of tampered video and localization of tampered frame. Wirel Pers Commun 125(2):1–34. Available from: https://link.springer.com/article/10.1007/s11277-021-09227-z. Accessed 12 Dec 2024

  13. Arunkumar P, Sangeetha Y, Raja P, Sangeetha S (2022) Deep Learning for Forgery Face Detection Using Fuzzy Fisher Capsule Dual Graph. Information Technol Control 51(3):563–574. https://doi.org/10.5755/j01.itc.51.3.31510WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  14. Bae W, Nam S, Yu I, Kwon M, Yoon M, Lee H (2021) Dual-path convolutional neural network for classifying fine-grained manipulations in H264 videos. Multimedia Tools and Applications 80(20):30879–30906. https://doi.org/10.1007/s11042-021-10552-5

    Article  Google Scholar 

  15. Baek J, Yoo Y, Bae S (2020) Generative Adversarial Ensemble Learning for Face Forensics. IEEE Access 8:45421–45431. https://doi.org/10.1109/ACCESS.2020.2968612WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  Google Scholar 

  16. Balasubramanian S, Kannan R, Prabu P, Venkatachalam K, Trojovsky P (2022) Deep fake detection using cascaded deep sparse auto-encoder for effective feature selection. PEERJ COMPUTER SCIENCE, 8. https://doi.org/10.7717/peerj-cs.1040 WE - Science Citation Index Expanded (SCI-EXPANDED)

  17. Bei Y, Lou H, Geng J, Liu E, Cheng L, Song J, Song M, Feng Z (2024) A large-scale universal evaluation benchmark for face forgery detection. arXiv preprint arXiv:2406.09181. Available from: https://arxiv.org/abs/2406.09181. Accessed 12 Dec 2024

  18. Bekci B, Akhtar Z, Ekenel H, IEEE (2020) Cross-Dataset Face Manipulation Detection.

  19. Benoughidene A, Titouna F (2022) A novel method for video shot boundary detection using CNN-LSTM approach. Int J Multimedia Inform Retrieval 11(4):653–667. https://doi.org/10.1007/s13735-022-00251-8

    Article  Google Scholar 

  20. Bonettini N, Cannas E, Mandelli S, Bondi L, Bestagini P, Tubaro S, SOCIC (2021) Video Face Manipulation Detection Through Ensemble of CNNs. https://doi.org/10.1109/ICPR48806.2021.9412711 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  21. Christian A, Sheth R (2016) Digital video forgery detection and authentication technique-a review. Int J Scientific Res Sci Technol (IJSRST) 2(6):138–143

    MATH  Google Scholar 

  22. Ciftci UA, Demir I, Yin L (2020) How do the hearts of deep fakes beat? Deep fake source detection via interpreting residuals with biological signals. arXiv e-prints. Available from: https://ieeexplore.ieee.org/abstract/document/9304909. Accessed 12 Dec 2024

  23. Coccomini D, Caldelli R, Falchi F, Gennaro C, Amato G, ACM (2022) Cross-Forgery Analysis of Vision Transformers and CNNs for Deepfake Image Detection. https://doi.org/10.1145/3512732.3533582 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  24. Demir I, Çiftçi U, ACM (2021) Where Do Deep Fakes Look? Synthetic Face Detection via Gaze Tracking. https://doi.org/10.1145/3448017.3457387WE-ConferenceProceedingsCitationIndex-Science(CPCI-S)

    Article  Google Scholar 

  25. Ding X, Pan Y, Luo K, Huang Y, Ouyang J, Yang G, IEEE (2021) Localization of Deep Video Inpainting Based on Spatiotemporal Convolution and Refinement Network. https://doi.org/10.1109/ISCAS51556.2021.9401675 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  26. Elsevier (2024) Elsevier. Available from: https://www.elsevier.com/. Accessed 12 Dec 2024

  27. Fadl S, Han Q, Li Q (2021) CNN spatiotemporal features and fusion for surveillance video forgery detection. SIGNAL PROCESSING-IMAGE COMMUNICATION, 90. https://doi.org/10.1016/j.image.2020.116066 WE - Science Citation Index Expanded (SCI-EXPANDED)

  28. Fei J, Xia Z, Yu P, Xiao F (2021) Exposing AI-generated videos with motion magnification. Multimedia Tools and Applications 80(20):30789–30802. https://doi.org/10.1007/s11042-020-09147-3

    Article  Google Scholar 

  29. Ganguly S, Mohiuddin S, Malakar S, Cuevas E, Sarkar R (2022) Visual attention-based deepfake video forgery detection. Pattern Anal App 25(4):981–992. https://doi.org/10.1007/s10044-022-01083-2

    Article  Google Scholar 

  30. Gowda R, Pawar D (2023) Deep learning-based forgery identification and localization in videos. Signal Image Video Processing 17(5):2185–2192. https://doi.org/10.1007/s11760-022-02433-7

    Article  MATH  Google Scholar 

  31. Groshev A, Maltseva A, Chesakov D, Kuznetsov A, Dimitrov D (2022) GHOST-A New Face Swap Approach for Image and Video Domains. IEEE Access 10:83452–83462. https://doi.org/10.1109/ACCESS.2022.3196668WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  Google Scholar 

  32. Gu Q, Ding X, Zhang D, Yang C, IEEE (2022) Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation. https://doi.org/10.1109/TrustCom56396.2022.00104 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  33. He P, Li H, Li B, Wang H, Liu L (2020) Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error. IEEE Trans Circuits Syst Video Technol 30(11):4034–4049. https://doi.org/10.1109/TCSVT.2019.2951630WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  34. He P, Li H, Wang H, Wang S, Jiang X, Zhang R (2021) Frame-Wise Detection of Double HEVC Compression by Learning Deep Spatio-Temporal Representations in Compression Domain. IEEE Trans Multimedia 23:3179–3192. https://doi.org/10.1109/TMM.2020.3021234WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  35. Host K, Pobar M, Ivasic-Kos M (2023) Analysis of Movement and Activities of Handball Players Using Deep Neural Networks. J Imaging. 9(4). https://doi.org/10.3390/jimaging9040080 WE - Emerging Sources Citation Index (ESCI)

  36. Hussain S, Neekhara P, Jere M, Koushanfar F, McAuley J, IEEE (2021) Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples. https://doi.org/10.1109/WACV48630.2021.00339 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  37. IEEE (2024) IEEE Xplore. Available from: https://ieeexplore.ieee.org/. Accessed 12 Dec 2024

  38. Ikram S, Priya V, Chambial S, Sood D, Arulkumar V (2023) A Performance Enhancement of Deepfake Video Detection through the use of a Hybrid CNN Deep Learning Model. Int J electrical Computer Eng Systems. 14(2):169–178 WE - Emerging Sources Citation Index (ESCI).

  39. INC NP (2024) Now Publishers Inc. 2024. Available from: https://www.nowpublishers.com/Home . Accessed 12 Dec 2024

  40. INC P (2014) PeerJ Inc. Available from: https://peerj.com/. Accessed 12 Dec 2024

  41. Intelligence AAA (2024) Association for the Advancement of Artificial Intelligence. Available from: https://aaai.org/. Accessed 12 Dec 2024

  42. International Information and Engineering Technology Association (IIETA) (2024) IIETA. Available from: https://iieta.org/. Accessed 12 Dec 2024

  43. JJ Strossmayer University of Osijek, Faculty of Electrical Engineering (2024) International Journal of Engineering and Computer Science (IJECE). Available from: https://www.etfos.unios.hr/ijeces/. Accessed 12 Dec 2024

  44. Jegaveerapandian LM, Rani AJ, Periyaswamy P, Velusamy S (2023) A survey on passive digital video forgery detection techniques. International Journal of Electrical & Computer Engineering (2088–8708), 13(6).

  45. Jin X, Ye D, Chen C (2021) Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals. Security Commun Networks. 2021. https://doi.org/10.1155/2021/6626974 WE - Science Citation Index Expanded (SCI-EXPANDED)

  46. Johnston P, Elyan E, Jayne C (2020) Video tampering localisation using features learned from authentic content. Neural Comput Appl 32(16):12243–12257. https://doi.org/10.1007/s00521-019-04272-zWE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  Google Scholar 

  47. Joshi V, Jain S (2015) Tampering detection in digital video—a review of temporal fingerprints based techniques. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE; p. 1121–1124. Available from: https://ieeexplore.ieee.org/abstract/document/7100422. Accessed 12 Dec 2024

  48. Jung T, Kim S, Kim K (2020) DeepVision: Deepfakes Detection Using Human Eye Blinking Pattern. IEEE Access 8:83144–83154. https://doi.org/10.1109/ACCESS.2020.2988660WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  49. Kandasamy V, Hubálovsky S, Trojovsky P (2022) Deep fake detection using a sparse auto encoder with a graph capsule dual graph CNN. Peerj Computer Sci. 8. https://doi.org/10.7717/peerj-cs.953 WE - Science Citation Index Expanded (SCI-EXPANDED)

  50. Khodabakhsh A, Busch C (2020) A generalizable deepfake detector based on neural conditional distribution modelling. In: 2020 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE; p. 1–5. Available from: https://ieeexplore.ieee.org/abstract/document/9211032. Accessed 12 Dec 2024

  51. Kingra S, Aggarwal N, Kaur N (2023) SiamNet: Exploiting source camera noise discrepancies using Siamese Network for Deepfake Detection. Information Sciences, 645. https://doi.org/10.1016/j.ins.2023.119341

  52. Koshy L, Ajay S, Paul A, Hariharan V, Basheer A (2021) Video forgery detection using CNN. In: 2021 Smart Technologies, Communication and Robotics (STCR). IEEE; p. 1–6. Available from: https://ieeexplore.ieee.org/abstract/document/9588860. Accessed 12 Dec 2024

  53. Kumar A, Bhavsar A, Verma R, IEEE (2020) Detecting Deepfakes with Metric Learning. https://doi.org/10.1109/iwbf49977.2020.9107962 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  54. Kumar V, Gaur M, Kansal V (2022) Deep feature based forgery detection in video using parallel convolutional neural network: VFID-Net. Multimedia Tools Applications 81(29):42223–42240. https://doi.org/10.1007/s11042-021-11448-0

    Article  MATH  Google Scholar 

  55. Li Y, Bian S, Wang C, Polat K, Alhudhaif A, Alenezi F (2023) Exposing low-quality deepfake videos of Social Network Service using Spatial Restored Detection Framework. Expert Systems with Applications. 231. https://doi.org/10.1016/j.eswa.2023.120646

  56. Lin D, Tondi B, Li B, Barni M, IEEE (2022) Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors. https://doi.org/10.1109/IJCB54206.2022.10007959 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  57. Liu B, Wu M, Tao M, Wang Q, He L, Shen G, Chen K, Yan J (2020) Video Content Analysis for Compliance Audit in Finance and Security Industry. IEEE Access 8:117888–117899. https://doi.org/10.1109/ACCESS.2020.3005825WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  Google Scholar 

  58. LTD P-ES (2024) Pergamon-Elsevier Science Ltd. Available from: Available from: https://www.elsevier.com/. Accessed 12 Dec 2024

  59. Lu Y, Liu Y, Fei J, Xia Z (2021) Channel-wise spatiotemporal aggregation technology for face video forensics. Security Commun Networks 2021:1–13

    Article  MATH  Google Scholar 

  60. Lu Y, Liu Y, Fei J, Xia Z (2021) Channel-wise spatiotemporal aggregation technology for face video forensics. Security and Commun Networks. 2021. https://doi.org/10.1155/2021/5524930 WE - Science Citation Index Expanded (SCI-EXPANDED)

  61. Lyu S (2020) Deepfake detection: Current challenges and next steps. In: 2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW). IEEE; p. 1–6. Available from: https://ieeexplore.ieee.org/abstract/document/9105991. Accessed 12 Dec 2024

  62. Association for Computing Machinery (ACM) (2024) Association for Computing Machinery. Available from: https://www.acm.org/. Accessed 12 Dec 2024

  63. Manisha Li C, Kotegar K (2023) Source Camera Identification with a Robust Device Fingerprint: Evolution from Image-Based to Video-Based Approaches. Sensors, 23(17). https://doi.org/10.3390/s23177385 WE - Science Citation Index Expanded (SCI-EXPANDED)

  64. Maras M-H, Alexandrou A (2019) Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos. Int J Evidence Proof 23(3):255–262

    Article  MATH  Google Scholar 

  65. MDPI (2024) MDPI. Available from: https://www.mdpi.com/. Accessed 12 Dec 2024

  66. Megahed A, Han Q (2022) Identify videos with facial manipulations based on convolution neural network and dynamic texture. Multimedia Tools and Applications 81(30):43441–43466. https://doi.org/10.1007/s11042-022-13102-9

    Article  MATH  Google Scholar 

  67. Mehra A, Spreeuwers L, Strisciuglio N (2021). Deepfake Detection using Capsule Networks and Long Short-Term Memory Networks. https://doi.org/10.5220/0010289004070414WE-ConferenceProceedingsCitationIndex-Science(CPCI-S)

    Article  Google Scholar 

  68. Mercan S, Cebe M, Aygun RS, Akkaya K, Toussaint E, Danko D (2021) Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices. Security and Privacy 4(2):e143

    Article  Google Scholar 

  69. Mizher MA, Ang MC, Abdullah SNHS, Ng KW, Mazhar AA, Mizher MAA (2021) Passive object-based video authentication using stereo statistical descriptor on wavelet decomposition. In: 2021 International Conference on Information Technology (ICIT). IEEE; p. 791–798. Available from: https://ieeexplore.ieee.org/abstract/document/9491747. Accessed 12 Dec 2024

  70. Mohiuddin S, Malakar S, Kumar M, Sarkar R (2023) A comprehensive survey on state-of-the-art video forgery detection techniques. Multimedia Tools and Applications 82(22):33499–33539

    Article  Google Scholar 

  71. Montserrat D, Hao H, Yarlagadda S, Baireddy S, Shao R, Horvath J, Bartusiak E, Yang J, Guera D, Zhu F, Delp E, SOCIC (2020) Deepfakes Detection with Automatic Face Weighting. https://doi.org/10.1109/CVPRW50498.2020.00342 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  72. Munawar M, Noreen I (2021) Duplicate Frame Video Forgery Detection Using Siamese-based RNN. Intelligent Automation Soft Computing. 29(3):927–937. https://doi.org/10.32604/iasc.2021.018854 WE - Science Citation Index Expanded (SCI-EXPANDED)

  73. Nadimpalli A, Rattani A, IEEE (2022) On Improving Cross-dataset Generalization of Deepfake Detectors. https://doi.org/10.1109/CVPRW56347.2022.00019 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  74. Nirkin Y, Wolf L, Keller Y, Hassner T (2022) DeepFake Detection Based on Discrepancies Between Faces and Their Context. IEEE Transactions Pattern Anal Machine Intelligence 44(10):6111–6121. https://doi.org/10.1109/TPAMI.2021.3093446WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  75. Okoli C, Schabram K (2015) A guide to conducting a systematic literature review of information systems research. Available from: https://d1wqtxts1xzle7.cloudfront.net/3250666/OkoliSchabram2010SproutsLitReviewGuide-libre.pdf. Accessed 12 Dec 2024

  76. Pan Z, Yu W, Yi X, Khan A, Yuan F, Zheng Y (2019) Recent Progress on Generative Adversarial Networks (GANs): A Survey. IEEE Access 7:36322–36333

    Article  Google Scholar 

  77. Passos LA, Jodas D, Costa KA, Souza Júnior LA, Rodrigues D, Del Ser J, Camacho D, Papa JP (2024) A review of deep learning‐based approaches for deepfake content detection. Expert Syst 41(8):e13570. Available from: https://onlinelibrary.wiley.com/doi/abs/10.1111/exsy.13570. Accessed 12 Dec 2024

  78. Press TS (2024) Tech Science Press. Available from: https://www.techscience.com/. Accessed 12 Dec 2024

  79. PROCESSING-EURASIP EASSI (2024) EUROPEAN ASSOC SIGNAL SPEECH & IMAGE PROCESSING-EURASIP. Retrieved 30/06/2024 from https://eurasip.org/

  80. Publishing A (2024). AIP Publishing. Available from: https://pubs.aip.org/pages/about. Accessed 12 Dec 2024

  81. Ram R, Kumar M, Al-shami T, Masud M, Aljuaid H, Abouhawwash M (2023) Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning. Intelligent Automation Soft Computing. 35(2):2449–2462. https://doi.org/10.32604/iasc.2023.030486 WE - Science Citation Index Expanded (SCI-EXPANDED)

  82. Ranjan P, Patil S, Kazi F, IEEE (2020) Improved Generalizability of Deep-Fakes Detection Using Transfer Learning Based CNN Framework. https://doi.org/10.1109/ICICT50521.2020.00021 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  83. Raskar P, Shah S (2021) Real time object-based video forgery detection using YOLO (V2). forensic Sci Int. 327. https://doi.org/10.1016/j.forsciint.2021.110979

  84. Rodriguez-Ortega Y, Ballesteros D, Renza D (2021) Copy-Move Forgery Detection (CMFD) Using Deep Learning for Image and Video Forensics. Journal of Imaging, 7(3). https://doi.org/10.3390/jimaging7030059 WE - Emerging Sources Citation Index (ESCI)

  85. Rosli NA, Abdullah SNHS, Zamani AN, Ghazvini A, Othman NSM, Tajuddin NAAAM (2021) Comparison multi transfer learning models for deep fake image recognizer. In: 2021 3rd International Cyber Resilience Conference (CRC). IEEE; p. 1–6. Available from: https://ieeexplore.ieee.org/abstract/document/9392566. Accessed 12 Dec 2024

  86. Saif S, Tehseen S, Ali S, Kausar S, Jameel A (2022) Generalized Deepfake Video Detection Through Time-Distribution and Metric Learning. IT PROFESSIONAL 24(2):38–44. https://doi.org/10.1109/MITP.2022.3168351WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  87. Saini P, Ahuja R (2022) Watermarked Hashing As a Video Content Authentication Technique. ECS Trans 107(1):5211

    Article  MATH  Google Scholar 

  88. Saini P, Ahuja R, Kaur A (2021) A review on video authentication technique exploiting watermarking methods. In: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE; p. 1–5. Available from: https://ieeexplore.ieee.org/abstract/document/9596280. Accessed 12 Dec 2024

  89. Saxena D, Cao J (2021) Generative adversarial networks (GANs) challenges, solutions, and future directions. ACM Computing Surveys (CSUR) 54(3):1–42

    Article  MATH  Google Scholar 

  90. Schwarcz S, Chellappa R, Soc IC (2021). Finding Facial Forgery Artifacts with Parts-Based Detectors. https://doi.org/10.1109/CVPRW53098.2021.00104WE-ConferenceProceedingsCitationIndex-Science(CPCI-S)

    Article  Google Scholar 

  91. ScienceDirect (2024) ScienceDirect. Available from: https://www.sciencedirect.com/. Accessed 12 Dec 2024

  92. SECURITY-IJCSNS, I. J. C. S. N. (2024) International Journal of Computer Science and Network Security (IJCSNS). Available from: http://ijcsns.org/01_aim/01_aim_01.htm. Accessed 12 Dec 2024

  93. Sedik A, Faragallah O, El-sayed H, El-Banby G, Abd El-Samie F, Khalaf A, El-Shafai W (2022) An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning. Neural Comput Appl 34(2):1251–1268. https://doi.org/10.1007/s00521-021-06416-6

    Article  MATH  Google Scholar 

  94. Shanableh T (2022) HEVC video encryption with high capacity message embedding by altering picture reference indices and motion vectors. IEEE Access 10:22320–22329

    Article  MATH  Google Scholar 

  95. Shelke NA, Kasana SS (2021) A comprehensive survey on passive techniques for digital video forgery detection. Multimedia Tools and Applications 80:6247–6310

    Article  MATH  Google Scholar 

  96. Singh RD, Aggarwal N (2018) Video content authentication techniques: a comprehensive survey. Multimedia Syst 24:211–240

    Article  MATH  Google Scholar 

  97. Singla N, Singh J, Nagpal S (2023) Raven finch optimized deep convolutional neural network model for intra-frame video forgery detection. Concurrency and computation-practice & experience, 35(3). https://doi.org/10.1002/cpe.7516

  98. SpringerLink. (2024). SpringerLink. Available from: https://link.springer.com/. Accessed 12 Dec 2024

  99. Tariq S, Lee S, Woo S, ACM (2021) One Detector to Rule Them All Towards a General Deepfake Attack Detection Framework. https://doi.org/10.1145/3442381.3449809 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  100. Technology KU (2024) Kaunas University of Technology. Available from: https://www.itc.ktu.lt/index.php/ITC. Accessed 12 Dec 2024

  101. Teymourzadeh R, Laadi AA, Samir Y, Othman M (2018) Design an advanced computer-aided tool for image authentication and classification. arXiv preprint arXiv:1808.02085. Available from: https://arxiv.org/abs/1808.02085

  102. The Ho QN, Do TT, Minh PS, Nguyen V-T, Nguyen VTT (2023) Turning chatter detection using a multi-input convolutional neural network via image and sound signal. Machines 11(6):644

    Article  MATH  Google Scholar 

  103. Tran V, Lee S, Le H, Kim B, Kwon K, IEEE (2023) Learning Face Forgery Detection in Unseen Domain with Generalization Deepfake Detector. https://doi.org/10.1109/ICCE56470.2023.10043436 WE - Conference Proceedings Citation Index - Science (CPCI-S)

  104. Venkatachalam K, Trojovsky P, Hubálovsky S (2023) VIOLA jones algorithm with capsule graph network for deepfake detection. Peerj Computer Sci. 9. https://doi.org/10.7717/peerj-cs.1313 WE - Science Citation Index Expanded (SCI-EXPANDED)

  105. Verdoliva L (2018) Deep learning in multimedia forensics. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. ACM; p. 3–3. Available from: https://dl.acm.org/doi/abs/10.1145/3206004.3206024. Accessed 12 Dec 2024

  106. Vijayalakshmi V, Vasitha R, Vanitha V, Gayathri M (2016) A survey on real-time authentication and tampering detection in digital video. In: 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave). IEEE; p. 1–5. Available from: https://ieeexplore.ieee.org/abstract/document/7583926/. Accessed 12 Dec 2024

  107. Wiley (2024) Wiley. Available from: https://onlinelibrary.wiley.com/. Accessed 12 Dec 2024

  108. Wu B, Su L, Chen D, Cheng Y (2023) FPC-Net: Learning to detect face forgery by adaptive feature fusion of patch correlation with CG-Loss. IET Comput Vision 17(3):330–340. https://doi.org/10.1049/cvi2.12169

    Article  MATH  Google Scholar 

  109. Xia Z, Qiao T, Xu M, Zheng N, Xie S (2022) Towards DeepFake video forensics based on facial textural disparities in multi-color channels. Inf Sci 607:654–669. https://doi.org/10.1016/j.ins.2022.06.003

    Article  Google Scholar 

  110. Yi Y, Wang H, Li Q (2020) Affective Video Content Analysis With Adaptive Fusion Recurrent Network. IEEE Trans Multimedia 22(9):2454–2466. https://doi.org/10.1109/TMM.2019.2955300WE-ScienceCitationIndexExpanded(SCI-EXPANDED)

    Article  MATH  Google Scholar 

  111. Yoon M, Nam S, Yu I, Ahn W, Kwon M, Lee H (2022) Frame-rate up-conversion detection based on convolutional neural network for learning spatiotemporal features. Forensic Sci International. 340. https://doi.org/10.1016/j.forsciint.2022.111442

  112. Yu C, Chen K, Chang C, Ti Y (2022) SegNet: a network for detecting deepfake facial videos. Multimedia Syst 28(3):793–814. https://doi.org/10.1007/s00530-021-00876-5

    Article  MATH  Google Scholar 

Download references

Acknowledgements

The authors thank the Ministry of Higher Education, Malaysia, for funding support Fundamental Research Grant Scheme FRGS/1/2019/ICT02/UKM/02/9. A special appreciation to Cybersecurity Malaysia for collaborating with Universiti Kebangsaan Malaysia (UKM) under a research grant TT-2024-010.

Author information

Authors and Affiliations

Authors

Contributions

Ayat and Asyikin developed the search strategy; Ayat and Sarah screened the articles and extracted the data; Ayat and Dr. Hafizah conducted the quality assessment; Ayat drafted the manuscript; Dr. Huda reviewed and edited the manuscript for critical content.

Corresponding authors

Correspondence to Ayat Abd-Muti Alrawahneh or Siti Norul Huda Sheikh Abdullah.

Ethics declarations

Ethical and informed consent

This systematic review synthesizes data from previously published studies; therefore, no primary ethical approval or informed consent was required. All analysed studies were assessed for ethical standards and quality.

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this systematic review.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alrawahneh, A.AM., Abdullah, S.N.A.S., Abdullah, S.N.H.S. et al. Video authentication detection using deep learning: a systematic literature review. Appl Intell 55, 239 (2025). https://doi.org/10.1007/s10489-024-05997-8

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10489-024-05997-8

Keywords