  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/4026</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Deep Fake Image Detection Using Ensemble Approach</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Oday</given_name>
    <surname>Oday</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Ministry of Higher Education and Scientific Research, Minister Office, Bagdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Raghad Tohmas</given_name>
    <surname>Esfandiyar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Ministry of Higher Education and Scientific Research, Minister Office, Bagdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Shahad Hussein</given_name>
    <surname>Jasim</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Ministry of Education, Wasit Education Directorate, Bagdad, Iraq; Computer Department, College of Education for Pure Sciences, Wasit University, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Oday Ali</given_name>
    <surname>Hassen</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Neha</given_name>
    <surname>Sharma</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">College of Engineering, University of Information Technology and Communications, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ansam A.</given_name>
    <surname>Abdulhussein</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>This paper offers a comprehensive framework for real or fake image classification based on three classifiers: a Standard Convolutional Neural Network (CNN), an EfficientNetV2 model based on transfer learning, and a re-trained GAN discriminator to address the challenges in deepfake detection. The CNN, with four convolutional blocks and dropout regularization, offers computational efficiency (87.2% accuracy, 15 msimage inference), while EfficientNetV2 utilizes pre-trained ImageNet weights to achieve state-of-the-art performance (94.7% ac-curacy, AUC: 0.98) using hierarchical feature extraction. The fine-tuned and adversarial-pretrained GAN discriminator demonstrates niche strength in the detection of synthetic artifacts (91% recall for GAN-generated fakes). Training used augmented sets (rotation, shifts, and shear) to increase the generalization boost, with loss optimization and early stopping (binary cross-entropy) controlled through validation. Normalized test set validation affirmed EfficientNetV2's capability at balancing recall (94%) with precision (95%), although the GAN discriminator recorded a lead in adversarial resilience. All the models blended, an ensemble model achieved maximum accuracy (96.1%), under complementarities. Computational baselines showed trade-offs EfficientNetV2 accu-racy vs. resource bias (2.5-hour training), the CNN edge-compatibility, and the GAN discriminator arti-fact-sensitive specialization. The work encourages hybrid architectures and ensemble approaches to balance out single-model vulnerabilities, offering a flexible toolkit for deepfake warfare while emphasizing the need for hardware-aware deployment techniques and ongoing adaptation to changing synthetic approaches.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2026</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2026</year>
  </publication_date>
  <pages>
   <first_page>187</first_page>
   <last_page>204</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.180214</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/4026</resource>
  </doi_data>
 </journal_article>
</journal>
