Blockchain-Assisted Video Integrity Verification UsingResNeXt and LSTM-Based Deepfake Detection
-
https://doi.org/10.14419/v12sar21
Received date: July 2, 2025
Accepted date: August 25, 2025
Published date: August 31, 2025
-
Deepfake Video Detection, Facial Image Analysis, ResNext feature, Load Trained Model -
Abstract
With the rapid advancement of deep learning algorithms, synthetic media commonly known as deepfakes have reached a level of realism that makes them nearly indistinguishable from authentic human appearances. Such content poses serious threats, including misinformation, impersonation, and cybercrimes. In this paper, we propose a novel blockchain-assisted framework for the detection and validation of deep-fake videos. Our approach integrates deep learning and decentralized verification mechanisms to enhance multimedia integrity. Frame-level features are extracted using a ResNeXt Convolutional Neural Network, and these are further processed using a Recurrent Neural Network (RNN) equipped with Long Short-Term Memory (LSTM) units to analyze temporal patterns across video sequences. To ensure tamper-proof logging and traceability, detection results and video metadata are immutably stored and verified on a Blockchain ledger. This combination not only improves classification accuracy but also provides a transparent and secure method for verifying video authenticity. Experimental comparisons demonstrate that our Blockchain-integrated model outperforms existing methods in both accuracy and reliability, contributing to the state-of-the-art in secure multimedia authentication.
-
References
- Yuezun Li, Siwei Lyu, “Exposing DF Videos By Detecting Face Warping Artifacts”,‖ in arXiv: 1811.00656v3, Computer Vision and Pattern Recognition, (2019).
- Y. Li, M. -C. Chang and S. Lyu, "In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking," IEEE International Work-shop on Information Forensics and Security (WIFS), Hong Kong, China, 2018, pp. 1-7, doi: 10.1109/WIFS.2018.8630787.
- H. H. Nguyen, J. Yamagishi and I. Echizen, "Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos," ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 2019, pp. 2307-2311, doi: 10.1109/ICASSP.2019.8682602.
- Pablo Garrido, Ayush Tewari, Weipeng Xu, Justus Thies, Matthias Niessner, Patrick Pérez, Christian Richardt, Michael Zollhöfer, Christian Theo-balt. “Deep video portraits”, ACM Transactions on Graphics (TOG), Volume 37, Issue 4, 2018.
- Ciftci UA, Demir I, Yin L. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. IEEE Trans Pattern Anal Mach Intell. 2020 Jul 15;PP. doi: 10.1109/TPAMI.2020.3009287.
- D. Güera and E. J. Delp, "Deepfake Video Detection Using Recurrent Neural Networks," 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand, 2018, pp. 1-6, doi: 10.1109/AVSS.2018.8639163.
- K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," IEEE Conference on Computer Vision and Pattern Recog-nition (CVPR), Las Vegas, NV, USA, 2016, pp. 770-778, 2016. doi: 10.1109/CVPR.2016.90.
- An Overview of ResNet and its Variants : https:
- Long Short-Term Memory: From Zero to Hero.with Pytorch: https://blog.floydhub.com/long-short- term memory-from-zero-to-hero-with-pytorch/ Sequence Models And LSTM Networks https://pytorch.org/tutorials/beginner/nlp/sequence_ models_tutorial.html “Confused about the image preprocessing in classification”. https://discuss.pytorch.org/t/confused-about-the- image preprocessing-in-classification/3965
- Brian Dolhansky, Russ Howes, Ben Pflaum, Nicole Baram, Cristian Canton Ferrer. “The Deepfake Detection Challenge (DFDC) Preview Dataset”, Computer Vision and Pattern Recognition, 2019.
- A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies and M. Niessner, "FaceForensics++: Learning to Detect Manipulated Facial Images," 2019 IEEE/CVF International Conference on Computer Vision (ICCV), Seoul, Korea (South), 2019, pp. 1-11, doi: 10.1109/ICCV.2019.00009.
- Y. Qian, K. Chen, J. Nikkanen, J. -K. Kämäräinen and J. Matas, "Recurrent Color Constancy," 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 2017, pp. 5459-5467, doi: 10.1109/ICCV.2017.582.
- P. Isola, J. -Y. Zhu, T. Zhou and A. A. Efros, "Image-to-Image Translation with Conditional Adversarial Networks," 2017 IEEE Confer-ence on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA, 2017, pp. 5967-5976, doi: 10.1109/CVPR.2017.632.
- R. Raghavendra, K. B. Raja, S. Venkatesh and C. Busch, "Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Mor-phed Face Images," 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 2017, pp. 1822-1830, doi: 10.1109/CVPRW.2017.228.
- T. de Freitas Pereira, A. Anjos, J. M. De Martino and S. Marcel, "Can face anti-spoofing countermeasures work in a real world scenar-io?," 2013 International Conference on Biometrics (ICB), Madrid, Spain, 2013, pp. 1-8, doi: 10.1109/ICB.2013.6612981.
- N. Rahmouni, V. Nozick, J. Yamagishi and I. Echizen, "Distinguishing computer graphics from natural images using convolution neural networks," 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France, 2017, pp. 1-6, doi: 10.1109/WIFS.2017.8267647.
- Fengyi Song, Xiaoyang Tan, Xue Liu, Songcan Chen. “Eyes closeness detection from still images with multi-scale histograms of princi-pal oriented gradients” Pattern Recognition, Volume 47, Issue 9, September 2014, Pages 2825-2838.
- Davis E. King. “Dlib-ml: A Machine Learning Toolkit”. The Journal of Machine Learning Research, Volume 10, 2009, Pages 1755 – 1758.
- Tianyi Wang, Harry Cheng, Kam Pui Chow, Liqiang Nie, “Deep Convolutional Pooling Transformer for Deepfake Detection”, ACM Transactions on Multimedia Computing, Communications and Applications, Volume 19, Issue 6, May 2023.
- Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang, “Detection of Deepfake Videos Using Long Distance Atten-tion”, IEEE Transactions on Neural Networks and Learning Systems, Volume: 35, Issue: 7, July 2024.
- Eren, H.; Karaduman, Ö.; Gençoğlu, M.T. Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Stor-age: A Comprehensive Review. Appl. Sci. 2025, 15, 3225. https://doi.org/10.3390/app15063225.
- Khan, A.A., Laghari, A.A., Alroobaea, R. et al. A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) us-ing blockchain hyperledger consortium network with edge computing. Sci Rep 15, 19856 (2025). https://doi.org/10.1038/s41598-025-05130-w.
- Igonor, O.S.; Amin, M.B.; Garg, S. The Application of Blockchain Technology in the Field of Digital Forensics: A Literature Review. Blockchains 2025, 3, 5. https://doi.org/10.3390/blockchains3010005.
-
Downloads
-
How to Cite
Pandian , P. ., Manikandan , S., Ramya, M., Rajeswari , M., Hemalatha , J., Selvakumar , R. ., & Mothilal , S. (2025). Blockchain-Assisted Video Integrity Verification UsingResNeXt and LSTM-Based Deepfake Detection. International Journal of Basic and Applied Sciences, 14(4), 802-807. https://doi.org/10.14419/v12sar21
