SlideShare uma empresa Scribd logo
1 de 24
Research Scholar Supervisor
Name: S. ABDUL YUNUS BASHA Dr. K. Ulagapriya
UP id: UP23P9570001 Department of CSE
Department of CSE VISTAS
VISTAS
Block Secure Net: A Block chain-Enhanced Deep
Learning Framework for Robust Multimedia
Authentication and Deep fake Detection
Block Secure Net : Deep fake detection
6-Feb-24
2
Way to know what's factual : Detect and Compare
Abstract
 The rapid evolution of deepfake tech poses serious threats like
misinformation and privacy breaches, eroding trust in digital media.
Generated by advanced deep learning, deepfakes seamlessly blend one
person's likeness onto another's, challenging conventional detection
methods. Traditional rule-based approaches struggle with the continuous
refinement of deepfake techniques. There's a critical need for advanced
methods to identify and mitigate the proliferation of manipulated
multimedia content, addressing the pressing issues of today's digital
landscape.
 To address these challenges, this research proposes Blockchain integration,
assigning a unique identifier (hash) to each content recorded on the
blockchain for a decentralized and tamper-resistant ledger.
 Custom Convolutional Neural Networks (CCNNs), RNN, Additive Attention
Mechanism and Two-Stream Convolutional Networks enhances deep
learning analysis by considering multimedia watermark , This improves
accuracy in binary classification with added confidence based on watermark
validation and audio pattern analysis. The research introduces
BlockSecureNet, a groundbreaking approach that combines blockchain and
deep learning to combat deepfake manipulation.
6-Feb-24
3
Abstract
 BlockSecureNet uses blockchain for content authentication via smart
contracts and decentralized nodes. Deep learning identifies temporal
inconsistencies in multimedia, linked to blockchain through verification
anchors for transparency. Targeting deepfake concerns, it offers a solution
for data integrity, decentralization, and model updates, ensuring reliable
deepfake detection.
 The method uses metrics like true positive rate, true negative rate, and AUC,
employing the Unified Deep Learning Algorithm with Custom CNNs, RNN,
LSTM, Two-Stream CNNs, and Blockchain Integration for Multimedia
Authentication Detection.
 It offers a holistic approach to combat deepfake manipulation, considering
blockchain for content authentication and deep learning for temporal
analysis. Block Secure Net effectively addresses challenges in detecting and
mitigating the impact of deepfake content on society.
6-Feb-24
4
Introduction
 Deepfakes, also known as synthetic media, are generated using deep learning
techniques to create realistic and deceptive audio, video, and images. These
deepfakes can be used to impersonate individuals, manipulate conversations,
and spread misinformation. The potential for misuse of deepfakes poses a
serious threat to society, as they can be used to damage reputations,
undermine trust in institutions, and even incite violence.
 Various techniques have been proposed for detecting deepfakes. Traditional
methods often rely on hand-crafted features and statistical analysis, which
are limited in their effectiveness against increasingly sophisticated deepfake
technologies. Deep learning-based approaches have emerged as a promising
alternative, demonstrating superior performance in identifying deepfake
 To stay on top of these challenges, it's important to use a mix of advanced
technologies, including Deep Learning Models, machine learning, Audio
Analysis, and Blockchain. This combination of tools helps us keep up with the
always-changing tricks that deepfake creators use.
. 6-Feb-24
5
Sample Image 1
A sample of videos from Google’s contribution to the Face Forensics benchmark. To generate these,
pairs of actors were selected randomly and deep neural networks swapped the face of one actor onto
the head of another. 6
Sample Image 2
6-Feb-24
7
Actors were filmed in a variety of scenes. Some of these actors are pictured here
(top) with an example deepfake (bottom), which can be a subtle or drastic change,
depending on the other actor used to create them.
Sample Videos
 This video explains how Deepfakes are created by using artificial
intelligence.
 Click here to view the video
6-Feb-24
8
Problem Statement
 The rapid advancement of artificial intelligence (AI) and machine learning (ML)
techniques has enabled the creation of highly realistic deep fakes, which are
manipulated or fabricated images, videos or audio recordings that appear to show
people saying or doing things they never actually said or did
 Existing deepfake detection methods, such as those based on pixel analysis or audio
waveform analysis, are becoming increasingly ineffective as deepfake technology
advances. This necessitates the development of more robust and sophisticated by
implementing Block Secure Net (deepfake detection methods) that incorporate
blockchain with embedded watermarking, audio analysis, and deep learning
techniques
 Fabricated images, videos or audio recordings are very difficult to identify so there
is a need to create a embedded watermark on video ,image using block chain &
Deep learning
 Development of accurate and efficient deep fake detection models specifically
tailored for audio content which includes identifying synthesized voices,
recognizing anomalies in speech patterns, and distinguishing genuine recordings
from manipulated ones
6-Feb-24
9
Objective of my research work
The intention of my research work Block SecureNet is described as follows:
1. Deep fake Detection with Deep learning
A deep learning model , rigorously trained on diverse datasets to identify visual and audio patterns
characteristics of deep fakes ,would analyze videos promptly upon upload or access
2. Watermark Generation & Embedding
 Upon a high probability of a video being a deep fake a water mark generation process would
initiated .The watermarks would be designed to be invisible .
 The watermark would contain “Potential Deepfake Label”, Date and Time of creation, Hash of
Original video, Link to block chain based verification system.
3. Block Chain Integration for Integrity and Transparency
 Distinguishing between authentic and manipulated content we Utilize embedded Watermark The
cryptographic hash functions (e.g., SHA-256) are used to generate a unique hash value for each
multimedia file, & records Hash on the Blockchain
 Implement smart contracts that automate the verification process. Smart contracts can be
programmed to trigger alerts or take specific actions to Check verification nodes independently
which in turn verifies the integrity of multimedia files by recomputing the hash locally and
comparing it with the hash stored on the blockchain
4. Deep Learning based watermark detection & verification
 Use of hyper parameters, training data, transfer learning, ensemble learning, and data
augmentation, is possible to tailor custom CNNs and RNNs to achieve specific tasks for deep fake
detection.
 Short-time Fourier transform (STFT) , wavelet transform is a mathematical function is used in a
variety of applications, including audio signal processing, image compression, and signal denoising.
6-Feb-24
10
Literature survey
6-Feb-24
11
Re
f.
no
Year Techniques Objective Limitations Application Algorithm
used
1. 2018 Liveness
detection
Detect deep
fakes by
analyzing facial
movements
and
expressions
Relies on
high-
quality
video
input
Social media
platforms,
security
systems
Support
Vector
Machines
(SVM)
2. 2019 Audio
deep fake
detection
Identify
manipulated
audio
recordings
Limited to
specific
audio
formats
Voice
assistants,
online
communication
Mel-
frequency
cepstral
coefficients
(MFCC)
3 2020 Facial
artifact
detection
Spot
inconsistencies
in facial
features and
skin texture
Requires
training on
a large
dataset of
deepfakes
E-commerce,
online dating
Convolution
al neural
networks
(CNNs)
Literature survey
6-Feb-24
12
Re
f.
no
Year Techniques Objective Limitations Application Algorithm
used
4. 2021 Visual
anomaly
detection
Uncover
abnormalitie
s in video
frames
Sensitive to
noise and video
compression
Video
surveillance,
news
verification
Auto
encoders
5. 2022 Multi-
modal deep
fake
detection
Combine
multiple
detection
techniques
for improved
accuracy
Computationally
expensive
Forensic
analysis, law
enforcement
Ensemble
methods
Modules
6-Feb-24
13
: Module 1 :- Data Acquisition and Pre processing
 This module focuses on acquiring and preparing the multimedia data for subsequent
analysis it performs Data gathering, Data Labelling, Data Pre processing.
 Preprocessed and normalized multimedia data suitable for feature extraction and
model training
 Statistical methods, outlier detection, noise reduction algorithms used for Data
Cleaning Techniques,
 Min-max scaling, z-score normalization, are used for Data Normalization Methods
Module 2: Block chain Integration for Tamper-Proof Authentication
 This module introduces block chain technology to provide a robust & decentralized
authentication mechanism. It involves tasks such as Blockchain Network Setup,
Content Hashing & Blockchain Embedding. Tamper-proof and verifiable records of
content authenticity stored on the blockchain.
 Algorithms and Techniques:
Blockchain Protocols: Proof-of-Work (PoW), Proof-of-Stake (PoS), Byzantine
Fault Tolerance (BFT) algorithms.
Cryptographic Hashing Functions: SHA-256, hash functions.
Combination of Solidity programming language & Ethereum Virtual Machine (EVM)
for blockchain interactions is used for Smart Contract Development
Modules
6-Feb-24
14
Module 3: Deep Learning-Based Embedded Watermarking
 This module utilizes deep learning techniques to embed watermarks into multimedia
content for enhanced security to create Watermark Generation, Embedding, Extraction
 Watermarks are resistant to various content manipulations and attacks.
 Convolutional Neural Networks (CNNs), Generative Adversarial Networks (GANs) ,
singular value decomposition (SVD) Algorithms and Techniques are deep learning-
based extraction used in this module.
Module 4: Attention-Based Deep fake Detection
 This module employs deep learning models with attention mechanisms to detect deep
fakes tasks such as Deep fake Model Training, Classification & Integration will be
implemented here.
 Deep fake architectures such as Inception-v3 models used for image classification
tasks
 additive attention mechanism are used to identify subtle inconsistencies and anomalies
in manipulated audio.
Module 5: Performance Evaluation and Result Analysis
 This module focuses on evaluating the performance of the proposed framework and
analyzing the results.
 Performance Metrics can be calculated by Accuracy, precision, recall, F1-score.
Timeline of Deepfake Technology from 2018-2023
Taxonomy of Deepfake detection techniques
6-Feb-24
16
The above taxonomy classifies the detection algorithms according to the media (image, video, or image and
video), the features used (among the 12 features), the detection method (DL, ML, Blockchain, or
statistical), and the clue for the detection (facial manipulation of digital media forensics, or other
indications).
Techniques applied
6-Feb-24
17
Ref.
no
Year Techniques Algorithm Accuracy
1 2018 MesoNet Convolutional neural network (CNN) 0.92
2 2019 FaceForensics++ CNN and long short-term memory (LSTM) 0.94
3 2020 DFaker Generative adversarial network (GAN) 0.95
4 2021 StyleGAN2 GAN 0.96
5 2022 Imagen Video Transformer 0.97
6 2023 Block Secure Net
BlockChain, GAN, CCNN, Additive Attention
Mechanism
Estimnated (from
97% up to 99%)
The Deepfake is detected by using different Deep learning algorithms by various
researchers.
 The following table shows the technique and algorithm from 2018-2023.
System Overview
 Nowadays, information is increasing fast, also availability of processing data
exceed human abilities.
Block chain technology provides tamper-proof data storage and integrity
assurance, safeguarding multimedia content from unauthorized modifications.
 Combines block chain and deep learning for bulletproof multimedia
authentication and deep fake detection.
Hashes multimedia features onto a secure block chain, creating an immutable
record of authenticity.
Deep learning model sniffs out deep fakes based on inconsistencies in the
block chain record.
Tracks the origin and history of any content, exposing manipulation attempts.
Decentralized storage and access control prevent unauthorized modifications.
Empowers users to trust what they see and fight the spread of misinformation.
 Ongoing research holds promise for further advancements, including enhanced
deep learning model performance, optimized consensus mechanisms, real-time
implementation, and robust privacy considerations.
Steps for Deepfake Detection
Proposed workflow
The workflow of our proposed model is described as follows:
 In Phase 1: Collect a diverse dataset of multimedia content & Preprocess the
multimedia content ,
 In phase 2 : Develop deep learning models for feature extraction and anomaly
detection & Integrate block chain technology
 In phase 3 : Multimedia Authentication and Deep fake Detection.
 In Phase 4 : Continuous Monitoring and Improvement , enhance the
performance of the deep learning framework
 Finally based on accuracy measures, performance of Deep learning models are
evaluated.
6-Feb-24
19
Acquisition
diverse dataset
& Preprocess
Design and train deep
learning models &
Integrate blockchain
technology
authenticate
multimedia
content and
detect deepfakes.
Monitoring &
Improvement
Application to test
data(Accuracy,
Performance,
Epochs)
Deep Fake Detection : Tactics, and Detection by
Block Secure Net
6-Feb-24
20
1
• Collect and Pre process Data
• authentic and manipulate multimedia content for analysis
2
• Embed Watermarks
• extract features from both watermarked authentic content and target
content for comparison.
3
• Develop Deep Learning Models
• authentic multimedia content to serve as unique identifiers
• Analyze and Detect Deep fakes
4
• identify anomalies or inconsistencies indicative of deepfakes.
5
• Verify Authenticity and Store Results
Expected outcomes
 BlockSecureNet comprises, Improved Deepfake Detection, Traceable
Authentication History, Resilient to Manipulation & Trustworthy Multimedia
Content
 Metrics such as precision, recall, F1-score, and accuracy are evaluated to
predict Deep learning classification model performance.
 Comprehensive evaluation of the proposed framework's performance in terms
of authentication accuracy, receiver operating characteristic (ROC) curve, area
under the ROC curve (AUC) & computational efficiency leads to high rated
Performance Evaluation
 Analysis of the effectiveness of each module and its contribution leads to the
overall framework's performance.
6-Feb-24
21
Work plan
6-Feb-24
22
Conclusion
 The proposed blockchain-enhanced deep learning framework
effectively safeguards multimedia content against manipulation and
deepfakes by leveraging the strengths of both blockchain technology
and deep learning techniques. The framework ensures the authenticity
and reliability of multimedia content by providing a tamper-proof and
transparent record of multimedia content, coupled with the ability to
accurately detect deepfakes, even those that are highly sophisticated.
This framework has the potential to significantly improve the security
and reliability of multimedia content.
Hence, this research work focused on detecting specific attack
based on BlockSecure Net along with Deep based CNN optimization
GAN, Additive Attention Mechanism which enhances deep fake
detection.
 In my next DC meeting, I will take up this topic and show the results.
References
1. G. Oberoi. Exploring DeepFakes. Accessed: Jan. 4, 2021. [Online].
2. Available: https://goberoi.com/exploring-deepfakes-20c9947c22d9
3. J. Hui. How Deep Learning Fakes Videos (Deepfake) and How to Detect it. Accessed: Jan. 4, 2021.
[Online]. Available: https://medium. com/how-deep-learning-fakes-videos-deepfakes-and-how-to-
detect-it- c0b50fbf7cb9
4. I. Goodfellow, J. P. Abadie, M. Mirza, B. Xu, D. W. Farley, S. Ozair,
5. A. Courville, and Y. Bengio, ‘‘Generative adversarial nets,’’ in Proc. 27th Int. Conf. Neural Inf. Process.
Syst. (NIPS), vol. 2. Cambridge, MA, USA: MIT Press, 2014, pp. 2672–2680.
6. G. Patrini, F. Cavalli, and H. Ajder, ‘‘The state of deepfakes: Reality under attack,’’ Deeptrace B.V.,
Amsterdam, The Nether- lands, Annu. Rep. v.2.3., 2018. [Online]. Available: https://s3.eu-west-
2.amazonaws.com/rep2018/2018-the-state-of-deepfakes.pdf.
7. H. Hasan and K. Salah, ‘‘Combating deepfake videos using blockchain and smart contracts,’’ IEEE
Access, vol. 7, pp. 41596–41606, 2019, doi: 10.1109/ACCESS.2019.2905689.
8. IPFS Powers the Distributed Web. Accessed: Jun. 5, 2020. [Online].
9. Available: https://ipfs.io/
10. C. C. Ki Chan, V. Kumar, S. Delaney, and M. Gochoo, ‘‘Combating deepfakes: Multi-LSTM and
blockchain as proof of authenticity for digital media,’’ in Proc. IEEE/ITU Int. Conf. Artif. Intell. Good
(AI4G), Sep. 2020, pp. 55–62.
11. J. Li, T. Shen, W. Zhang, H. Ren, D. Zeng, and T. Mei, ‘‘Zooming into face forensics: A pixel-level
analysis,’’ 2019, arXiv:1912.05790.
12. T. Thi Nguyen, Q. Viet Hung Nguyen, D. Tien Nguyen, D. Thanh Nguyen, T. Huynh-The, S. Nahavandi,
T. Tam Nguyen, Q.-V. Pham, and
13. C. M. Nguyen, ‘‘Deep learning for deepfakes creation and detection: A survey,’’ 2019,
arXiv:1909.11573.
14. R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and
15. J. Ortega-Garcia, ‘‘Deepfakes and beyond: A survey of face manipulation and fake detection,’’ Inf.
Fusion, vol. 64, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.

Mais conteúdo relacionado

Semelhante a deep fake detection (1).pptx

Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainIRJET Journal
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfCiente
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approachesijtsrd
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...IRJET Journal
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET Journal
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
 
eai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfeai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfssuser50a5ec
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud? ijcisjournal
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...IRJET Journal
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 

Semelhante a deep fake detection (1).pptx (20)

Fraud Detection: A Review on Blockchain
Fraud Detection: A Review on BlockchainFraud Detection: A Review on Blockchain
Fraud Detection: A Review on Blockchain
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Understanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdfUnderstanding Deepfake Technology.pdf
Understanding Deepfake Technology.pdf
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Ransomware
RansomwareRansomware
Ransomware
 
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...
DeepSecure: A Real-Time Deep Learning-Based System for Enhancing Cybersecurit...
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...
 
eai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdfeai.5-4-2022.173783.pdf
eai.5-4-2022.173783.pdf
 
Video Surveillance in the Cloud?
Video Surveillance in the Cloud?  Video Surveillance in the Cloud?
Video Surveillance in the Cloud?
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learn...
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 

Último

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Último (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

deep fake detection (1).pptx

  • 1. Research Scholar Supervisor Name: S. ABDUL YUNUS BASHA Dr. K. Ulagapriya UP id: UP23P9570001 Department of CSE Department of CSE VISTAS VISTAS Block Secure Net: A Block chain-Enhanced Deep Learning Framework for Robust Multimedia Authentication and Deep fake Detection
  • 2. Block Secure Net : Deep fake detection 6-Feb-24 2 Way to know what's factual : Detect and Compare
  • 3. Abstract  The rapid evolution of deepfake tech poses serious threats like misinformation and privacy breaches, eroding trust in digital media. Generated by advanced deep learning, deepfakes seamlessly blend one person's likeness onto another's, challenging conventional detection methods. Traditional rule-based approaches struggle with the continuous refinement of deepfake techniques. There's a critical need for advanced methods to identify and mitigate the proliferation of manipulated multimedia content, addressing the pressing issues of today's digital landscape.  To address these challenges, this research proposes Blockchain integration, assigning a unique identifier (hash) to each content recorded on the blockchain for a decentralized and tamper-resistant ledger.  Custom Convolutional Neural Networks (CCNNs), RNN, Additive Attention Mechanism and Two-Stream Convolutional Networks enhances deep learning analysis by considering multimedia watermark , This improves accuracy in binary classification with added confidence based on watermark validation and audio pattern analysis. The research introduces BlockSecureNet, a groundbreaking approach that combines blockchain and deep learning to combat deepfake manipulation. 6-Feb-24 3
  • 4. Abstract  BlockSecureNet uses blockchain for content authentication via smart contracts and decentralized nodes. Deep learning identifies temporal inconsistencies in multimedia, linked to blockchain through verification anchors for transparency. Targeting deepfake concerns, it offers a solution for data integrity, decentralization, and model updates, ensuring reliable deepfake detection.  The method uses metrics like true positive rate, true negative rate, and AUC, employing the Unified Deep Learning Algorithm with Custom CNNs, RNN, LSTM, Two-Stream CNNs, and Blockchain Integration for Multimedia Authentication Detection.  It offers a holistic approach to combat deepfake manipulation, considering blockchain for content authentication and deep learning for temporal analysis. Block Secure Net effectively addresses challenges in detecting and mitigating the impact of deepfake content on society. 6-Feb-24 4
  • 5. Introduction  Deepfakes, also known as synthetic media, are generated using deep learning techniques to create realistic and deceptive audio, video, and images. These deepfakes can be used to impersonate individuals, manipulate conversations, and spread misinformation. The potential for misuse of deepfakes poses a serious threat to society, as they can be used to damage reputations, undermine trust in institutions, and even incite violence.  Various techniques have been proposed for detecting deepfakes. Traditional methods often rely on hand-crafted features and statistical analysis, which are limited in their effectiveness against increasingly sophisticated deepfake technologies. Deep learning-based approaches have emerged as a promising alternative, demonstrating superior performance in identifying deepfake  To stay on top of these challenges, it's important to use a mix of advanced technologies, including Deep Learning Models, machine learning, Audio Analysis, and Blockchain. This combination of tools helps us keep up with the always-changing tricks that deepfake creators use. . 6-Feb-24 5
  • 6. Sample Image 1 A sample of videos from Google’s contribution to the Face Forensics benchmark. To generate these, pairs of actors were selected randomly and deep neural networks swapped the face of one actor onto the head of another. 6
  • 7. Sample Image 2 6-Feb-24 7 Actors were filmed in a variety of scenes. Some of these actors are pictured here (top) with an example deepfake (bottom), which can be a subtle or drastic change, depending on the other actor used to create them.
  • 8. Sample Videos  This video explains how Deepfakes are created by using artificial intelligence.  Click here to view the video 6-Feb-24 8
  • 9. Problem Statement  The rapid advancement of artificial intelligence (AI) and machine learning (ML) techniques has enabled the creation of highly realistic deep fakes, which are manipulated or fabricated images, videos or audio recordings that appear to show people saying or doing things they never actually said or did  Existing deepfake detection methods, such as those based on pixel analysis or audio waveform analysis, are becoming increasingly ineffective as deepfake technology advances. This necessitates the development of more robust and sophisticated by implementing Block Secure Net (deepfake detection methods) that incorporate blockchain with embedded watermarking, audio analysis, and deep learning techniques  Fabricated images, videos or audio recordings are very difficult to identify so there is a need to create a embedded watermark on video ,image using block chain & Deep learning  Development of accurate and efficient deep fake detection models specifically tailored for audio content which includes identifying synthesized voices, recognizing anomalies in speech patterns, and distinguishing genuine recordings from manipulated ones 6-Feb-24 9
  • 10. Objective of my research work The intention of my research work Block SecureNet is described as follows: 1. Deep fake Detection with Deep learning A deep learning model , rigorously trained on diverse datasets to identify visual and audio patterns characteristics of deep fakes ,would analyze videos promptly upon upload or access 2. Watermark Generation & Embedding  Upon a high probability of a video being a deep fake a water mark generation process would initiated .The watermarks would be designed to be invisible .  The watermark would contain “Potential Deepfake Label”, Date and Time of creation, Hash of Original video, Link to block chain based verification system. 3. Block Chain Integration for Integrity and Transparency  Distinguishing between authentic and manipulated content we Utilize embedded Watermark The cryptographic hash functions (e.g., SHA-256) are used to generate a unique hash value for each multimedia file, & records Hash on the Blockchain  Implement smart contracts that automate the verification process. Smart contracts can be programmed to trigger alerts or take specific actions to Check verification nodes independently which in turn verifies the integrity of multimedia files by recomputing the hash locally and comparing it with the hash stored on the blockchain 4. Deep Learning based watermark detection & verification  Use of hyper parameters, training data, transfer learning, ensemble learning, and data augmentation, is possible to tailor custom CNNs and RNNs to achieve specific tasks for deep fake detection.  Short-time Fourier transform (STFT) , wavelet transform is a mathematical function is used in a variety of applications, including audio signal processing, image compression, and signal denoising. 6-Feb-24 10
  • 11. Literature survey 6-Feb-24 11 Re f. no Year Techniques Objective Limitations Application Algorithm used 1. 2018 Liveness detection Detect deep fakes by analyzing facial movements and expressions Relies on high- quality video input Social media platforms, security systems Support Vector Machines (SVM) 2. 2019 Audio deep fake detection Identify manipulated audio recordings Limited to specific audio formats Voice assistants, online communication Mel- frequency cepstral coefficients (MFCC) 3 2020 Facial artifact detection Spot inconsistencies in facial features and skin texture Requires training on a large dataset of deepfakes E-commerce, online dating Convolution al neural networks (CNNs)
  • 12. Literature survey 6-Feb-24 12 Re f. no Year Techniques Objective Limitations Application Algorithm used 4. 2021 Visual anomaly detection Uncover abnormalitie s in video frames Sensitive to noise and video compression Video surveillance, news verification Auto encoders 5. 2022 Multi- modal deep fake detection Combine multiple detection techniques for improved accuracy Computationally expensive Forensic analysis, law enforcement Ensemble methods
  • 13. Modules 6-Feb-24 13 : Module 1 :- Data Acquisition and Pre processing  This module focuses on acquiring and preparing the multimedia data for subsequent analysis it performs Data gathering, Data Labelling, Data Pre processing.  Preprocessed and normalized multimedia data suitable for feature extraction and model training  Statistical methods, outlier detection, noise reduction algorithms used for Data Cleaning Techniques,  Min-max scaling, z-score normalization, are used for Data Normalization Methods Module 2: Block chain Integration for Tamper-Proof Authentication  This module introduces block chain technology to provide a robust & decentralized authentication mechanism. It involves tasks such as Blockchain Network Setup, Content Hashing & Blockchain Embedding. Tamper-proof and verifiable records of content authenticity stored on the blockchain.  Algorithms and Techniques: Blockchain Protocols: Proof-of-Work (PoW), Proof-of-Stake (PoS), Byzantine Fault Tolerance (BFT) algorithms. Cryptographic Hashing Functions: SHA-256, hash functions. Combination of Solidity programming language & Ethereum Virtual Machine (EVM) for blockchain interactions is used for Smart Contract Development
  • 14. Modules 6-Feb-24 14 Module 3: Deep Learning-Based Embedded Watermarking  This module utilizes deep learning techniques to embed watermarks into multimedia content for enhanced security to create Watermark Generation, Embedding, Extraction  Watermarks are resistant to various content manipulations and attacks.  Convolutional Neural Networks (CNNs), Generative Adversarial Networks (GANs) , singular value decomposition (SVD) Algorithms and Techniques are deep learning- based extraction used in this module. Module 4: Attention-Based Deep fake Detection  This module employs deep learning models with attention mechanisms to detect deep fakes tasks such as Deep fake Model Training, Classification & Integration will be implemented here.  Deep fake architectures such as Inception-v3 models used for image classification tasks  additive attention mechanism are used to identify subtle inconsistencies and anomalies in manipulated audio. Module 5: Performance Evaluation and Result Analysis  This module focuses on evaluating the performance of the proposed framework and analyzing the results.  Performance Metrics can be calculated by Accuracy, precision, recall, F1-score.
  • 15. Timeline of Deepfake Technology from 2018-2023
  • 16. Taxonomy of Deepfake detection techniques 6-Feb-24 16 The above taxonomy classifies the detection algorithms according to the media (image, video, or image and video), the features used (among the 12 features), the detection method (DL, ML, Blockchain, or statistical), and the clue for the detection (facial manipulation of digital media forensics, or other indications).
  • 17. Techniques applied 6-Feb-24 17 Ref. no Year Techniques Algorithm Accuracy 1 2018 MesoNet Convolutional neural network (CNN) 0.92 2 2019 FaceForensics++ CNN and long short-term memory (LSTM) 0.94 3 2020 DFaker Generative adversarial network (GAN) 0.95 4 2021 StyleGAN2 GAN 0.96 5 2022 Imagen Video Transformer 0.97 6 2023 Block Secure Net BlockChain, GAN, CCNN, Additive Attention Mechanism Estimnated (from 97% up to 99%) The Deepfake is detected by using different Deep learning algorithms by various researchers.  The following table shows the technique and algorithm from 2018-2023.
  • 18. System Overview  Nowadays, information is increasing fast, also availability of processing data exceed human abilities. Block chain technology provides tamper-proof data storage and integrity assurance, safeguarding multimedia content from unauthorized modifications.  Combines block chain and deep learning for bulletproof multimedia authentication and deep fake detection. Hashes multimedia features onto a secure block chain, creating an immutable record of authenticity. Deep learning model sniffs out deep fakes based on inconsistencies in the block chain record. Tracks the origin and history of any content, exposing manipulation attempts. Decentralized storage and access control prevent unauthorized modifications. Empowers users to trust what they see and fight the spread of misinformation.  Ongoing research holds promise for further advancements, including enhanced deep learning model performance, optimized consensus mechanisms, real-time implementation, and robust privacy considerations. Steps for Deepfake Detection
  • 19. Proposed workflow The workflow of our proposed model is described as follows:  In Phase 1: Collect a diverse dataset of multimedia content & Preprocess the multimedia content ,  In phase 2 : Develop deep learning models for feature extraction and anomaly detection & Integrate block chain technology  In phase 3 : Multimedia Authentication and Deep fake Detection.  In Phase 4 : Continuous Monitoring and Improvement , enhance the performance of the deep learning framework  Finally based on accuracy measures, performance of Deep learning models are evaluated. 6-Feb-24 19 Acquisition diverse dataset & Preprocess Design and train deep learning models & Integrate blockchain technology authenticate multimedia content and detect deepfakes. Monitoring & Improvement Application to test data(Accuracy, Performance, Epochs)
  • 20. Deep Fake Detection : Tactics, and Detection by Block Secure Net 6-Feb-24 20 1 • Collect and Pre process Data • authentic and manipulate multimedia content for analysis 2 • Embed Watermarks • extract features from both watermarked authentic content and target content for comparison. 3 • Develop Deep Learning Models • authentic multimedia content to serve as unique identifiers • Analyze and Detect Deep fakes 4 • identify anomalies or inconsistencies indicative of deepfakes. 5 • Verify Authenticity and Store Results
  • 21. Expected outcomes  BlockSecureNet comprises, Improved Deepfake Detection, Traceable Authentication History, Resilient to Manipulation & Trustworthy Multimedia Content  Metrics such as precision, recall, F1-score, and accuracy are evaluated to predict Deep learning classification model performance.  Comprehensive evaluation of the proposed framework's performance in terms of authentication accuracy, receiver operating characteristic (ROC) curve, area under the ROC curve (AUC) & computational efficiency leads to high rated Performance Evaluation  Analysis of the effectiveness of each module and its contribution leads to the overall framework's performance. 6-Feb-24 21
  • 23. Conclusion  The proposed blockchain-enhanced deep learning framework effectively safeguards multimedia content against manipulation and deepfakes by leveraging the strengths of both blockchain technology and deep learning techniques. The framework ensures the authenticity and reliability of multimedia content by providing a tamper-proof and transparent record of multimedia content, coupled with the ability to accurately detect deepfakes, even those that are highly sophisticated. This framework has the potential to significantly improve the security and reliability of multimedia content. Hence, this research work focused on detecting specific attack based on BlockSecure Net along with Deep based CNN optimization GAN, Additive Attention Mechanism which enhances deep fake detection.  In my next DC meeting, I will take up this topic and show the results.
  • 24. References 1. G. Oberoi. Exploring DeepFakes. Accessed: Jan. 4, 2021. [Online]. 2. Available: https://goberoi.com/exploring-deepfakes-20c9947c22d9 3. J. Hui. How Deep Learning Fakes Videos (Deepfake) and How to Detect it. Accessed: Jan. 4, 2021. [Online]. Available: https://medium. com/how-deep-learning-fakes-videos-deepfakes-and-how-to- detect-it- c0b50fbf7cb9 4. I. Goodfellow, J. P. Abadie, M. Mirza, B. Xu, D. W. Farley, S. Ozair, 5. A. Courville, and Y. Bengio, ‘‘Generative adversarial nets,’’ in Proc. 27th Int. Conf. Neural Inf. Process. Syst. (NIPS), vol. 2. Cambridge, MA, USA: MIT Press, 2014, pp. 2672–2680. 6. G. Patrini, F. Cavalli, and H. Ajder, ‘‘The state of deepfakes: Reality under attack,’’ Deeptrace B.V., Amsterdam, The Nether- lands, Annu. Rep. v.2.3., 2018. [Online]. Available: https://s3.eu-west- 2.amazonaws.com/rep2018/2018-the-state-of-deepfakes.pdf. 7. H. Hasan and K. Salah, ‘‘Combating deepfake videos using blockchain and smart contracts,’’ IEEE Access, vol. 7, pp. 41596–41606, 2019, doi: 10.1109/ACCESS.2019.2905689. 8. IPFS Powers the Distributed Web. Accessed: Jun. 5, 2020. [Online]. 9. Available: https://ipfs.io/ 10. C. C. Ki Chan, V. Kumar, S. Delaney, and M. Gochoo, ‘‘Combating deepfakes: Multi-LSTM and blockchain as proof of authenticity for digital media,’’ in Proc. IEEE/ITU Int. Conf. Artif. Intell. Good (AI4G), Sep. 2020, pp. 55–62. 11. J. Li, T. Shen, W. Zhang, H. Ren, D. Zeng, and T. Mei, ‘‘Zooming into face forensics: A pixel-level analysis,’’ 2019, arXiv:1912.05790. 12. T. Thi Nguyen, Q. Viet Hung Nguyen, D. Tien Nguyen, D. Thanh Nguyen, T. Huynh-The, S. Nahavandi, T. Tam Nguyen, Q.-V. Pham, and 13. C. M. Nguyen, ‘‘Deep learning for deepfakes creation and detection: A survey,’’ 2019, arXiv:1909.11573. 14. R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, and 15. J. Ortega-Garcia, ‘‘Deepfakes and beyond: A survey of face manipulation and fake detection,’’ Inf. Fusion, vol. 64, pp. 131–148, Dec. 2020, doi: 10.1016/j.inffus.2020.06.014.