The Impact of Blockchain Technology To Protect Image and Video Integrity From Identity Theft Using Deepfake Analyzer
The Impact of Blockchain Technology To Protect Image and Video Integrity From Identity Theft Using Deepfake Analyzer
Introduction
1
released across social media platforms, in which a
actor.
someone's identity.
validation.
2
With the issues and concerns regarding this matter,
following questions:
3
2. How do the respondents evaluate “Deepfake analyzer
following:
appropriateness.
Interoperability.
and Recoverability.
and Non-Repudiation.
Testability.
4
Theoretical Background
5
0Conceptual Framework
6
Figure 1. Input, Process, and Output
7
Figure 1 illustrates the system's Input, Process,
and Output. The input is the users who would upload their
based on the file that has been uploaded and then checks
8
Objectives of the Study
objectives:
legitimacy of content.
disinformation.
9
result that the researchers may prove and presume that
in this study.
10
we can protect and avoid misleading content through our
content online.
us.
11
identity theft using the Deepfake analyzer. The study was
12
However, this study had several limitations—this study
humans.
Definition of Terms
else.
13
Gen X - Generation X was born between 1965 and 1980.
14
CHAPTER 2
Foreign Studies
15
material, the solution framework, system architecture,
16
blockchain. The technique allows social media users to
17
Tambe & Pawar, (2020) invented a technique for
18
that convolutional neural networks (CNNs) can efficiently
19
single-layer binary classifier. The encoder and
@AUC.
20
MIL is eased in S-MIL. The spatial-temporal encoded
recognition applications.
21
based approaches, while unable to compete with
inconsistencies.
22
limit the impact of harmful Deepfake technology. The
intentions.
Local Study
23
vulnerable individuals. Even though technology is
Local Literature
24
News, (2022) explained the impact of Deepfake and
else has heard the same thing. They also stated that
Synthesis
25
manipulation. Based on the reviewed materials and the
image and video content and the actual image and video
content.
technology.
26
CHAPTER 3
Research Methodology
27
sample data. Overall, the research method chosen will be
questionnaire data.
Requirement Analysis
28
Figure 2 System Flowchart
29
purposively selected as participants in a pre-survey. The
objective.
30
experts in the field of Technology and research
development.
Table 1
Type
Generation X 30
Generation Z 30
Millennial 30
Total 90
31
Table 2
f % f % f % f %
their sex. It reveals that 31.1% are male and 68.9% are
32
Table 3
that it is
important to
fight against
false
information and
to take an
action about
“Deepfake”?
33
2. Do you agree 4.73 SA 4.43 A 4.63 SA 4.60 SA
that “Deepfake”
is a
significant
threat to
society
affecting
people’s
perception and
misleading
them?
that “Deepfake”
can be used to
spread fake
to an increase
in fake
scandals?
that “Deepfake”
technology have
the potential
to sway public
opinion?
34
5. Do you agree 4.87 SA 4.60 SA 4.50 SA 4.66 SA
that “Deepfake”
severe problems
such as
violation of
the human
rights, right
of privacy,
personal data
protection
right, etc.
that “Deepfake”
can potentially
distort
democratic
discourse such
as manipulate
elections and
political
views?
that “Deepfake”
35
can be misused
to commit
fraud,
extortion,
bullying as
well as to
falsify
evidence?
that social
media platforms
like Facebook,
Google, or
YouTube plays
an important
role in
alerting the
public about
faked images or
videos?
that it is
important to
teach society
36
knowledge about
“Hoaxes and
Fake Content”
to help them
learn more
about
misinformation,
and
disinformation,
online?
that it is
important to
build a system
utilizing
“Blockchain”
Technology to
combat
“Deepfake”?
Legend
3.50-4.49 A Agree
1.50-2.49 D Disagree
37
1.00-1.49 SDA Strongly Disagree
38
agree that it is important to build a system utilizing
4.46).
39
The researchers used Survey Questionnaire,
instruments.
40
responders to respond to the questions using a web-
based form.
is developed.
41
researchers oriented the respondents who would answer the
Preparation of Instrument
42
utilizing the system’s standards and criteria of ISO /IEC
analyzer.
43
The following statistical tools were used to
below:
Descriptive Interpretation
(SA)
(MA)
44
1.00-1.79 1 Strongly Disagree
(SD)
disagree.
considered.
or parts of a whole.
f
%f = ×100
n
Where:
%ƒ – relative frequency
ƒ- frequency
45
response. This was a criterion for determining the
status.
∑ wx
wx=
∑w
Where:
wx - weighted mean
system function.
x 1−x 2
t=
√
2 2
s 1 s2
+
n1 n2
Where:
46
t - t value
2
s1−variance of the first group
2
s2−variance of the first group squared
Analytical Tool
47
a better understanding of the existing and developed
system.
the flow of the data in the system and how decisions are
Software Model
48
Figure 3 The Scrum Model
49
overseeing that the scrum process and practices are
goal or tasks that were assigned for each sprint that the
50
development progress and overall results for planning the
System Requirements
academe.
Hardware
quality.
51
OS: Windows 11 Pro
Version 21H2
OS build 22000.739
1000.22000.739.0
Software
52
consisting of different Python and R Programming
text.
Python 3.5 -
image data.
53
tensorflow 2.8.1 - TensorFlow is an end-to-end open-
Peopleware
creation.
54
Network
Data Warehouse
CHAPTER 4
55
This chapter describes the analysis of data followed
Table 5
Assessment of respondents in Functional Suitability
56
The system covers all the 4.40 A 4.37 A 4.37 A
specified tasks and user
objectives.
(Functional Completeness)
57
the system facilitates the accomplishment of specified
(WM=4.17).
system (OWM=4.27).
Table 6
Assessment of respondents in Performance Efficiency
58
respondents agreed that the system response and
system (OWM=4.17).
Table 7
Assessment of respondents in Compatibility
59
Indicators Expert User Composite
Mean
WM VI WM VI WM VI
The system can perform its 4.50 SA 4.24 A 4.27 A
required functions
efficiently while sharing
a common environment and
resources with other
products, without
detrimental impact on any
other product.
(Co-existence)
60
identity theft using a deep fake analyzer system
(OWM=4.22).
Table 8
Assessment of respondents in Usability
61
(Accessibility)
62
widest range of characteristics and capabilities to
Accessibility (WM=4.20).
(OWM=4.14).
Table 9
Assessment of respondents in Reliability
63
normal operation Maturity (WM=4.22) Furthermore, the
(OWM=4.16).
Table 10
Assessment of respondents in Security
64
Overall Weighted Mean 4.43 A 4.17 A 4.20 A
Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean
(WM=4.20).
Table 11
Assessment of respondents in Maintainability
65
Indicators Expert User Composite
Mean
WM VI WM VI WM VI
Reducing inter-service 4.50 SA 4.19 A 4.22 A
dependencies enhances the
system's modifiability.
(Modifiability)
Testability (WM=4.25).
(OWM=4.24).
Table 12
Summary of assessment of respondents in enumerated system
features
66
Weighted Verbal Rank
Indicators Mean Interpretation
Functional Suitability 4.27 Agree 1
Performance Efficiency 4.17 Agree 5
Compatibility 4.22 Agree 3
Usability 4.14 Agree 7
Reliability 4.16 Agree 6
Security 4.20 Agree 4
Maintainability 4.24 Agree 2
Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean
Table 13
67
Post-analysis of the Differences between the assessment
of IT Experts and Customers in the Enumerated Features of
the Impact of blockchain technology to protect video and
image integrity from identity theft using deep fake
analyzer.
68
and users in the abovementioned enumerated features. The
69
experts learn features more quickly and retain their
70
CHAPTER 5
Summary of Findings
71
theft using a deepfake analyzer. Table 3 displays
fixed.
following:
a. Functional Suitability
b. Performance Efficiency
c. Compatibility
d. Usability
e. Reliability
f. Security; and
g. Maintainability
72
Performance Efficiency, Compatibility, Usability,
Conclusion
73
Based on the findings, the result shows that the
following:
- Functional Suitability
- Performance Efficiency
- Compatibility
- Usability
- Reliability
- Security
- Maintainability
74
Based on the findings of the research, it showed that the
system to be functional.
Recommendation
detection.
75
2. Future researchers can focus on improving the
accessibility.
system.
76
REFERENCES:
Akwei, A. (2022). o g n a M o g n a M o g n a M o g n a
M. https://44bars.com/andrea-brillantes-viral-
deepfake-video-is-the-new-internet-obsession/
Ge, S., Lin, F., Li, C., Zhang, D., Tan, J., Wang, W., &
Zeng, D. (2021, December 1). Latent Pattern Sensing:
Deepfake Video Detection via Predictive
Representation Learning. ACM International Conference
Proceeding Series.
https://doi.org/10.1145/3469877.3490586
77
Hasan, H. R., & Salah, K. (2019). Combating Deepfake
Videos Using Blockchain and Smart Contracts. IEEE
Access, 7, 41596–41606.
https://doi.org/10.1109/ACCESS.2019.2905689
Li, X., Lang, Y., Chen, Y., Mao, X., He, Y., Wang, S.,
Xue, H., & Lu, Q. (2020). Sharp Multiple Instance
Learning for DeepFake Video Detection. MM 2020 -
Proceedings of the 28th ACM International Conference
on Multimedia, 1864–1872.
https://doi.org/10.1145/3394171.3414034
Nagothu, D., Xu, R., Chen, Y., Blasch, E., & Aved, A.
(2022). DeFake: Decentralized ENF-Consensus Based
DeepFake Detection in Video Conferencing. 1–6.
https://doi.org/10.1109/mmsp53017.2021.9733503
78
to this Story What are deepfakes?
https://sulit.ph/what-are-deepfakes-and-fake-news/?
fbclid=IwAR1oxogpwdZ4_tXCBX-PQdcrI-
Nkoqg5ru_NmkOfE0hbbYJ-VpCgy-2nfYE
79
APPENDIX A
80
APPENDIX B
Communication Letters
81
APPENDIX C
82
Figure. 12 Age of the Respondents
83
Figure. 17 Question No. 5
84
Figure. 18 Question No. 6
85
Figure. 20 Question No. 8
86
Figure. 22 Question No. 10
87
APPENDIX D
88
Figure. 25 Functional Suitability in terms of Functional
Completeness
Correctness
89
Figure. 27 Functional Suitability in terms of Functional
Appropriateness
Behavior
90
Figure. 29 Performance Efficiency in terms of Resource
Utilization
91
Figure. 31 Compatibility in terms of Co-existence
92
Figure. 33 Usability in terms of Appropriateness
Recognizability
93
Figure. 35 Usability in terms of Operability
94
Figure. 37 Usability in terms of User Interface
Aesthetics
95
Figure. 39 Reliability in terms of Maturity
96
Figure. 41 Reliability in terms of Recoverability
97
Figure. 43 Security in terms of Integrity
98
Figure. 45 Maintainability in terms of Modifiability
99
APPENDIX E
Prediction
100
Figure. 48 User Interface for Video Upload and
Prediction
101
APPENDIX F
User Manual
102
Figure. 51 Generation of Hash Code
103
Figure. 54 Testing of Video
104
Figure. 56 History of the Previous Result
105
APPENDIX G
Curriculum Vitae
Personal Information
09777629694
Academic History
Eulogio “Amang” Rodriguez Institute of (2019 – Present)
Science and Technology
Scholar: First year- Present
106
Senior High Graduate with Highest Honor (2018-2019)
Personal Information
09167940894
Academic History
Eulogio “Amang” Rodriguez Institute of (2019 – Present)
Science and Technology
Scholar: First year- Present
107
Personal Information
09998099695
Academic History
108
Personal Information
109
Personal Information
Raffy D. Uao
Address: Block 28 Unit 6 Sitio Sto. Niño
Mayamot Antipolo City
09569285131
[email protected]
Educational Background
Eulogio Amang Rodriguez Institute of (2019–Present)
Science and Technology
SHS: Ama East Rizal (2016-2018)
High School: Antipolo National High School (2012-2016)
Elementary: Bagong Nayon 1 Elementary School (2007 –
2012)
Elementary: Cupang Elementary School (2006–2007)
110
111