Blockchain-Assisted Video Integrity Verification UsingResNeXt and LSTM-Based Deepfake Detection

  • Authors

    • P.Senthil Pandian Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
    • S. Manikandan Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
    • Mrs.D. Ramya Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
    • Mrs.S. Rajeswari Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
    • J. Hemalatha Department of Computer Science and Engineering, AAA College of Engineering and Technology, Sivakasi, Tamil Nadu, India
    • R.Rubesh Selvakumar Department of Computer Science and Engineering, Sethu Institute of Technology, Viruthunagar, Tamil Nadu, India
    • S. Mothilal Professor & Principal, Department of Mechanical Engineering, Vagai College of Engineering, Madurai
    https://doi.org/10.14419/v12sar21

    Received date: July 2, 2025

    Accepted date: August 25, 2025

    Published date: August 31, 2025

  • Deepfake Video Detection, Facial Image Analysis, ResNext feature, Load Trained Model
  • Abstract

    With the rapid advancement of deep learning algorithms, synthetic media commonly known as deepfakes have reached a level of realism that makes them nearly indistinguishable from authentic human appearances. Such content poses serious threats, including misinformation, impersonation, and cybercrimes. In this paper, we propose a novel blockchain-assisted framework for the detection and validation of deep-fake videos. Our approach integrates deep learning and decentralized verification mechanisms to enhance multimedia integrity. Frame-level features are extracted using a ResNeXt Convolutional Neural Network, and these are further processed using a Recurrent Neural Network (RNN) equipped with Long Short-Term Memory (LSTM) units to analyze temporal patterns across video sequences. To ensure tamper-proof logging and traceability, detection results and video metadata are immutably stored and verified on a Blockchain ledger. This combination not only improves classification accuracy but also provides a transparent and secure method for verifying video authenticity. Experimental comparisons demonstrate that our Blockchain-integrated model outperforms existing methods in both accuracy and reliability, contributing to the state-of-the-art in secure multimedia authentication.

  • References

    1. Yuezun Li, Siwei Lyu, “Exposing DF Videos By Detecting Face Warping Artifacts”,‖ in arXiv: 1811.00656v3, Computer Vision and Pattern Recognition, (2019).
    2. Y. Li, M. -C. Chang and S. Lyu, "In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking," IEEE International Work-shop on Information Forensics and Security (WIFS), Hong Kong, China, 2018, pp. 1-7, doi: 10.1109/WIFS.2018.8630787.
    3. H. H. Nguyen, J. Yamagishi and I. Echizen, "Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos," ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 2019, pp. 2307-2311, doi: 10.1109/ICASSP.2019.8682602.
    4. Pablo Garrido, Ayush Tewari, Weipeng Xu, Justus Thies, Matthias Niessner, Patrick Pérez, Christian Richardt, Michael Zollhöfer, Christian Theo-balt. “Deep video portraits”, ACM Transactions on Graphics (TOG), Volume 37, Issue 4, 2018.
    5. Ciftci UA, Demir I, Yin L. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. IEEE Trans Pattern Anal Mach Intell. 2020 Jul 15;PP. doi: 10.1109/TPAMI.2020.3009287.
    6. D. Güera and E. J. Delp, "Deepfake Video Detection Using Recurrent Neural Networks," 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand, 2018, pp. 1-6, doi: 10.1109/AVSS.2018.8639163.
    7. K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," IEEE Conference on Computer Vision and Pattern Recog-nition (CVPR), Las Vegas, NV, USA, 2016, pp. 770-778, 2016. doi: 10.1109/CVPR.2016.90.
    8. An Overview of ResNet and its Variants : https:
    9. Long Short-Term Memory: From Zero to Hero.with Pytorch: https://blog.floydhub.com/long-short- term memory-from-zero-to-hero-with-pytorch/ Sequence Models And LSTM Networks https://pytorch.org/tutorials/beginner/nlp/sequence_ models_tutorial.html “Confused about the image preprocessing in classification”. https://discuss.pytorch.org/t/confused-about-the- image preprocessing-in-classification/3965
    10. Brian Dolhansky, Russ Howes, Ben Pflaum, Nicole Baram, Cristian Canton Ferrer. “The Deepfake Detection Challenge (DFDC) Preview Dataset”, Computer Vision and Pattern Recognition, 2019.
    11. A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies and M. Niessner, "FaceForensics++: Learning to Detect Manipulated Facial Images," 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Korea (South), 2019, pp. 1-11, doi: 10.1109/ICCV.2019.00009.
    12. Y. Qian, K. Chen, J. Nikkanen, J. -K. Kämäräinen and J. Matas, "Recurrent Color Constancy," 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 2017, pp. 5459-5467, doi: 10.1109/ICCV.2017.582.
    13. P. Isola, J. -Y. Zhu, T. Zhou and A. A. Efros, "Image-to-Image Translation with Conditional Adversarial Networks," 2017 IEEE Confer-ence on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA, 2017, pp. 5967-5976, doi: 10.1109/CVPR.2017.632.
    14. R. Raghavendra, K. B. Raja, S. Venkatesh and C. Busch, "Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Mor-phed Face Images," 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 2017, pp. 1822-1830, doi: 10.1109/CVPRW.2017.228.
    15. T. de Freitas Pereira, A. Anjos, J. M. De Martino and S. Marcel, "Can face anti-spoofing countermeasures work in a real world scenar-io?," 2013 International Conference on Biometrics (ICB), Madrid, Spain, 2013, pp. 1-8, doi: 10.1109/ICB.2013.6612981.
    16. N. Rahmouni, V. Nozick, J. Yamagishi and I. Echizen, "Distinguishing computer graphics from natural images using convolution neural networks," 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 2017, pp. 1-6, doi: 10.1109/WIFS.2017.8267647.
    17. Fengyi Song, Xiaoyang Tan, Xue Liu, Songcan Chen. “Eyes closeness detection from still images with multi-scale histograms of princi-pal oriented gradients” Pattern Recognition, Volume 47, Issue 9, September 2014, Pages 2825-2838.
    18. Davis E. King. “Dlib-ml: A Machine Learning Toolkit”. The Journal of Machine Learning Research, Volume 10, 2009, Pages 1755 – 1758.
    19. Tianyi Wang, Harry Cheng, Kam Pui Chow, Liqiang Nie, “Deep Convolutional Pooling Transformer for Deepfake Detection”, ACM Transactions on Multimedia Computing, Communications and Applications, Volume 19, Issue 6, May 2023.
    20. Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang, “Detection of Deepfake Videos Using Long Distance Atten-tion”, IEEE Transactions on Neural Networks and Learning Systems, Volume: 35, Issue: 7, July 2024.
    21. Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Stor-age: A Comprehensive Review. Appl. Sci. 2025, 15, 3225. https://doi.org/10.3390/app15063225.
    22. Khan, A.A., Laghari, A.A., Alroobaea, R. et al. A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) us-ing blockchain hyperledger consortium network with edge computing. Sci Rep 15, 19856 (2025). https://doi.org/10.1038/s41598-025-05130-w.
    23. Igonor, O.S.; Amin, M.B.; Garg, S. The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review. Blockchains 2025, 3, 5. https://doi.org/10.3390/blockchains3010005.
  • Downloads

  • How to Cite

    Pandian , P. ., Manikandan , S., Ramya, M., Rajeswari , M., Hemalatha , J., Selvakumar , R. ., & Mothilal , S. (2025). Blockchain-Assisted Video Integrity Verification UsingResNeXt and LSTM-Based Deepfake Detection. International Journal of Basic and Applied Sciences, 14(4), 802-807. https://doi.org/10.14419/v12sar21