0% found this document useful (0 votes)
21 views14 pages

Dissertation Demo

Uploaded by

sumbul Chaudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views14 pages

Dissertation Demo

Uploaded by

sumbul Chaudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

(Topic)

A Dissertation report submission for the partial fulfillment of the requirement for the award of
the degree
FIVE YEAR INTEGRATED B.TECH. (CSE) + M.TECH. (DATA SCIENCE)

Submitted By –
Student’s Name - qwerty
Roll Number – 20/ICS/abc

UNDER THE SUPERVISION OF

Dr. AARTI GAUTAM DINKER


(Assistant Professor)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
UNIVERSITY SCHOOL OF INFORMATION AND COMMUNICATION
TECHNOLOGY
GAUTAM BUDDHA UNIVERSITY
GREATER NOIDA –201312, GAUTAM BUDDHA NAGAR
UTTAR PRADESH INDIA
(month) 2024

i
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY

GAUTAM BUDDHA UNIVERSITY, GREATER NOIDA, 201312, U. P., (INDIA)

Candidate’s Declaration

We, hereby, certify that the work embodied in this report report entitled “(topic)” in

partial fulfillment of the requirements for the award of the Five Year Integrated B.Tech.

(CSE) + M.Tech. (Data Science) submitted to the Department of Computer Science and

Engineering, School of Information and Communication Technology, Gautam Buddha

University, Greater Noida is an authentic record of our own work carried out under the

supervision of Dr. Aarti Gautam Dinker, Assistant Professor, Department of Computer

Science and Engineering, School of ICT. The matter presented in this report has not been

submitted to any other University / Institute for the award of any other degree or diploma.

Responsibility for any plagiarism related issue stands solely with us.

qwerty

(20/ICS/abc)

ii
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY

GAUTAM BUDDHA UNIVERSITY, GREATER NOIDA, 201312, U. P., (INDIA)

Certificate

This is to certify that the work entitled “(Topic)” for the award of Five-Year Integrated

B.Tech. (CSE) + M.Tech. (Data Science) from Department of Computer Science and

Engineering, University School of Information and Communication Technology,

Gautam Buddha University, Greater Noida (UP) has been carried out under my

supervision.

The contents of the report are not based on the reward of any other degree to the candidate

or to anyone else, and this is the product of original research and study carried out by the

student itself. However, responsibility for any plagiarism related issue solely stands with

the students.

Dr. Aarti Gautam Dinker

Assistant Professor

Department of Computer Science and Engineering

School of Information and Communication Technology

Gautam Buddha University

Greater Noida-201312
iii
Acknowledgement

We have made efforts in this report. However, it would not have been possible without the

kind support and help of many individuals and organizations. I would like to extend my

sincere thanks to all of them.

We are highly indebted to Dr. Aarti Gautam Dinker for their guidance and constant

supervision as well as for providing necessary information regarding the report and for

their support in completing the report.

I would like to thank the Prof. Sanjay Kumar Sharma, Dean of School of Information

and Communication Technology and Dr. Arun Solanki, HOD of Computer Science

Engineering, School of Information and Communication Technology, for guiding me

throughout the completion and evaluation on the topic of bla-bla-bla. Their constant

support helped me to complete my report. I would like to express my gratitude to my

friends & family members for their kind co-operation and encouragement which help me

in completion of this report.

iv
Abstract

(Abstract Likho)

v
List of Abbreviations
AI Artificial Intelligence

vi
List of Figures

Fig.1 : asdfgh…………………………………………………..………………………..…..…...xx
Fig.2 : jhgfds……………………………...……………………………………………….....…. xx

vii
List of Tables

Table-1 : gdtghtgrtgrtgtrhthhthtghbs.…………………………………………………………..…x
Table-2 : fbvfbvdfgbdfgbdfgbgdfbg.……………………………………………………..…….…x

viii
Contents

Candidate’s Declaration………………………………………………………………………ii
Certificate...…………………………………………………………………………...............iii
Acknowledgment………………………………………………………………….………......iv
Abstract………………………………………………………………………...........................v
List of Abbreviation……………………………………………………………….......... ........vi .

List of Figures………………………………………………………………..........................vii
List of Tables………………………………………………………………….......................viii

Chapter 1: Introduction.………..…………………………………………………..................01
1.1. Deepfake in Image and Videos.…………………………………….…….......01
1.2. Misuse of Synthesized Visuals ……………………………………………....10
1.3. Societal Impact of Synthesized Visuals………………………………….…...11
1.4. Outcomes of Synthesized Visuals in Society…………………………...........13
1.5. Need to Prevent and Detect Synthesized Visuals……………………….……15
1.6. Challenges……………………………………………………………………17

Chapter 2: Literature Survey………………………………………………...…….................20

Chapter 3: Problem Identification………………………………………………………........28


3.1. Deepfake Detection Process …………………….…………………..…….....28
3.2. Interrelation of Deepfake with AI-ML-DL…………………………………..30
3.3. Technical Background Challenges……………………………………….…...32

Chapter 4: Problem Statement & Research Objectives……………………….………….….34


4.1. Problem Identification……………………………………..…………….......34
4.2. Research Objectives ……………………………………………….……..….36
4.3. Expected Outcome………………………………………………………...…36
4.4. Research Methodology……………………………….…………….…….... ...37 .

4.5. Hardware & Software Used………………………………………………….38

References…………………….……………………………………………………………...40

ix
Chapter 1: Introduction

Content

1.1. Deepfake in Images and Videos

1.2. Misuse of Synthesized Visuals

The

1.3. Societal Impact of Synthesized Visuals

The widespread

1.4. Outcome of Synthesized Visuals in Society

wegxdreyxh

1.5. Need to Prevent and Detect Synthesized Visuals

Dfrg

1.6. Challenges

Preventing

1
Chapter 2: Literature Survey

The rise of the concept.

Dafeng Gong et al. [1] has described the methods

The author Brian Dolhansky et al. [2] has described

2
Chapter 3:

This chapter helps to discuss the problem sectors, motivation, advantages and challenges faced
while developing Deepfake detection tools. These tools are important, but the pros of cons must
not be neglected.

3.1. Deepfake Detection Process

Deepfakes

3.2. Interrelations of Deepfake with AI-ML-DL

Artificial Intelligence (AI)

3.3. Technical Background Challenges

Challenges

3
Chapter 4: Problem Statement & Research Objective

The rapid

4.1. Problem Identification

The

4.2. Research Objectives

The aim of building

i.

4.3. Expected Outcome

Developing

4.4. Research Methodology

To create

4.5. Hardware & Software Requirements

The development

4
Reference

[1] Dafeng Gong, Yogan Jaya Kumar, Ong Sing Goh, “DeepfakeNet, an Efficient deepfake
Detection Method,” International Journal of Advanced Computer Science and Applications, Vol.
12, No. 6, 2021
[2] Brian Dolhansky, Joanna Bitton, Ben Pflaum, Jikuo Lu, Russ Howes, Menglin Wang, Cristian
Canton Ferrer, “The DeepFake Detection Challenge (DFDC) Dataset,” arXiv:2006.07397v4
[cs.CV] 28 Oct 2020
[3]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy