International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 187 - Issue 42 |
Published: September 2025 |
Authors: Nithish Kumar S., Akhila S. |
![]() |
Nithish Kumar S., Akhila S. . A Dual-Stage Approach to Deepfake Video Detection Employing ResNet and LSTM Networks. International Journal of Computer Applications. 187, 42 (September 2025), 46-53. DOI=10.5120/ijca2025925739
@article{ 10.5120/ijca2025925739, author = { Nithish Kumar S.,Akhila S. }, title = { A Dual-Stage Approach to Deepfake Video Detection Employing ResNet and LSTM Networks }, journal = { International Journal of Computer Applications }, year = { 2025 }, volume = { 187 }, number = { 42 }, pages = { 46-53 }, doi = { 10.5120/ijca2025925739 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2025 %A Nithish Kumar S. %A Akhila S. %T A Dual-Stage Approach to Deepfake Video Detection Employing ResNet and LSTM Networks%T %J International Journal of Computer Applications %V 187 %N 42 %P 46-53 %R 10.5120/ijca2025925739 %I Foundation of Computer Science (FCS), NY, USA
Deepfake boom has emerged as greatest multimedia information authenticity threats. In this paper, in anticipation of this issue, we propose an end-to-end detection synergistically merged Residual Networks (ResNet) for spatial feature learning and a combination of Long Short- Term Memory (LSTM) and Convolutional Neural Network (CNN) for temporal sequence modeling. ResNet module effectively outputs rich facial and contextual data from one frame, and Long Short-Term Memory- Convolutional Neural Networks (LSTM-CNN) module tracks temporal dynamics to capture unusual facial movements and expressions between two frames. For enhancing the model's ability to generalize, we utilize transfer learning practices such as large dataset pre- training and fine-tuning on deepfake-specialized datasets. Experimental tests conducted on certain deepfake datasets validate the enhanced performance of the introduced framework based on accuracy, precision, and recall in comparison to other dominant state-of-the-art methods. The result validates the robustness of the framework and its applicability in real scenarios, which largely contributes to multimedia forensics as well as the fight against false digital propaganda.