You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

7 February 2023

DDS: Deepfake Detection System through Collective Intelligence and Deep-Learning Model in Blockchain Environment

and
Department of Computer Science, Kyonggi University, Suwon-si 16227, Republic of Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Blockchain in Information Security and Privacy

Abstract

With the spread of mobile devices and the improvement of the mobile service environment, the use of various Internet content providers (ICPs), including content services such as YouTube and video hosting services, has increased significantly. Video content shared in ICP is used for information delivery and issue checking based on accessibility. However, if the content registered and shared in ICP is manipulated through deepfakes and maliciously distributed to cause political attacks or social problems, it can cause a very large negative effect. This study aims to propose a deepfake detection system that detects manipulated video content distributed in video hosting services while ensuring the transparency and objectivity of the detection subject. The detection method of the proposed system is configured through a blockchain and is not dependent on a single ICP, establishing a cooperative system among multiple ICPs and achieving consensus for the common purpose of deepfake detection. In the proposed system, the deep-learning model for detecting deepfakes is independently driven by each ICP, and the results are ensembled through integrated voting. Furthermore, this study proposes a method to supplement the objectivity of integrated voting and the neutrality of the deep-learning model by ensembling collective intelligence-based voting through the participation of ICP users in the integrated voting process and ensuring high accuracy at the same time. Through the proposed system, the accuracy of the deep-learning model is supplemented by utilizing collective intelligence in the blockchain environment, and the creation of a consortium contract environment for common goals between companies with conflicting interests is illuminated.

1. Introduction

Currently, Internet content providers (ICPs), such as video hosting services like YouTube, have developed rapidly through the Fourth Industrial Revolution, the spread of smartphones, high levels of informatization, and the improvement of the mobile service environment. Due to the development of ICP, video media and content are widely shared, and as video content is consumed by many users, social influence through video is growing [1]. Deepfake videos with manipulated content or characters, on the other hand, can be used to cause social confusion or political attacks. If they spread through indiscriminate sharing, the resulting damage is uncontrollable [2]. ICPs such as YouTube and Facebook, which are currently widely used, are censoring video content in their own way. However, to guarantee freedom of expression, ICP only responds to content copyright infringement and does not respond to manipulated images. In the era of hyperconnectivity society due to the Fourth Industrial Revolution, social confusion due to manipulated video content, such as deepfake videos, will accelerate. To prevent this, deepfake detection technology through a fair and reliable detection entity is required.
Most of the existing studies to detect deepfake images have focused on determining whether a single image has been manipulated in a local environment through an independent deep-learning model. As a study to detect deepfake images in the form of a platform or system, the study by Li et al. [3] developed an independent platform to provide the result by determining whether manipulation was performed through the deep-learning model of the service server for the videos that users individually accessed and registered. However, this has limitations in that the user must fully trust the detection subject and must own and upload the original video. Hasan [4] and Patil [5] suggested a plan to integrate and manage video content registered in various services such as YouTube. The above study used a blockchain as a database to find manipulated or unauthorized content through video metadata-based use paths and revision history tracking. However, this assumes an environment in which the original video of the manipulated content is pre-registered and has limitations in tracking the modified items in the original.
This study aims to propose a system in which various ICPs and users mutually cooperate to detect deepfakes and ensure fair and reliable detection results and detection subjects. The proposed system integrates the collective intelligence-based voting and prediction results of deep-learning models in a blockchain environment for fair deepfake detection results. In addition, the detection system of each ICP that performs deepfake detection through a blockchain is flexibly integrated, preventing the decision-making authority of the detection result from being monopolized. The detection process, results, and detection model information are recorded on the blockchain to ensure integrity and persistence. In the proposed system, the fairness of the detection results is supplemented by adding a voting process based on collective intelligence to the deepfake decision process. Collective intelligence-based user voting, which is integrated through voting weights set based on users’ reputations, is integrated with the results of the deep-learning model to supplement the accuracy of the final detection results. The main contributions of this study are summarized as follows:
  • In most studies, fairness and transparency of the detecting subject have not been considered important in building a system for detecting deepfakes, degrading the reliability of the system and detection results. This study uses blockchain technology to improve the fairness and stability of deepfake detection subjects by conducting a detection process based on an automated and verifiable smart contract. Along with the detection results, the main information generated during the detection process is recorded in the blockchain, securing the transparency and reliability of the detection results through the integrity of the blockchain. The proposed system forms cooperation between hostile ICPs through the blockchain to derive a common consensus, and ICPs will establish a consortium for pan-service deepfake detection with the blockchain network as a notary.
  • This study aims to propose an integrated voting method that mixes the deep-learning-based detection results of the ICP consortium with the detection results obtained through collective intelligence voting to improve the accuracy of deepfake detection results. Each ICP independently builds a deep-learning-based detection model to derive detection results, and the results of several ICPs are aggregated to produce the detection results of the consortium. Then, random users are selected and voted on to derive deepfake detection results based on collective intelligence. These two detection results are combined to produce the final detection result. This proposed method has higher accuracy and stability than individual deepfake detection models.
  • To improve the accuracy of the collective intelligence voting process based on user participation in a blockchain environment, this study introduced a user reputation management and compensation system, referring to several previous studies. Each user’s reputation is continuously updated by reflecting the user’s past behavior, and weight based on this reputation is applied to the user’s voting results. In addition, the reward system for friendly behavior in the system induces the normal behavior of the voting group and supplements the accuracy of the final voting result.
  • In this study, several recently announced deepfake detection models were applied to independent nodes to implement prototypes of the proposed system and conduct experiments. The experimental results show that the proposed system outperforms existing single deepfake detection models in terms of accuracy. In addition, the integrated voting method used in the proposed system provides high stability.
In this paper, we propose a deepfake detection system using collective intelligence and deep learning in a blockchain environment. The proposed system integrates the prediction results of independent deep-learning nodes to solve the problem of detection reliability of individual independent detectors, which is a problem of previous research [3]. Through the ensemble of independently operated deep-learning model nodes, each node pursues complementary model development and has a node weight that complements the accuracy and reliability of detection results. Another study [4,5] used a blockchain to check and track content forgery and tampering, but its limitations are clear because it is only detection based on metadata. Through the blockchain, we establish an organic cooperation system of service providers-blockchain network-users. We do not simply use the blockchain as a database, but we derive cooperation for meaningful agreement and detection in mutually hostile business relationships. In this paper, we design a detection cooperative system based on deep learning and collective intelligence in a blockchain environment that has not been attempted in previous studies. In the proposed system, the user’s participation in the platform can be realized through collective intelligence, and the opinions of the participating groups can be reflected in automated detection through deep learning. The deep-learning model guarantees effective profits from investing each other’s resources through consensus and cooperation through blockchains in situations where they operate individually and suppresses situations where technologies are exposed.
This study is structured as follows. Section 2 describes the relevant techniques and research utilized in the study, and Section 3 provides detailed information on the structure, components, and operation method of the proposed system. Section 4 confirms the feasibility of this study through the implementation and experimentation of the proposed system, Section 5 presents the discussion and limitation of proposal, and Section 6 presents the conclusions.

3. Deepfake Detection System through Collective Intelligence and Deep Learning

The goal of the proposed deepfake detection system (DDS) is to establish a fair and objective deepfake detection subject through collective intelligence and deep learning in a blockchain environment. Existing studies and services for detecting deepfakes relied on a single model in which the detection subject had to be completely trusted. As a result, existing studies have a problem in that they cannot respond when detection results are manipulated or errors occur. Through the proposed system, deep-learning models driven by each ICP side compete and sanction each other, complementing the transparency of the detection subject by integrating and using each result through a blockchain. This ensures the objectivity of detection results and establishes a healthy competition system among ICPs. The proposed system includes a service structure for efficient user participation and management of the blockchain network, a reputation model for discrimination in user voting and a voting weight management module through it, a node objectivity evaluation index representing the reliability according to the accuracy of the deep-learning model running on the ICP node, and the requirements of members to operate the proposal system based on a basic blockchain. It also includes a random voter selection and integration module for performing integrated voting. The proposed system is automatically operated without an administrator’s response to the integrated voting request raised by random anonymous users, and it is executed through chaincode, a decentralized smart contract.
The integrated voting of the proposed system is calculated by the final aggregation of user voting based on collective intelligence and the result of the deep-learning model operated by ICP nodes, along with user reputation and a node objectivity evaluation index. User votes are selected based on RANDAO [27], a secure random number generation method in a blockchain environment, and are finally counted with vote weights based on user reputation. User reputation scores increase through system contribution activities, such as voting participation, vote suggestion, and deriving of significant vote, and are converged to a certain score after cumulative increase in the form of the exponential function.
The node model voting for the objectivity of integrated voting has the deep-learning model for deepfake detection running in each ICP node (“node model”) as its voter. The detectors of the node model may be different, and the accuracy may also vary depending on the hardware specifications and detector specifications. The node model has an aggregate weight determined by the node objectivity evaluation index, which is an index that relatively evaluates whether its accuracy is sufficiently objective and accurate for integrated voting.
The proposed system was constructed in the form of a consortium blockchain network using Hyperledger Fabric. All functions of the system, except for the node model, are written in chaincode and run on the blockchain network. They are executed safely and flawlessly in a decentralized system, in which administrators cannot interfere. A detailed description of each function is provided in the corresponding section. We provide a list of abbreviations to help understand the terms used throughout the paper, and the list is shown in Abbreviations.
Blockchain-based software architectures are needed to prevent complex problems that can occur in distributed environments that are prone to systemic conflicts during operation at the design stage. Prior to designing our proposed system, we analyzed the design structure of the blockchain platform currently in service [28] and identified the structural characteristics of the Hyperledger Fabric. Through this, the chain code is designed and operated by reflecting the structural characteristics of the proposed system. In addition, the proposed system is constructed and tested by referring to the design process [28] for effectively designing a blockchain-based system at the system design stage.

3.1. Configuration of the Proposed System

Figure 3 shows the overall configuration of the proposed system. As shown in the figure, the proposed system is largely defined by three elements, which are defined as follows:
Figure 3. The structure of the proposed system.
  • Blockchain Network: A network composed of Hyperledger Fabric creates a consortium of nodes running on service providers. When a transaction generated by a network client is endorsed by an endorser and proposed, the transaction is sorted through a consensus algorithm and then generated as a block and propagated to peer nodes. Items, such as network rules, are determined through agreement between nodes.
  • ICP Node: The node of the blockchain network of the proposed system can be any service, including video hosting services like YouTube and ICPs, involving all acts of posting, hosting, and downloading videos containing intellectual property as service content. In addition, the service node is assumed to have resources capable of driving a node model for deepfake video detection and deriving a result within a meaningful time. It is also assumed that the service will continuously evolve the node model according to the system’s compensation policy. An ICP node is a peer node that is responsible for maintaining the network and executing chaincodes and has chaincodes installed to run on the network. It also maintains network security as an endorser by simulating the transactions generated.
  • User: A user refers to the user of each ICP node constituting a blockchain network who can participate in the blockchain network as a client. A user may be a copyright holder who produces a work as a content creator. Users participating in the network as clients can participate as voters in the integrated vote for the deep-learning detection process.

3.2. New Content Registration Process for the Proposed System

The Hyperledger Fabric blockchain network has a transaction processing process through an ordering service, unlike the blockchain of the general PoW ecosystem. Figure 4 shows the process of a user registering new content in the proposed system and recording the information on the network based on Hyperledger Fabric.
Figure 4. Transaction flow for registering the contents of ICP in the blockchain network in the proposed system and its chaincode.
When a user uploads a video through the ICP to which he or she belongs, the video data are stored in the database server of the ICP [29]. After ICP extracts and signs metadata from video data, it executes the registration chaincode for metadata registration as a client through nodes connected to the blockchain. The chaincode is installed on the peer node, and the chaincode execution transaction is transmitted to the endorser of the other peer node to receive endorsement of the safety of the chaincode before sending it to the orderer. The orderer generates blocks based on the consensus algorithm and sends them to peers. The peer’s anchor receives the block sent from the orderer, confirms the block through the committer, and updates it on the blockchain. ICP extracts the metadata of these contents and registers them with the signature of the service on the blockchain ledger. The metadata registration process is performed by the ICP as a single unit by collecting the content registered by the user of the corresponding service.

3.3. Integrated Vote

The integrated vote in this study refers to the self-purification action of the system performed by the objection flag, which is a function of an objection raised by a user, a client, for suspected deepfake content registered in the system. Integrated voting proceeds through objections raised by unspecified users consuming ICP content that participate as nodes in the system registered through Section 3.2 above. According to the collective selfishness of crab mentality [30], content registered in ICP shows a proportionate frequency of censorship by users as awareness and profitability increase. Accordingly, content with high topicality has a high level of censorship criteria and a high possibility of user objection. The integrated voting process due to the user’s objection is automatically performed on the network through the chain code and determines the authenticity of the deep fake video registered in the ICP to cause self-purification.
Integrated voting is performed by mixing user voting based on collective intelligence and node model voting based on node models operated independently by each ICP along with their respective weights at a certain ratio. The user vote part of the integrated vote for self-purification uses a module to randomly select unspecified users to operate fairly and safely in the blockchain environment In addition, voting weight is given to voters based on their reputation, which is given according to the degree of contribution to the system to supplement voting reliability. Here, reputation is increased through content registration, voting participation, correct prediction of voting results, and objection to deepfake content, which are actions that contribute to the system for the survival of the blockchain-based network ecosystem. Node model voting based on deep-learning models powered by ICPs allows each ICP to independently inspect content suggested by users through different deep-learning models. ICP can select different deep-learning models, and only the results calculated from the deep-learning model are submitted in the form of a black box for the network parameters and structure of the deep-learning model. Since ICP does not disclose the technical specifications of deep-learning models, it is assumed that each deep-learning model will be developed competitively. The inspection results of each deep-learning model are added to the integrated vote through the node weight, which represents node reliability. Integrated voting for self-purification functions within the system integrates and aggregates the node models of users and ICPs at a certain rate. Here, the aggregation ratio is 70% clients and 30% node models. In addition to the 80/20 rule, this is a ratio determined to maintain the initial stability of the ecosystem and can be adjusted through consensus among blockchain network participants.
Figure 5 shows the process of integrated voting. When an objection flag, a content objection function, is received from the flagger, a user who claims to have a problem with a specific content, the process for user voting and node model voting for integrated voting is automatically performed in the proposal system. The results of user voting and node model voting conducted through the proposed system are integrated into the final results through aggregation.
Figure 5. Integrated voting process of the proposed system.
Section 3.3.1 and Section 3.3.2 describe user voting, in which users participate as clients in the integrated voting system, and node model voting, in which the node model, a deep-learning model driven by ICP, a network peer node, participates. The process of integrated counting through voter election and voting weight is explained.

3.3.1. Configuration of User Voting

Fair Election of Voters in a Blockchain Environment
Prior to conducting user voting based on collective intelligence for integrated voting, a way to fairly and safely elect voters in a blockchain environment is needed to ensure objectivity and neutrality in voting. In this study, random numbers are generated through RANDAO, a secure random number generation method in a blockchain environment, and voters are elected based on them.
Figure 6 shows the operation process of RANDAO, and Equation (1) shows the final random number calculation.
R N = S a     S b     S c
Figure 6. Random number generation through RANDAO in a blockchain environment.
RANDAO is a random number generation method in a blockchain environment, where the random number generators a, b, and c in the block n send the hash values of the random seeds Sa, Sb, and Sc of Secure Hash Algorithm 3 (SHA3) [31], SHA3(Sa), SHA3(Sb), and SHA3(Sc) to the blockchain. Then, after receiving the original seeds Sa, Sb, and Sc after k blocks are promised in advance, the hash value is obtained, verified to match the previously recorded value, and the value obtained by Xoring the seed is used as the random number RN. The above method guarantees that a secure random number is generated if there are one or more flawless random number generators due to the impossibility of modifying the previous block and the integrity of the blockchain.
The proposed system elects a voter by matching the generated random number with the system client UID using the peer node as a seed provider for random number generation. Algorithm 1 shows the pseudocode of voterSelector where the proposed system elects voters based on RANDAO.
Algorithm 1: voterSelector pseudo code
Applsci 13 02122 i001
The Allocation of Vote Weight for a Fair Vote
Voting based on collective intelligence using user participation requires a method to resist voting manipulation by malicious users. This study differentiates user voting weights for voting stability. Through this, each user has a voting weight proportional to the system’s contribution. This contribution is expressed as reputation, and accordingly, policies such as systematic differential compensation can be applied. According to game theory [32], users generally avoid actions that could be malicious to the system. The voting weight of the proposed system borrows from Steemit’s reputation-based content management method. In order to calculate voting weight based on reputation, each user has their own reputation raw, which is calculated as reputation score through Equation (2).
R S k = [ l o g { a b s ( R R k ) } 9 ,   0 ] × { ( R R k     0 ) ?   1 : 1 } × 9 + 25
Reputation raw is a value for gradually changing the reputation score in an integer range and is formed in the range of 109 or higher. Reputation raw is increased through content registration, voting participation, correct prediction of voting results, and objection to deepfake content, which are actions that contribute to the system. Through the formula, reputation raw is calculated as an integer reputation score in the range of 25 to 100. The equation shows the process of calculating the reputation score (RS) through the reputation raw (RR) of user k.
Figure 7 shows a graph of the reputation raw-reputation score in the Steem blockchain network that operates a reputation-based content management system through Equation (2), which is the reputation calculation formula of the proposed system. The graph shows the results of analyzing the reputation data of 242,361 Steemit community users recorded in the Steem network. The reputation raw-reputation score rises in proportion to the index, and the reputation raw in the high score range shows a very large difference.
Figure 7. Reputation raw-reputation score graph.
The reputation score generated as shown in Figure 7 is calculated as a voting weight value in the range of 0.75 to 1.25, as shown in the reputation raw-voting weight graph of Figure 8 through Equation (3). Equation (2) is the reputation score-weight equation, where UW is the user weight, RS is the reputation score, and β is the conversion rate of RS-W, 5 × 10 3 R S 25 .
U W k = ( 1.0965 β ) R S 25 + 0.745
Figure 8. Reputation Score-Voting Weight graph.
Through Equation (3), the voting weight has a gentler upward curve compared to the reputation raw graph. This alleviates the decrease in the number of people in the high score range of the reputation score due to the increase in the reputation raw value required to increase the reputation score. Through this, the distribution of voting weight is adjusted, and the phenomenon of biased voting results due to minority opinions is prevented. β, the conversion rate of RS-W, represents the increase in weight proportional to the decrease in the number of people due to the increase in the reputation score.
Voting weight is increased through system contributions, and the effect on voting is adjusted according to the degree of user contribution. A higher reputation score means that more time has been spent on the system and more contributions have been made. Based on game theory, which assumes that the degree of malicious influence is low, the proportion of malicious votes in the voting results is reduced. This utilizes collective intelligence to prevent loss of control of lines that do not harm decentralization through the consortium blockchain and incentive system hosted by enterprise services, which is intended to enable users to act as consumers contributing to the existence of the platform.

3.3.2. Configuration of Node Model Voting

This section describes the node model voting of integrated voting for system self-purification functions. Node model voting has a 30% ratio, as mentioned above, in integrated voting, and aims to complement the neutrality and objectivity of integrated voting. Each node model undergoes node neutrality evaluation at regular intervals to maintain objectivity and accuracy and has a node weight accordingly.
Figure 9 shows the process configuration of node model voting. In the proposed system, different deep-learning models driven by ICP nodes can be used, and their accuracy can vary significantly depending on the hardware performance of the service server and deep-learning model’s network parameters. The proposed system adjusts the influence of the node model on the overall integrated voting through neutrality and objectivity evaluation of node models of different specifications. The node objectivity evaluation index updates the voting weight through node evaluation by the possibility of continuous model development. Equation (4) shows the calculation of the voting weight through the node evaluation performed in the network.
N W [ α ] t = N W [ α ] t 1 × ( V t 1 r e s u l t = = N P [ α ] t 1 r e s u l t ) ?   1.01   :   1
Figure 9. Node model voting process configuration.
In Equation (4), NW means node weight, V means voting, and NP means node prediction, representing a situation in which the node model α progresses from the t − 1 phase to the t phase. The weight of the node model shows a weight improvement of 1% point per successful prediction in each phase of the prediction reliability evaluation step through the equation. In phase t − 1, when the final result of voting is the same as the predicted value of the node, the node weight of the corresponding node in phase t is increased. Nodevote weights can convene a committee composed of ICP nodes to re-evaluate the reliability of the node model when a specific weight is out of the normal range. In the integrated voting stage, the weight is aggregated through the nodevote mixer along with the node model predictions and then integrated into the integrated voting along with the user collective intelligence voting.
Unlike the general ensemble of deep learning, the mixing of the nodevote mixer utilizes only the result of the deep-learning model in the form of a black box. The proposed system does not expose the strategy of each service by using only the results derived by the node model without limiting network parameters, such as loss of the node model. This induces a situation in which it is assumed that ICP nodes of hostile interest will continuously develop the node model for operating profit through a compensation policy in the blockchain environment. The weight of the node model can be evaluated as the technical reliability of the ICP, creating trust value for the enterprise. Nodevote mixing is described in detail in Section 3.3.3. Aggregation and Integrated Votes.

3.3.3. Composition of Integrated Vote

Progress of the Integrated Voting Process
Figure 10 shows the sequence of the entire process for integrated voting in the proposed deepfake detection system. The figure shows objections by users, election of voters, voting according to quarters, aggregation, and integration in the proposed system. The detailed process is as follows:
Figure 10. Process sequence diagram of the proposed system.
  • An objection flag, which is an objection to content suspected of being manipulated by an unspecified user of the network, is presented.
  • The network proceeds with the voterSelect process to initiate integrated voting.
  • The hash value of seed S for RANDAO is submitted from each ICP node by voterSelect.
  • After six blocks, the original seed S is submitted, and based on the random number sn generated by Xor, a voter is randomly selected by matching with the client UID.
  • Voters are notified, and voting takes place within 24 h. → User vote
  • Each ICP node is notified of the implementation of integrated voting and requests a decision value for the corresponding content. → Node model vote
  • The voting performed is integrated by adding voter weight and node weight through the voting collector.
  • Integration voting results for flags are judged as positive (+) or negative (−) values based on a specific threshold that exceeds the threshold.
Aggregation and Integration of Votes
Integrated voting, which is a self-purification function of the proposed system, is conducted by integrating the aggregate results of collective intelligence-based user voting and deep-learning-based node model voting on suspected deepfake contents. For user voting based on collective intelligence, after electing voters through the voter selector and requesting votes from client users in the network, they are aggregated together with the user weight in the voting collector and then integrated. Node model voting is based on deep-learning voting requests from ICP, a network peer node, and the node model running on the ICP node verifies suspicious content. The verification results of the node model are aggregated in the nodevote mixer along with the node weight of each node and then integrated with user votes in the voting collector.
Figure 11 shows the process of integrated voting in the proposed system. Integrated voting is initiated through the objection flag, which is an objection raised by the system user (client) for system self-purification. The flag transaction by the user is delivered to the system’s main chaincode through the endorser and orderer, and the voting process is performed by branching into user voting and node model voting. The voting agenda is whether the target content has been modified by deepfake. The integrated voting of the proposed system is composed of n user voters and nodes, with m node models predicting the contents of k frames.
Figure 11. Integrated vote structure of the proposed deepfake detection system.
For user voting branched off from the voting process, after electing voters through the process of Section 3.3.1. Fair Election of Voters in Blockchain Environment, the event listener requests the elected voters to vote. The elected voters cast their votes during the time limit of the requested time. The number of voters elected and the voting time can be adjusted according to the size of the system. Equation (5) shows the user votes being counted in the voting collector.
V I v o t e r = v o t e r n ( V [ C ] i × U W i )
The voting integrated value of n voters V I v o t e r is calculated through the values of positive (1), abstention and invalidation (0), and negative (−1) of the voting result for the voting agenda content C and Equation (3). It is aggregated by adding the user weight (0.75–1.25) value. The results of user voting are counted in the voting collector and immediately reflected in the integrated vote.
The voting process requests node model voting from service nodes, which are peer nodes in the network, with branching through the system’s main chaincode. The service node decides on the voting agenda for a limited time through a deep-learning model running in each locality. The node model is aggregated in the nodevote mixer along with the node weight generated through the node reliability evaluation in Equation (4). Equation (6) shows the aggregation of node model votes through the nodevode mixer.
V I n o d e = n o d e   m { f = 0 k F [ C ] f [ 0 ,   0.1 ] k × N W [ m ] }
Equation (6) shows the process of integrating votes for content composed of k frames with m node models. F[C]f refers to the prediction result of each node model and indicates whether there is a deep fake for each frame of content C submitted as a voting agenda. The prediction result of the node model uses the average result of all frames.
Node model votes aggregated in the nodevote mixer are merged with user votes through the voting collector. Equation (7) shows voting integration through voting collectors. In the integration stage, which is the end stage of integrated voting, the user voting value aggregated through user voting and the forecasting result of node model voting are integrated.
V v a l u e = V I v o t e r + V I n o d e = { o p p o s i t i o n ,     V v a l u e < 27           d i s p u t e ,     27     V v a l u e 73 a g r e e m e n t ,     73 < V v a l u e
The integration result, V v a l u e , represents positive or negative votes to the voting agenda according to the threshold of 50 ± 23, and results below the threshold give a hold status to the voting agenda contents. The pending content is notified of each service so that the re-voting process can be performed by the service.
Compensation Policy
Table 1 shows the compensation policy according to participation in integrated voting for network users (clients). Incentives are provided according to the compensation policy to improve the accuracy of collective intelligence through the categorization of participation in integrated voting for the system self-purification of client users and compensation. A client who participates in integrated voting, a system-friendly act, and submits a vote in the same direction as the voting result can obtain an increase in reputation raw value and a self-purificator (SP) token, a cryptocurrency within Hyperledger Fabric, as a reward. Rewards are given to participants who voted that there would be no problem when there is no problem with the content and to the participant who voted that there would be a problem when there is indeed a problem with the content and the objector.
Table 1. Compensation policy according to the result of the integrated vote.
Reputation raw, which is the base value of a user’s reputation score, changes through system contributions. Here, system contribution behavior is defined as follows:
  • Registering the contents in each ICP and registering the content information in the system through the ICP node.
  • Participating in integrated voting-user voting to ensure smooth operation of the proposed system.
  • Prediction accepted in the compensation range according to Table 1.
  • Appeal and approval of suspected deepfake content.

4. Experiment and Results

4.1. Experiment Environment and Dataset

For the experiment and evaluation of the system proposed in this paper, implementation and experiments were carried out, and the environment is shown in Table 2. This study previously explained the system with n voters and m node models. In this section, an environment was configured with 100 voters and three blockchain peer nodes to implement and experiment with the proposed system.
Table 2. Experiment and implementation environment.
In this study, the experiment through the node model consisted of three peer nodes. The pretrained deep-learning models of α, β, and γ in Table 3 were assigned to each node model. The official AUC of the assigned deep-learning model was 0.919, 0.951, and 0.944, but an experiment was conducted to confirm the difference in AUC due to variations, such as differences in hardware.
Table 3. Deepfake detection model of ICP node for experiment.
The dataset for the experiment was composed, as shown in Table 4. The dataset was sliced into units of 1000 and composed of feedback epochs to check the real-time nature of node reliability evaluation. Feedback epoch refers to a unit of performing one feedback 1000 times, which refers to a series of processes including proposing voting, voting, aggregation, integration, and node reliability reflection, considering the integrated voting process for contents. This study assumes a node model that can use different deep-learning models. Since each model may have a difference in accuracy for the dataset, each model can derive fair results by using the datasets in Table 4.
Table 4. Deepfake dataset for the experiment.

4.2. Experiment

The experiments in this study were conducted under environmental assumptions. The assumptions were as follows. The network peer node, the ICP node, submits the seed to the network within normal time for smooth operation of RANDAO for voter election. In addition, the node model calculates the prediction result for the agenda content within a normal time limit and submits it to the blockchain network. In addition, the node model calculates the prediction result for the agenda content within a normal time limit of 1440 min and submits it to the blockchain network. In the experiment, the video of the dataset was divided into frames and used for each feedback epoch. In the experiment, the voting accuracy of user voting by system clients was assumed to be 92.5 ± 2.5%p. The experimental environment consisted of consensus through an ordering service, 100 voters, three peer nodes, and a node model in a Hyperledger Fabric blockchain network environment.
Table 5 shows a comparison between the area under the receiver operating characteristic (AUROC) of each deep-learning model and the AUC through the integrated voting process of the proposed system. Each node model was tested through a combined dataset and environment for the experiment in this study. In the experiment, each node sequentially occupied hardware resources for detection and decision making.
Table 5. AUC comparison between models for deepfake detection.
Figure 12 shows the ROC curve and confusion matrix of the integrated voting of the proposed system. Through the ROC curve and confusion matrix, high accuracy is shown in the final decision through integrated voting when it is an actual deep fake video.
Figure 12. (a) ROC curve of ICP node + vote and (b) confusion matrix of integrated voting of the proposed system.
In the proposed system, when the average accuracy of the node model was 87% or higher, V I n o d e of V v a l u e in Equation (7) for voting collection was 26.1044. Each node model is assumed to be given a node weight proportional to its accuracy by the reliability evaluation. The minimum value for exceeding the threshold-73 of V I v o t e r for the agreement of integrated voting is 46.8957. It is resistant to up to 16 malicious voters based on 100 voters in an experimental environment, assuming a voting accuracy of 92.5 ± 2.5%p.
Figure 13 shows the AUC change of the independent deep-learning model and the proposed system during each feedback epoch. The above figure shows the AUC change according to the data set of the final aggregation model of integrated voting and when the deep-learning models α, β, and γ of each node constituting integrated voting are independently driven. The final aggregation value is a sum of the user vote aggregation result of Equation (5) and the nodevote mixing result of Equation (6). The user vote result value V I u s e r has a maximum value of 70, and the nodevote result value V I n o d e has a maximum value range of 30. The graph shows that the proposed model shows high and stable predictions on average. This shows that stable predictions can be made by integrating user votes and the results of each node model according to node reliability. Since the video contents registered in the ICP are unpredictable and a very large amount of data is uploaded, those with average stable predictions and small changes can have a high safety level for incident response. The proposed detection process shows an AUC in the range of 91–95 in response to changes in the data set through experiments. Through this, it is confirmed that the detection process of the proposed system performs objective and neutral stable prediction because the vibration width of the AUC according to the data fluctuation is smaller than that of the individual deep-learning model.
Figure 13. Graph of AUC change according to feedback epoch in integrated voting.
Figure 14 shows the change in the node weight value of the node model during each feedback epoch for the node reliability evaluation. As the experiment proceeds with the node model fixed, the node weight converges similarly to the accuracy distribution of each model. EfficientViT, cross-EfficientViT, and efficientNetB4 were assigned as the three nodes in the experimental environment. The hardware and environmental performance of each node were identical. Figure 14 shows that the real-time node reliability evaluation for node weight measurement is performed stably as the epoch progresses. The accuracy of each node model is directly related to node reliability, correcting the node model’s contribution to the integrated vote. Each feedback of the node reliability evaluation has 1000 frames of examples and a 1%p change range.
Figure 14. Graph of weight change of node model according to feedback epoch.

5. Discussions and Limitations

In this paper, we propose a system for detecting deep fake content in an environment where ICP services are provided to users. The proposed system is constructed through a blockchain, and the final prediction is performed by integrating collective intelligence-based voting and the prediction results through the deep-learning model. We considered how to use collective intelligence-based voting significantly throughout the paper. This paper attempts to solve the problem of individual information (manipulation of information, private use of results, possibility of incitement) and independence (dependence on other people’s opinions, bias of results by minority opinions) [33] that occur in voting through collective intelligence. Each problem was solved through the integration of the prediction results of the deep-learning model by the machine, the voting process, and contribution weighting in the blockchain environment. In addition, by implementing collective intelligence in a blockchain environment, it transparently solves the distributed environment (the way to solve the problem should not be concentrated in one place) and the economic cohesion problem that can occur in incentive-based collective intelligence optimization. From an environmental point of view, the blockchain allows collective intelligence and deep learning, which are the methods that make up the system, to work complementarily, complementing its reliability and transparency. This solves the social costs caused by the non-trust relationship between the existing companies and the absence of the cooperation system. As a result, agreements are drawn based on meaningful results and transparency of the process at low levels of mutual trust, and complementary partnerships are established. Deepfake detection through deep learning uses detection and prediction results from individual detection subjects when used in terms of enterprise and service. The proposed system solves the problem of the total trust of the detection subject that occurs in this dependent detection environment. By designing a blockchain-based ensemble network based on a deep-learning model configured as an independent node as a peer, we overcome the problem of deep learning by utilizing the blockchain in a way that has not been attempted before. We anticipate that these attempts may be in line with the web3.0 framework where users participate in blockchain and manage data independently and explore new possibilities for blockchain.
We have limitations in constructing a collective intelligence experimental environment in implementing and experimenting with the proposed system. Collective intelligence can be influenced by the background of the times and social trends, and it can change according to the individual characteristics of the participating group. Therefore, unlike implementing collective intelligence, experimentation needs to be developed through actual users and platforms. In order to construct the experimental environment, we assume voting figures by referring to the percentage of user opinions that are not malicious to the system in wiki and crowdsourcing, which are collective intelligence-based platforms. However, there is a limit to reflecting the characteristics of collective intelligence to determine whether a problem is right or wrong in the proposed system. In future research, we will collect long-term data for the reliability of collective intelligence to improve the system. Data will be collected in various ways by adjusting conflicting opinion rates within the participating group and by variables such as the age and gender of the group. Through this, this study intends to supplement the basis of the user voting participation rate and the positive (+) direction voting success rate presented in this paper. In addition, the proposed system experiments with the deep-learning model of the ICP node, which is a peer node, in a fixed model state using a major deep-learning model known to date. Deep-learning models and processes for deep fake detection will be further developed in the future, and we will apply an improved deep-learning model to the node model accordingly. Through this, the detection process prediction accuracy of the proposed system will show improved prediction accuracy in proportion to the accuracy of individual models, and we will build a more improved system by adjusting the node weight and composition ratio through experiments.

6. Conclusions

This study proposed a system to prevent social confusion caused by manipulated video content in the information hyper-connected era through the development of ICT technology and the Fourth Industrial Revolution. The proposed system detects deepfake videos shared on the ICP service and predicts whether they were deepfakes. Furthermore, it presents a solution to the reliability and fairness of the detection subject, which is a problem of various studies on deep fake detection that have been studied in the past.
The proposed system uses a method for detecting deepfake images by ensembling the detection results of collective intelligence and deep-learning models in a blockchain environment. In the proposed method, the blockchain network uses independent ICPs as nodes that drive each deep-learning model for deepfake detection. Through this, it realizes the value sharing of censorship and image information management functions that ICPs with conflicting interests keep to the inside of the service. ICP users participate as voters in user voting based on collective intelligence to supplement the fairness and universality of detection results. Each detection result aggregated through user voting and node model voting is integrated into the blockchain to ensure the reliability and transparency of the final decision. It operates on the basis of smart contracts on the blockchain and guarantees the integrity of the process.
As a result of implementing and testing the proposed system in this study, it was confirmed that the method of integrating the detection results of the deep-learning model of the proposed system by counting and integrating user votes showed higher accuracy than the existing individual and independent deepfake detection models. The detection process performed by the system is automated through a blockchain network, which is not controlled by external entities or administrators without authorization, and all users can check the execution process. This ensures the transparency and reliability of the detection process, and the reliability of the detection subject is secured through the voting process. When the three deep-learning models used for the experiment, efficientViT, cross-efficientViT, and efficientNetB4, show AUC of 0.8372, 0.8809, and 0.9012 in the same hardware environment and data environment, the results obtained through the integrated voting of the proposed system are 0.9263. In addition, it was confirmed that the detection process has objectivity and high reliability by showing stable prediction accuracy in the range of 91–95, unlike the individually driven model in the experiment, according to the change of the data group.
Through the proposed system, the possibility of organic cooperation between blockchain and artificial intelligence was confirmed, suggesting that the reliability and integrity of artificial intelligence and the effective guarantee of the permanence of version control were possible through blockchain. In addition, by using blockchains, a consortium for a common purpose between companies was created, allowing hostile companies to create common values. In addition, it was possible to build an environment for the effective use of collective intelligence through a blockchain network. Although the proposed system is focused on detecting deepfakes, it is expected to be helpful when applied to decision-making systems in various domains.
We will supplement the experimental evidence through the practical development of collective intelligence to overcome the limitations of the experimental environment in future research progress. In addition, beyond aggregating the results of each deep-learning model in black-box form, we will design a large-scale federated learning environment for super-large artificial intelligence by forming a consortium for each machine to collect, learn, and detect data through the blockchain.

Author Contributions

Conceptualization, H.K.; Methodology, N.C.; software, N.C.; validation, N.C. and H.K.; writing—original draft, N.C. and H.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Kyonggi University Research Grant 2020.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

DDSDeepfake Detection System
ICPInternet Content Provider
SHA3Secure Hash Algorithm 3
RRReputation Raw
RSReputation Score
UWUser Weight
NWNode Weight
NPNode Prediction
VVoting
VIVoting Integrated value

References

  1. The Impact of the Internet on Society: A Global Perspective. OpenMind. Available online: https://www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-global-perspective/ (accessed on 5 January 2023).
  2. Repez, C.P.F.; Popescu, M.-M. Social Media and the Threats against Human Security—Deepfake and Fake News. In Romanian Military Thinking International Scientific Conference Proceedings; Military Strategy Coordinates under the Circumstances of a Synergistic Approach to Resilience in the Security Field; Centrul Tehnic-Editorial al Armatei; Ministry of Defense: București, Romania, 2020; pp. 44–55. ISSN 2668-8115. [Google Scholar]
  3. Li, Y.; Zhang, C.; Sun, P.; Ke, L.; Ju, Y.; Qi, H.; Lyu, S. DeepFake-o-Meter: An Open Platform for DeepFake Detection. In Proceedings of the 2021 IEEE Security and Privacy Workshops (SPW), Virtual, 27 May 2021; pp. 277–281. [Google Scholar] [CrossRef]
  4. Hasan, H.R.; Salah, K. Combating Deepfake Videos Using Blockchain and Smart Contracts. IEEE Access 2019, 7, 41596–41606. [Google Scholar] [CrossRef]
  5. Patil, U.; Chouragade, P.M. Blockchain Based Approach for Tackling Deepfake Videos. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2021, 7, 342–347. [Google Scholar] [CrossRef]
  6. Sunyaev, A. Distributed Ledger Technology. In Internet Computing; Springer: Berlin/Heidelberg, Germany, 2020; pp. 265–299. [Google Scholar] [CrossRef]
  7. What Is Ethereum? Ethereum.Org. Available online: https://ethereum.org/en/what-is-ethereum/ (accessed on 5 January 2023).
  8. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21260. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 5 January 2023).
  9. Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the Security and Performance of Proof of Work Blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, Vienna, Austria, 24–28 October 2016; pp. 3–16. [Google Scholar] [CrossRef]
  10. Hyperledger Fabric – Hyperledger Foundation. Available online: https://www.hyperledger.org/use/fabric (accessed on 5 January 2023).
  11. Sanchez-Gomez, N.; Torres-Valderrama, J.; Garcia-Garcia, J.A.; Gutierrez, J.J.; Escalona, M.J. Model-Based Software Design and Testing in Blockchain Smart Contracts: A Systematic Literature Review. IEEE Access 2020, 8, 164556–164569. [Google Scholar] [CrossRef]
  12. Górski, T. The k + 1 Symmetric Test Pattern for Smart Contracts. Symmetry 2022, 14, 1686. [Google Scholar] [CrossRef]
  13. Täuscher, K. Leveraging Collective Intelligence: How to Design and Manage Crowd-Based Business Models. Bus. Horiz. 2017, 60, 237–245. [Google Scholar] [CrossRef]
  14. Dunford, R.; Su, Q.; Tamang, E. The Pareto Principle; PEARL: Plymouth, UK, 2014; ISSN 1754-2383. [Google Scholar]
  15. Mann, R.P.; Helbing, D. Optimal Incentives for Collective Intelligence. Proc. Natl. Acad. Sci. USA 2017, 114, 5077–5082. [Google Scholar] [CrossRef] [PubMed]
  16. Nguyen, M.; Bai, Q.; Yu, J. A Blockchain-Based Trust Model for Crowd Environments. In Proceedings of the Australasian Computer Science Week Multiconference, Melbourne, Australia, 4–6 February 2020; pp. 1–7. [Google Scholar] [CrossRef]
  17. Bonabeau, E. Decisions 2.0: The Power of Collective Intelligence. MIT Sloan Manag. Rev. 2009, 50, 45. [Google Scholar]
  18. Trending Posts—Steemit. Available online: https://steemit.com/ (accessed on 5 January 2023).
  19. Powering Communities and Opportunities—Steem. Available online: https://steem.com/ (accessed on 5 January 2023).
  20. Snider, M.; Samani, K.; Jain, T. Delegated Proof of Stake: Features & Tradeoffs. Multicoin Capital: New York, NY, USA, 2018; Available online: https://multicoin.capital/2018/03/02/delegated-proof-stake-features-tradeoffs/ (accessed on 5 January 2023).
  21. Creswell, A.; White, T.; Dumoulin, V.; Arulkumaran, K.; Sengupta, B.; Bharath, A.A. Generative Adversarial Networks: An Overview. IEEE Signal Process. Mag. 2018, 35, 53–65. [Google Scholar] [CrossRef]
  22. DeepFake Detection Challenge Dataset. Available online: https://ai.facebook.com/datasets/dfdc/ (accessed on 5 January 2023).
  23. GitHub - Ondyari/FaceForensics: Github of the FaceForensics Dataset. Available online: https://github.com/ondyari/FaceForensics (accessed on 5 January 2023).
  24. Chollet, F. Xception: Deep Learning with Depthwise Separable Convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 1251–1258. [Google Scholar] [CrossRef]
  25. Coccomini, D.A.; Messina, N.; Gennaro, C.; Falchi, F. Combining Efficientnet and Vision Transformers for Video Deepfake Detection. In Proceedings of the International Conference on Image Analysis and Processing; Springer: Berlin/Heidelberg, Germany, 2022; pp. 219–229. [Google Scholar] [CrossRef]
  26. Bonettini, N.; Cannas, E.D.; Mandelli, S.; Bondi, L.; Bestagini, P.; Tubaro, S. Video Face Manipulation Detection through Ensemble of Cnns. In Proceedings of the 2020 25th international conference on pattern recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 5012–5019. [Google Scholar] [CrossRef]
  27. Blockchain Based Verifiable Random Number Generator. Available online: https://www.randao.org/ (accessed on 5 January 2023).
  28. Xu, X.; Weber, I.; Staples, M. Existing Blockchain Platforms. In Architecture for Blockchain Applications; Springer International Publishing: Cham, Switzerland, 2019; pp. 27–44. ISBN 978-3-030-03034-6. [Google Scholar]
  29. Choi, N. Blockchain-Based Over-the-Service Copyright Protection and Management System. J. Korean Inst. Inf. Technol. 2021, 19, 123–132. [Google Scholar] [CrossRef]
  30. Ltd, I.-I.B. The “Crabs in a Bucket” Mentality in Healthcare Personnel: A Phenomenological Study. Hitit Üniversitesi Sosyal Bilimler Enstitüsü Dergisi 2019, 12, 618–630. [Google Scholar] [CrossRef]
  31. Dworkin, M.J. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. NIST 2015, FIPS-202. [Google Scholar] [CrossRef]
  32. Owen, G. Game Theory; Emerald Group Publishing: Bingley, UK, 2013; ISSN 1-78190-508-8. [Google Scholar]
  33. Centola, D. The Network Science of Collective Intelligence. Trends Cogn. Sci. 2022, 26, 923–941. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.