<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2026</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>نمونه اولیه ابزار تشخیص جعل عمیق بر اساس ارتقا و تلفیق شبکه‌های از پیش آموزش‌یافته</title_fa>
	<title>A Tool Prototype for Deepfake Detection Based on the Enhancement and Integration of Pre-trained Neural Networks</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>پژوهشی</content_type_fa>
	<content_type> Research Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;دیپ&#8204;فیک&#8204;ها به عنوان داده&#8204;های مصنوعی تولیدشده با فناوری&#8204;های یادگیری عمیق، قادر به دستکاری یا جایگزینی هویت، اقدامات و ویژگی&#8204;های افراد در محتوای تصویری و ویدئویی موجود هستند. این فناوری، با ایجاد محتوای تقلیدی بسیار متقن و نزدیک به واقعیت، چالش&#8204;های فنی را به همراه دارد. اگرچه کاربردهای مثبتی در حوزه&#8204;هایی مانند هنر، صنعت فیلم و تبلیغات دارد، اما سوءاستفاده از آن جهت انتشار اطلاعات نادرست، بدنام&#8204;سازی افراد یا احزاب، ایجاد بی&#8204;ثباتی سیاسی و ارتکاب جرایم سایبری، تهدیدات عمیقی در ابعاد سیاسی، اجتماعی و اقتصادی ایجاد کرده است. تشدید این تهدیدات توسط گستره و قدرت تحویل اطلاعات در شبکه&#8204;های اجتماعی، لزوم توسعه ابزارهای دقیق و کارآمد برای تشخیص و طبقه&#8204;بندی محتوای دیپ&#8204;فیک رابه امری حیاتی تبدیل نموده است. در پاسخ به این ضرورت، دستاورد ارائه شده به طراحی، پیاده&#8204;سازی و توسعه یک اپلیکیشن تحت وب&amp;nbsp; تخصصی برای تشخیص و طبقه&#8204;بندی دیپ&#8204;فیک در ویدئوها و تصاویر پرداخته است. رویکرد اصلی این ابزار، بهبود و تلفیق چندین مدل پیش&#8204;آموزش&#8204;دیده مهم است که امکان شناسایی تغییرات ناشی از دیپ&#8204;فیک، به&#8204;ویژه جایگزینی چهره، را با دقتی فراتر از روش&#8204;های فعلی فراهم می&#8204;کند. سیستم توسعه&#8204;یافته موفق به دستیابی به دقتی در حدود ۰/۹۹ در فرآیند تشخیص و طبقه&#8204;بندی دیپ&#8204;فیک&#8204;ها شده است. این نتایج، گامی مؤثر در جهت مقابله با تهدیدات فزاینده محتوای جعلی عمیق به همراه خواهد داشت.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:&amp;quot;Times New Roman&amp;quot;,serif&quot;&gt;Deepfakes, as synthetic data generated using deep learning technologies, enables the manipulation or replacement of individuals&amp;rsquo; identities, actions, and attributes in existing image and video content. As an example, deepfake technology utilizing deep learning technology enables contents generation wherein a subjected individual has been removed or swapped with another targeted subject. Generating fake contents is not a recent or newborn technology, however deepfake which uses high-tech Machin Learning techniques elaborates the generated fake content to appear much more realistic than before. By producing highly convincing and realistic imitative media, this technology introduces significant technical challenges. While deepfakes have beneficial applications in domains such as art, filmmaking, and advertising, their malicious use for spreading misinformation, defaming individuals or organizations, fostering political instability, and facilitating cybercrime poses serious political, social, and economic threats. These risks are amplified by scale and velocity of disseminated and spread information on social media platforms. These concerns have rendered the development of accurate and efficient tools for deepfake detection and classification a critical and even vital necessity. To address this point, developing tools which are able to detect and classify the originality of subjected contents and verifies whether they are real have been concentrated since recent past years. Despite of this trend, development of such tools or systems is bound with many challenges. One of the main challenges is generalization problem wherein the developed tools fail while facing significantly different fake contents. This concern is of great importance wherein, fake contents are generated using diverse technologies or tools. To address this point, recent approaches have been biased towards using engineered datasets which let the models more concentrated on general and common features of deep contents rather than specialized ones dedicated to a specific fake dataset. However, the aforementioned approach shows some restrictions while dominating on all features in synthesized objects is not a trivial task for the discriminating model. As a result, the generated model might show a weak performance subjected to the fake contents with unknown features. This problem introduces a serious obstacle in design and development of generalizable approaches which outperform the classical approaches in discriminating fake contents from real ones significantly. In order to address this important problem, in this work we have tried to combine two different learning models to capture the features not only by concentrating on generated fake data but also on synthesized data with generic fake features. As the first step, we have used a pretrained model, whose initial training was based on a dataset in which fake negatives were generated by applying pre-identified fake artifacts to real images. This step helps the model learn general and common features among deep fakes, without getting trapped in the specific features of a dataset. In the second step, we retrained the pretrained model using a fine-tuning method on a new set of real negatives. In this step, by using a low learning rate as a trick, we allowed the model to learn more specific, complex, and unknown features present in the fake data, without completely overwriting or forgetting the learnings from the first step. To implement and assess the aforementioned idea of combined learning paradigms, two modern deepfake detection have been employed. The first model is based on Self-Blended Images wherein the source and target subjects (images) are combined by each other using extracted masks based on simple transformation like color adjustments or frequency transformation. The second model is based on a Localized Artifact Attention Network (LAA-Net) aiming at discriminating high-quality deepfake images focusing on local and fine features in fake images. The latter model utilizes EfficientNet-B4 as its base architecture pretrained on ImageNet dataset. Using this approach, the developed model integrates and refines multiple prominent pre-trained models enabling the identification of deepfake-induced face swap manipulation, with accuracy surpassing existing methods. The proposed system achieves an accuracy of approximately 0.99 in deepfake detection. These results represent a meaningful step toward mitigating the growing threats posed by synthetic fake media. In order to provide a platform for practical, commercial and industrial use of the AI model developed in this research, a prototype of a deep fake (currently dedicated for face swap deepfakes) detection tool has been designed and implemented. This tool has been developed in the form of a bilingual (Persian and English) website and allows users to upload and analyze images and videos. To implement the developed model, a workstation equipped with Ubuntu 24.04.1 LTS as its OS was used to run the experiments and train the models. The hardware of this system includes an Intel Xeon Gold 6148 processor with 40 cores and a frequency of 3.7 GHz, an NVIDIA GeForce RTX 4090 graphics card with 24 GB of dedicated memory, and 160 GB of main memory. This hardware configuration allowed for training deep models and processing large amounts of data with reasonable efficiency. During training, the GPU consumption was on average close to 100%, indicating full utilization of its computational capacity. Also, the execution time of each epoch lasted on average about 310 seconds. Although achieving interesting results in this work, some restrictions exist which might impact on generalizability and usability of developing such systems. One of the main restrictions is large sample size of benchmark data and their accessibility issue. The other concern is requirements to high-performance processing resources. Finally, generalizing the detection capability to other categories of deepfake rather than just face swap introduces also another restriction which impact on the usability as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</abstract>
	<keyword_fa>جعل عمیق, شبکه‌های مولد تخاصمی, طبقه بندی, جرائم سایبری, یادگیری انتقالی</keyword_fa>
	<keyword>Deepfake, Generative adversarial network, Classification, Cybercrime, Transfer learning</keyword>
	<start_page>52</start_page>
	<end_page>59</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-407-17&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Morteza</first_name>
	<middle_name></middle_name>
	<last_name>Ziabakhsh</last_name>
	<suffix></suffix>
	<first_name_fa>مرتضی</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>ضیابخش</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>morteza24mail@protonmail.com</email>
	<code>10031947532846002120</code>
	<orcid>10031947532846002120</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Mathematical Sciences, University of Guilan, Iran</affiliation>
	<affiliation_fa>۱گروه علوم کامپیوتر، دانشکده علوم ریاضی، دانشگاه گیلان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Seyed Amirhossein</first_name>
	<middle_name></middle_name>
	<last_name>Tabatabaei</last_name>
	<suffix></suffix>
	<first_name_fa>سیدامیرحسین</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>طباطبایی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>amirhossein.tabatabaei@guilan.ac.ir</email>
	<code>10031947532846002121</code>
	<orcid>10031947532846002121</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Mathematical Sciences, University of Guilan, Iran</affiliation>
	<affiliation_fa>۱گروه علوم کامپیوتر، دانشکده علوم ریاضی، دانشگاه گیلان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Sadegh</first_name>
	<middle_name></middle_name>
	<last_name>Eskandari</last_name>
	<suffix></suffix>
	<first_name_fa>صادق</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>اسکندری</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>eskandari@guilan.ac.ir</email>
	<code>10031947532846002122</code>
	<orcid>10031947532846002122</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Mathematical Sciences, University of Guilan, Iran</affiliation>
	<affiliation_fa>۱گروه علوم کامپیوتر، دانشکده علوم ریاضی، دانشگاه گیلان، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
