International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Deepfake Detection Using Artificial Intelligence and Blockchain
ABSTRACT The rapid advancement of artificial intelligence has enabled the generation of highly realistic deepfake videos and images, which pose severe threats to digital trust, privacy, and security. Deepfake media can be misused for political misinformation, identity fraud, cybercrime, and legal evidence manipulation. Existing deepfake detection systems are mostly centralized, making them vulnerable to privacy leakage, model tampering, and lack of trust in detection outcomes. This paper proposes a Blockchain-Enabled Federated CNN–LSTM framework for secure and privacy-preserving deepfake detection. The proposed system uses Convolutional Neural Networks (CNNs) to extract spatial manipulation artifacts from video frames and Long Short-Term Memory (LSTM) networks to capture temporal inconsistencies across frames. Federated Learning allows decentralized training without sharing raw video data, ensuring privacy preservation, while Blockchain technology provides tamper-proof and transparent storage of detection results. Experimental evaluation on benchmark datasets demonstrates that the proposed approach achieves superior accuracy, robustness, privacy, and trustworthiness compared to conventional deepfake detection methods.
AUTHOR BHAVNA PARASTE, DR. SAURABH SHARMA, PROF. SAURABH VERMA Department of Computer Science and Engineering, Baderia Global Institute of Engineering & Management, Jabalpur, Madhya Pradesh, India
VOLUME 180
DOI DOI: 10.15680/IJIRCCE.2026.1401038
PDF pdf/38_Deepfake Detection Using Artificial Intelligence and Blockchain.pdf
KEYWORDS
References [1] A. Rössler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, and M. Nießner, “FaceForensics++: Learning to detect manipulated facial images,” in Proc. IEEE Int. Conf. Computer Vision (ICCV), Seoul, South Korea, 2019, pp. 1–11.
[2] B. Dolhansky et al., “The DeepFake Detection Challenge (DFDC) Dataset,” arXiv preprint arXiv:2006.07397, 2020.
[3] Y. Li, J. Bao, T. Zhang, H. Zhu, and X. Li, “Celeb-DF: A Large-Scale Challenging Dataset for DeepFake Forensics,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 2020, pp. 3207–3216.
[4] T. T. Nguyen, X. H. Nguyen, M. C. Nguyen, D. T. Nguyen, and S. Nahavandi, “Deep learning for deepfakes creation and detection: A survey,” Computer Vision and Image Understanding, vol. 223, pp. 103–118, 2022.
[5] T. T. Nguyen, C. M. Nguyen, D. T. Nguyen, D. T. Nguyen, and S. Nahavandi, “Deepfake video detection using convolutional neural networks,” in Proc. IEEE Int. Conf. Systems, Man, and Cybernetics (SMC), Bari, Italy, 2019, pp. 1–6.
[6] E. Sabir, J. Cheng, A. Jaiswal, W. AbdAlmageed, I. Masi, and P. Natarajan, “Recurrent convolutional strategies for face manipulation detection in videos,” arXiv preprint arXiv:1909.12424, 2019.
[7] F. Chollet, “Xception: Deep learning with depthwise separable convolutions,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA, 2017, pp. 1251–1258.
[8] P. Zhou, X. Han, V. I. Morariu, and L. S. Davis, “Two-stream neural networks for tampered face detection,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, 2017, pp. 1831–1839.
[9] S. Wang, O. Wang, R. Zhang, A. Owens, and A. A. Efros, “CNN-generated images are surprisingly easy to spot… for now,” in Proc. IEEE/CVF Conf. Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 2020, pp. 8695–8704.
[10] S. Agarwal, H. Farid, Y. Gu, M. He, K. Nagano, and H. Li, “Protecting world leaders against deep fakes,” in Proc. IEEE Int. Conf. Image Processing (ICIP), Taipei, Taiwan, 2019, pp. 38–42.
[11] S. Verma, M. Bhatele, and A. A. Waoo, “Enhancing medical image security through RGB and YUV color-based advanced triple watermarking techniques,” ResearchGate Publication, 2024.
[12] S. Verma, M. Bhatele, and A. A. Waoo, “Role-based access control framework using dynamic watermarking for secure DICOM medical image communication,” ResearchGate / Journal Article, 2025.
[13] S. Verma, M. Bhatele, and A. A. Waoo, “Advanced security framework for DICOM images using triple watermarking with DWT and SVD for role-based access control,” Research Article, 2025.
[14] A. Hard, K. Rao, R. Mathews, et al., “Federated learning for mobile keyboard prediction,” Google AI Research, 2019.
[15] A. Majeed and H. Kim, “Secure federated learning using blockchain-based consensus,” IEEE Access, vol. 8, pp. 227445–227456, 2020.
[16] N. Mireshghallah, M. Nasr, R. Shokri, and A. Houmansadr, “Privacy-preserving deep learning with blockchain,” arXiv preprint arXiv:2005.09602, 2020.
[17] S. Tariq, S. Lee, H. Lee, and S. Woo, “Blockchain-based secure video authentication,” IEEE Access, vol. 9, pp. 67423–67435, 2021.
[18] Y. Liu, K. Zhang, J. Yang, and J. Deng, “Blockchain-enabled trust management in distributed artificial intelligence systems,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9873–9885, 2021.
image
Copyright © IJIRCCE 2020.All right reserved