Submission Preparation ChecklistAs part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.
- The submission has been prepared in accordance with the journal's Instructions for Authors and follows all the journals' policy requirements.
- All authors are listed, each author has participated sufficiently in the work to take public responsibility for the content or part of it, and each author has approved the final version of the manuscript.
- No part of the manuscript has been, or will be, published elsewhere nor is under consideration for publication elsewhere.
Topic: Machine Learning Based Techniques for Image and Video Processing
Topic: Deepfake Detection and Image Processing
Deepfake Detection is the task of detecting fake videos or images that have been generated using deep learning techniques. Deepfakes are created by using machine learning algorithms to manipulate or replace parts of an original video or image. The goal of Deepfake Detection and Image Processing is to identify such manipulations and distinguish them from real videos or images.
We welcome manuscripts on all aspects of the Deepfake creation and detection domain, including image processing, adversarial forensics, and generative models on images and video. Topics of interest include, but are not limited to:
Source image reconstruction from Deepfakes
- Generative model recognition
- Adversarial forensics on deepfake content
- Generative models for deepfake creation
- Image/video forgery creation and detection
- Facial manipulation and synthesis techniques
- Image/video Deepfake detection
- Identification and localization of the manipulated Region of Interest (ROI)
- Detection of structural/textural changes in an image due to forgery or manipulation
- Detection of post processing effects from Deepfake generation
- Multiscale and multimodal transformers for Deepfake detection
- Visual cryptography and watermarking techniques for authentication and forgery detection
- Attention and capsule networks for Deepfake detection
- Morphing and Deepfake Attacks on facial recognition systems
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.