Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 111

CHAPTER 1

The Problem and Its Background

Introduction

Recently, a growing crisis has emerged; the

advancement of Artificial Intelligence (AI) has led to

the development of a near-quality video editing and

creation known as Deepfake. Deepfakes derive from "deep

learning" and "fake" techniques, which can superimpose

anyone's face to anyone else. These strategies categorize

into two first changing faces through images called face-

swapping or face-swap. Moreover, Lip-sync Deepfake refers

to a video that alters to create a realistic forgery of

physical features of people appearing to say or do things

that never really happened.

According to recent studies, to be able to make

Deepfake content, it needs a large number of images and

videos to train models and to create a real video and

image. Since prominent personalities like celebrities,

politicians, influencers, Etc., has so many available

videos and images online, they are typically the prime

target of Deepfake. In 2017, the first Deepfake video was

1
released across social media platforms, in which a

celebrity's face uses to swap with the face of a porn

actor.

This emerging technology was initially alarming

since image manipulation, and face-swapping create a

massive threat to violation of privacy and identity. It

holds that the advancement of Deepfake technology has the

potential to sway public opinion, mis, and

disinformation, affect election outcomes, violence, and

can even harm one person's reputation, which stole

someone's identity.

It is crucial to fight against this misleading

information and take action that tackles and identifies

Deepfake content such as fake videos and photos. As

stated by Patil & Chouragade, (2021), there are currently

no proven mechanisms for determining the authenticity of

an electronically uploaded or published digital video,

audio, or photograph. When it comes to Deepfake, superior

technology such as blockchain will come to the fore to

provide certain levels of authentication, acceptance, and

validation.

2
With the issues and concerns regarding this matter,

the researchers propose decentralized technologies to

address this problem. Such capability is widely available

in blockchain systems. Blockchain innovation has many

uses, with the invention ready to modify and impact

different organizations, markets, and areas, including

natural food inventory networks and many others. In the

case of Deepfake, superior technology such as blockchain

will be used to provide specific levels of verification,

acceptance, and validation. Blockchain could provide

secure and tamper-proof information and transactions as a

decentralized distributed ledger. In a decentralized,

highly trustworthy, and stable manner, blockchain can

incorporate essential functionality to confirm the

authenticity and originality of digital items.

Statement of the Problem

The researchers aimed to prove and justify the

following questions:

1. What is the Impact of Blockchain Technology to Protect

the Integrity of the Video and Image to prevent

Identity Theft using Deepfake Analyzer?

3
2. How do the respondents evaluate “Deepfake analyzer

using Blockchain technology” in terms of the

following:

2.1 Functional Suitability, which was designed

based on completeness, correctness, and

appropriateness.

2.2 Performance Efficiency processes a request and

returns a response based on Time Behavior, Resource

Utilization, and Capacity.

2.3 Compatibility which system can share the same

service operations based on Co-existence and

Interoperability.

2.4 Usability based on Recognizability,

Learnability, Operability, User Error Protection,

Aesthetics, and Accessibility.

2.5 Reliability in terms of Maturity, Availability,

and Recoverability.

2.6 Security based on Confidentiality, Integrity,

and Non-Repudiation.

2.7 Maintainability based on Modifiability and

Testability.

4
Theoretical Background

Based on how blockchain technology can potentially

combat Deepfake to improve the image and video integrity.

Cheikosman et al., (2021) stated that Blockchain's

ability to provide decentralized authenticity validation

and a transparent chain of custody makes it potentially

effective as a tool to track and verify all sorts of

content. Images and videos have their cryptographic hash,

data assigned at the time of recording, or the source

origin; this is a unique fingerprint for specific content

or file. Through the study, the immutability features

that blockchain brings; the ability for a record on

blockchain to stay permanent and irreversible; and the

hash or "fingerprint" cannot be modified and becomes a

tamper-proof reference of the digital content at a

specific point in time. If applied to the Deepfake

analyzer, it means that on a blockchain network, hashes

can help prove that images, videos, or content do not

alter over time.

5
0Conceptual Framework

This study utilized the Input-Process-Output (IPO)

model in describing the overall structure of an

information processing program for the project. The

framework would be a significant guide for the readers in

understanding this study.

6
Figure 1. Input, Process, and Output

7
Figure 1 illustrates the system's Input, Process,

and Output. The input is the users who would upload their

video or image to detect whether it is Deepfake or

natural. Then, the process would generate a hash code

based on the file that has been uploaded and then checks

it on the hash codes that have been pre-defined in the

blockchain database. When the hash code is processed, it

would give the output immediately; if not, it will start

analyzing the file. It could convert into four (4)

convolutional blocks and layers to determine each layer's

size and filter. Then, it could have a batch

normalization to improve the neural network's speed,

performance, and stability by normalizing each layer. The

tool brings numerical data to a standard scale without

distorting its shape. Then it would go to the pooling

layer, which reduces the dimensionality of the layers for

faster computation and check it to the pre-trained data

for cross-validation. Then the output would determine

whether the file is genuine or Deepfake. Then it could

display the result and automatically update the hash

database in the blockchain.

8
Objectives of the Study

This study sought to answer the following

objectives:

● to utilize decentralized technology such as a

blockchain-based approach for establishing a secure

and reliable systematic way to trace the original

video. To develop a system that will detect the

legitimacy of content.

● to analyze the impact of blockchain technology in

protecting video and image integrity from identity

theft using the Deepfake analyzer.

● to provide digital integrity across the media, which

will systematically lessen the mis and

disinformation.

Significance of the Study

This study would determine the impact of blockchain

technology on protecting video and image integrity from

identity theft using the Deepfake analyzer. Based on the

9
result that the researchers may prove and presume that

the study would contribute to the following:

To the Academicians- This study would benefit the

Institute as this project can provide extra security to

the students, staff, faculty members, office chiefs, and

administrative officials of the Institute.

To the Celebrities- The study result would also benefit

celebrities by providing them with knowledge about their

images and videos that can be used as misleading content

online called Deepfake. In addition, it will help them to

be legit- check the contents they see online.

To the Future Researchers- This study would provide

valuable information that would add and help future

researchers if they have the same study as us. This study

would serve as one of their background and knowledge

regarding blockchain technology and Deepfake. Lastly,

this study will help them improve parameters not covered

in this study.

Prominent Personalities- Given that they are widely known

personalities, we cannot stop the spread of their images

and videos online. However, using blockchain technology,

10
we can protect and avoid misleading content through our

proposed Deepfake analyzer.

To the Politicians- This study would benefit politicians

to help them secure their identity and prevent

falsification in case cybercrimes use their images and

videos online for Deepfake.

To the Society- This study would benefit society as this

would serve as security not only to high-profile

individuals but to cover everyone in the society from

possible attacks of identity theft. In addition, through

the information provided, they are less likely to fall

prey to the spread of fake news and any misleading

content online.

To the Software Developers- This study may serve as a

software program that refers to future software

developers. This research will serve as a guide and

additional information if they have the same research as

us.

Scope and Limitations of the Study

The scope of the study is the impact of blockchain

technology on protecting video and image integrity from

11
identity theft using the Deepfake analyzer. The study was

conducted in Eulogio "Amang" Rodriquez Institute of

Science and Technology (EARIST) during the First Semester

of the School Year 2021- 2022.

The study's main scope is to develop a system that

would analyze the validity of digital content. The

researcher's solution focuses only on video content, but

the solution framework provided in this paper is generic

enough and applicable to different images.

This study has the potential for different models

such as the Advanced Encryption Standard (AES) Algorithm,

Ethereum Smart Contract, and Consensus Algorithm to help

solve and automate a solution to the system. The data

sets compiled for this study are from various sources.

Furthermore, reviews of related works used in this study

were from available recent studies, news, articles, and

journals on the internet.

Lastly, the target respondents of the study were

categorized into three generations, namely Generation Z

(born from 1997 to 2012), Millennials (born from 1981 to

1996), and Generation X (taken from 1965 to 1980).

12
However, this study had several limitations—this study

limits factors like audio and other content besides

humans.

Definition of Terms

To better understand the study, the researcher gave

several terms defined conceptually and operationally as

used in the study.

AI- Artificial Intelligence

AES- It is also known as the Advanced Encryption

Standard. The United States government selected this

symmetric block cipher to safeguard sensitive data.

Analyzer- A device that identifies or examines validity.

Blockchain- Decentralized technology is used to identify

the authenticity of digital content.

Consensus Algorithm- Help determine the reliability in a

network involving multiple unreliable nodes.

Deepfake- Derives from “deep learning” and “fake”

techniques that can superimpose anyone’s face to anyone

else.

Face- swap- Changing faces through images.

13
Gen X - Generation X was born between 1965 and 1980.

Gen Z - Generation Z was born between 1997 to 2012.

Machine Learning - A machine's ability to emulate

intelligent human conduct.

Millennials - Born between 1981 to 1996

Smart Contracts- Storing programs on a blockchain that

will run when predetermined conditions meet.

14
CHAPTER 2

Review of Related Literature

Deepfake detection is gaining popularity due to the

security risks raised by using face-swapping techniques.

This section reviews and discusses related literature and

studies on a different blockchain-based method to

determine Deepfake video content.

Foreign Studies

The study of Hasan & Salah, (2019) provided a

decentralized blockchain-based approach for protecting

and reliable traceability to the original video producer

or source of digital videos. Their method uses IPFS, a

decentralized storage system, the Ethereum name service,

and a decentralized reputation system. Ethereum

blockchain-based solutions maintain the veracity of

digital data by providing reliable and secure

traceability back to a trusted artist or publication

source. Even though the resolution concentrates on video

15
material, the solution framework, system architecture,

algorithms, sequence diagrams, and implementation and

testing details are sufficiently flexible to be used in

other forms of digital content such as audio,

photographs, images, and manuscripts.

The solution can help consumers determine if a video

or digital material can be linked to a reliable and

respectable source, which can help in the battle against

Deepfake films and audio. A movie or piece of digital

material that cannot be tracked cannot be trusted. The

smart contract-based approach provides secondary artists

with a safe means for requesting authorization from the

original artist to replicate and alter films.

Another IPFS effort Patil & Chouragade, (2021)

offered a solution, followed by the significant

components: owner, video, and IPFS. The original artist,

also known as the trustworthy owner, creates the input

video. The original artist must create an account on the

Distributed File System (IPFS). Following the completion

of registration, the first video is utilized as input.

IPFS stores the video frames and information, creating a

hash for each video. The hash value is then stored on a

16
blockchain. The technique allows social media users to

track data and assure its accuracy while gaining reliable

information from digital content.

It is another Ethereum blockchain-based ecosystem

for digital video proof of authenticity, according to

Chauhan & Kumar, (n.d.), in which safe and trustworthy

traceability to the original video creator or source may

be generated in a decentralized manner. The system

provides social media users with reliable data provenance

of digital information, allowing them to trace the data

and be sure it is correct. The approach uses Ethereum

smart contracts and the IPFS decentralized storage

technology. The IPFS discovers the files for the Ethereum

wallet, uses IPFS to store video information, and

produces a unique hash of the films. Any digital data,

such as videos and images, may be used in conjunction

with our solution structure, system design, sequence

diagrams, and implementation details. This Smart

Contract-based solution provides secondary artists with a

safe way to request permission from the original artist

to duplicate, change, share, and edit films.

17
Tambe & Pawar, (2020) invented a technique for

proving the ethnicity of digital videos, which allows for

secure and trustworthy tracking to the underived video

producer or origin. Their method uses a Time Stamping

Technique to allow for the unique recording of critical

circumstances without endangering their actual state,

Name operation Ethereum, and a decentralized reputation

network. Their suggested system designs, algorithms,

application, and examination features are general and may

be used for various digital materials, including audio,

movies, photographs, and documents. The unravelment will

aid in detecting fake videos by assisting consumers in

determining if a movie or digital content is traced to a

reliable and reputable root.

Y. Li & Lyu, (n.d.) introduced a new deep learning-

based technique for differentiating AI-generated bogus

movies from real ones. Their method is based on the fact

that the existing Deepfake algorithm can only produce

pictures with restricted resolutions, which must be

distorted further to resemble the original faces in the

source video. They demonstrated that such modifications

result in various artifacts in the Deepfake video and

18
that convolutional neural networks (CNNs) can efficiently

capture them. In contrast to prior techniques, numerous

real and Deepfake-produced photos were used to train a

CNN classifier. Because they employed affine face warping

artifacts as the differentiating characteristic between

genuine and fake photos, their technique does not require

Deepfake-generated images as negative training samples.

Their technique has two advantages: (1) Such artifacts

may be directly reproduced on a negative example image

using simple image processing technologies because it

takes time and money to train a Deepfake model to produce

negative examples. By gathering training data, they save

time and money; (2) because such artifacts are widespread

in Deepfake movies from many sources, their approach is

more resilient than others. Their method's effectiveness

is assessed using two sets of Deepfake video datasets.

Another CNN-based technique for capturing these

semantic shift properties for Deepfake video recognition

is proposed by Ge et al., (2021). Latent Pattern Sensing,

a predictive representative learning technique, is

proposed by et al. In their technique, they utilize a

CNN-based encoder, a ConvGRU-based aggregator, and a

19
single-layer binary classifier. The encoder and

aggregator are self-trained to create the typical

spatiotemporal context characteristics. Finally, the

classifier is trained to distinguish between false and

real videos using context characteristics. Consequently,

the recovered features may coherently define the latent

patterns of films over frames, resulting in an

outstanding Deepfake video detector. Extensive testing

demonstrates the utility of our method, such as

outperforming ten state-of-the-art by at least 7.92%

@AUC.

In the Deepfake video, early efforts X. Li et al.,

(2020) presented a new challenge of partial face assault.

Although only video-level identifiers are supplied, not

all of the faces in the bogus films have been modified.

They solve this issue using multiple learning systems,

which treat faces and input video as instances and bags,

respectively. A sharp MIL (S-MIL) is presented, which

constructs direct mapping from instance embeddings to bag

prediction instead of classic MIL's mapping to instance

prediction and then to bag prediction. According to

theoretical research, the gradient vanishing in normal

20
MIL is eased in S-MIL. The spatial-temporal encoded

instance is intended to appropriately reflect intra-frame

and inter-frame inconsistency, which improves detection

performance even more. They also developed the FFPMS

dataset for partly attacked Deepfake video detection,

which can be used to evaluate different techniques at the

frame and video levels. S-MIL surpasses previous Deepfake

video detection systems for partly attacked videos in

experiments on FFPMS and the widely used DFDC dataset. S-

MIL may also be used to get best-in-class performance on

single-frame datasets in regular Deepfake image

recognition applications.

Meanwhile, Lugstein et al., (2021) concentrated on

PRNU-based detection techniques, which, while popular in

image forensics, have gotten less attention in Deepfake

detection. They employed a PRNU-based technique initially

meant to identify face morphing and retouching. They

conducted the first large-scale test of PRNU-based

Deepfake detection algorithms on several standard

datasets. We demonstrate the impact of commonly

disregarded face extraction step settings on detection

accuracy. They also demonstrate that traditional PRNU-

21
based approaches, while unable to compete with

ultramodern deep learning-based techniques, may be used

to augment them in hybrid detection systems.

The paper of Nagothu et al., (2022) proposes DeFake,

a decentralized ENF consensus-based Deepfake detection

system aimed at increasing the reliability and security

of current online conferencing systems. The PoENF

consensus mechanism is the foundation for the DeFake

system, which is resistant to byzantine nodes and

consumes low computing power. To authenticate and locate

the recordings. Each node depends on the PoENF

algorithm's ground-truth ENF. The experimental results

and evaluation validate the DeFake system's feasibility

in detecting and locating the fabrication site in

Deepfake audio streams using ENF signature

inconsistencies.

Deepfake-generating strategies were introduced and

examined in the study of Mamunur Rashid et al., (2021).

Methods for detecting deepfakes are already in use. The

research also looked at blockchain technology as a

possible solution for the negative impacts of data

manipulation and how blockchain technology might help us

22
limit the impact of harmful Deepfake technology. The

suggested framework can assist users in determining if a

video or digital material can be linked back to a

trustworthy source, which can aid in the battle against

Deepfake videos, images, and audio. They employ a more

excellent mix of revolutionary content-unique hashing

techniques, integrity methods, security measures, and

internationally adopted blockchains to build a

universally secure artificial intelligence society and

ensure that future technology is generated with good

intentions.

Local Study

Deepfake is dangerous, according to Bgen et al.,

(n.d.). They also said that a modified image or other

content might easily lead to misleading. Congress should

consider implementing legislation to address Deepfake

concerns regardless of the anticipated obstacles.

Otherwise, this technology may be used for less noble

purposes. They said that the hazards of misusing and

exploiting Deepfake technology include the capacity to

propagate fake news, influence political beliefs, and

target specific groups such as women, minorities, and

23
vulnerable individuals. Even though technology is

continuously improving, the unpleasant reality is that

the more films and photos we put publicly online, the

simpler it is to Deepfake. It can now be finished with

only one photograph of us. The most recent technology

also demonstrates how a voice-over by another actor is no

longer necessary, as text that allows new words to be

placed on someone's lips may be made.

Local Literature

The topic of Deepfake has never been new in the

Philippines. Deepfake videos are abundant on the

internet; the problem is that Filipino internet users are

unfamiliar with this technique. The viral video of a

young actor in the Philippines, Akwei, (2022), was

addressed. Andrea Brillantes' dancing TikTok video was

utilized in the Tempo App, which could face swapping the

owner's face to one's user's face. It later disturbed

numerous netizens since the problem of face-swapping may

be used as a weapon for disinformation. Specifically, it

could be used to influence Philippine elections.

24
News, (2022) explained the impact of Deepfake and

why it is critical to educate oneself about fake news and

Deepfakes. They also offered safeguards against false

news and Deepfake. One technique is to look at the source

of the piece. The source might be counterfeit if it is

not genuine or trustworthy. Another method is to look at

the headline. If the headline looks to be too good to be

true, it most often is. Finally, enquire to see if anyone

else has heard the same thing. They also stated that

combating disinformation requires the development of

critical thinking abilities.

Synthesis

All integration-related works summarize that

Deepfake is a looming technological threat that needs

prevention. Since Deepfakes continue to rise, researchers

have developed and proposed different blockchain models

to detect fake videos and images. There are several

methods for working with detection, recognition, and

analyzers. Based on the analyzed articles, most related

works used a decentralized blockchain platform such as

the Ethereum blockchain approach since it provides a path

forward for ensuring data integrity from data

25
manipulation. Based on the reviewed materials and the

Ethereum blockchain, Smart Contracts, and Interplanetary

File systems are the most used and effective methods to

apply and help protect data integrity.

Given the review materials, neural networks like

Convolutional Neural Networks and Generative Adversarial

Networks have been viewed as one of the most popular

techniques for identifying Deepfake because they reduce

errors, which lowers the difference between the fake

image and video content and the actual image and video

content.

Based on the review of related works, the presented

models are helpful to our proposed research as they will

help us develop and guide our study. As a result, the

related literature and studies have one fundamental

relationship with current research that is also focused

on developing a Deepfake analyzer using blockchain

technology.

26
CHAPTER 3

Research Methodology

This chapter presents the methodology used to

conduct the research study. This study advocates several

ways in which the use of different research methods can

be truly complementary. It covers the topic such as the

method of the research, subjects respondents of the

study, research locale, sampling procedure, instrument

and techniques used in conducting the study, the process

of data gathering, and data analysis.

The researchers used a descriptive-quantitative

research approach to obtain more specific and reliable

data from the study’s respondents and participants. A

descriptive approach is used because it provides a

sufficient and precise interpretation of more extensive

27
sample data. Overall, the research method chosen will be

a valuable tool for analyzing and describing the survey-

questionnaire data.

Requirement Analysis

28
Figure 2 System Flowchart

In Figure 2, the researchers developed a system

called "Deepfake Analyzer," which will enable it to track

and verify images or videos using a hash to help the

researchers and users analyze the impact of blockchain on

the integrity of images or video content found online.

Population, Sample Size, and Sampling Techniques

The purposive sampling method was used to develop

the research sample under discussion. According to this

method, which belongs to the non-probability sampling

techniques, sample members are of their knowledge,

relationships, and expertise regarding a research subject

(Freedman et al., 2007). In the current study, the

selected sample members had a special relationship with

the phenomenon under investigation, sufficient and

relevant interest, or experience in the field of

Technology. A total of ninety respondents will be

29
purposively selected as participants in a pre-survey. The

objective of the pre-survey is to provide information

about the respondents that can be used later to determine

whether these respondents have changed concerning the

factors measured by the survey. To measure the amount of

change, a post-survey that measures the same elements is

administered to the subject population. Purposive

sampling is a non-probability sample selected based on

the population's characteristics and the study's

objective.

Respondents of the Study

Three generations—Generation Z (born between 1997

and 2012), Millennials (born between 1981 and 1996), and

Generation X—will be chosen as respondents for this study

(born from 1965 to 1980). For the pretesting stage of the

survey research, the researcher will select thirty

respondents from Generation Z, thirty from Generation X,

and thirty from Millennials. The goal of the pretest is

to evaluate the reliability and validity of the survey

instruments before the final distribution. For the post-

survey of the research, the researcher will select ten

30
experts in the field of Technology and research

development.

Table 1

Respondents of the study in pre-survey in terms of their

Type

Type of respondents Sample

Generation X 30

Generation Z 30

Millennial 30

Total 90

Table 1 shows the selected respondents were chosen

based on their efficiency to the researchers because it

aided them more in the testing phase of the developed

system and the surveys.

31
Table 2

Distribution of type of respondents in pre-survey in

terms of their sex

Generation Millennial Row Total


Generation Y
X

f % f % f % f %

Male 6 20.0 13 43.3 9 30.0 28 31.1

Female 24 80.0 17 56.7 21 70.0 62 68.9

Colum Total 30 100. 100.0 100. 100


30 30 90
0 0

where: f – frequency, %- percentage

Table 2 shows the profile of respondents in terms of

their sex. It reveals that 31.1% are male and 68.9% are

female. Thus, the majority of the respondents in the pre-

survey are female.

32
Table 3

Assessment of Generation X, Generation Z, and Millennial

in the pre-survey questions

Generation Generation Millennial Overall


Pre-survey
X Y
Questions
WM VD WM VD WM VD WM VD

1. Do you agree 4.80 SA 4.53 SA 4.80 SA 4.71 SA

that it is

important to

fight against

false

information and

to take an

action about

“Deepfake”?

33
2. Do you agree 4.73 SA 4.43 A 4.63 SA 4.60 SA

that “Deepfake”

is a

significant

threat to

society

affecting

people’s

perception and

misleading

them?

3. Do you agree 4.90 SA 4.63 SA 4.57 SA 4.70 SA

that “Deepfake”

can be used to

spread fake

news and lead

to an increase

in fake

scandals?

4. Do you agree 4.70 SA 4.33 A 4.43 A 4.49 A

that “Deepfake”

technology have

the potential

to sway public

opinion?

34
5. Do you agree 4.87 SA 4.60 SA 4.50 SA 4.66 SA

that “Deepfake”

may cause more

severe problems

such as

violation of

the human

rights, right

of privacy,

personal data

protection

right, etc.

6. Do you agree 4.73 SA 4.33 A 4.30 A 4.46 A

that “Deepfake”

can potentially

distort

democratic

discourse such

as manipulate

elections and

political

views?

7. Do you agree 4.90 SA 4.50 SA 4.53 SA 4.64 SA

that “Deepfake”

35
can be misused

to commit

fraud,

extortion,

bullying as

well as to

falsify

evidence?

8. Do you agree 4.77 SA 4.47 A 4.50 SA 4.58 SA

that social

media platforms

like Facebook,

Google, or

YouTube plays

an important

role in

alerting the

public about

faked images or

videos?

9. Do you believe 4.77 SA 4.60 SA 4.70 SA 4.69 SA

that it is

important to

teach society

36
knowledge about

“Hoaxes and

Fake Content”

to help them

learn more

about

misinformation,

and

disinformation,

online?

10. Do you agree 4.60 SA 4.40 A 4.57 SA 4.52 SA

that it is

important to

build a system

utilizing

“Blockchain”

Technology to

combat

“Deepfake”?

Overall Mean 4.78 SA 4.48 A 4.55 SA 4.60 SA

*WM-Weighted Mean; VD-Verbal Description

Legend

4.50-5.00 SA Strongly Agee

3.50-4.49 A Agree

2.50-3.49 MA Minimally Agree

1.50-2.49 D Disagree

37
1.00-1.49 SDA Strongly Disagree

Table 3 presents the assessment of Generation X,

Generation Z, and Millennials in the pre-survey

questions, and they strongly agree on the following

questions: “Do you agree that it is important to fight

against false information and to take an action about

Deepfake?” (WM = 4.71), “Do you agree that Deepfake

can be used to spread fake news and lead to an

increase in fake scandals?” (WM=4.70), “Do you believe

that it is important to teach society knowledge about

Hoaxes and Fake Content to help them learn more about

misinformation, and disinformation, online?”

(WM=4.69), “Do you agree that “Deepfake” can be

misused to commit fraud, extortion, bullying as well

as to falsify evidence?” (WM=4.64), and “Do you agree

that Deepfake is a significant threat to society

affecting people’s perception and misleading them?”

(WM=4.60) Furthermore, they also strongly agree in “Do

you agree that social media platforms like Facebook,

Google, or YouTube plays an important role in alerting

the public about faked Images or videos?” and “Do you

38
agree that it is important to build a system utilizing

“Blockchain” Technology to combat “Deepfake”?”

(WM=4.52). Likewise, the three types of respondents

agree in “Do you agree that it is important to build a

system utilizing “Blockchain” Technology to combat

“Deepfake”? (WM = 4.60), “Do you agree that “Deepfake”

technology has the potential to sway public opinion?”

(WM=4.49), and “Do you agree that “Deepfake” can

potentially distort democratic discourse such as

manipulate elections and political views?” (WM =

4.46).

Overall, the three types of respondents strongly

agree with this set of questions. This pre-survey

implies that there is indeed a problem on Deepfake

that needs to take care of and resolved.

Data Gathering Instruments and Techniques

For this project study, data were be gathered. The

need for constructing the suggested system was recognized

after extensive analysis and data collection. Data

gathering is essential since it shows how to apply the

proposed method properly, accurately, and effectively.

39
The researchers used Survey Questionnaire,

Observation, and Existing Data as data-gathering

instruments.

 Questionnaire- The questionnaire is one of the

instruments used to process and collect data from

respondents, and it consists of a series of

questions. The survey is critical to the current

research since it will collect information essential

to designing the appliance. By using it, researchers

will be able to acquire much knowledge in a much

shorter period. Furthermore, using the survey for

data collection, there is less chance of bias and

impartiality in the data collected.

In this study, researchers used Google Form to

distribute the survey surveys. Google Forms allowed

the researchers to collect data in a variety of ways.

A form can be inserted in the body of an email that

will enable respondents to submit comments directly

from their Inbox. A link can be created that allows

40
responders to respond to the questions using a web-

based form.

 Existing Data- The secondary quantitative research

approach employs secondary data or data that has

already been collected. Existing Data is summarized

and collated to improve the overall effectiveness of

the study. Conducting research studies on existing

systems and applications to identify the processes and

features that will be improved as the new application

is developed.

Data Gathering Procedure

To conduct the study, a letter of request to

disseminate questionnaires was presented to the research

adviser and statistician. Upon approval, questionnaires

were personally distributed by the researchers to the

selected respondents, namely Generation Z (born from 1997

to 2012), Millennials (born from 1981 to 1996), and

Generation X (taken from 1965 to 1980).

The researchers also presented a letter of request

to the respondents to voluntarily choose to participate

or not and answer the survey questionnaire. The

41
researchers oriented the respondents who would answer the

survey. Informants can choose their preferred response in

the study. Moreover, to assure respondents' cooperation

in this survey, the researchers guaranteed that the

information gathered would be treated confidentially. It

will be noted if responders refuse to give part of the

highly secret personal information. The data was

collected right after the selected respondent answered

the questionnaire. Afterward, the researcher will collect

the questionnaires form from the respondent and start

interpreting the data.

Preparation of Instrument

Survey-questionnaire was used to collect the data

for this study. This instrument was chosen because it

allows researchers to efficiently get all completed

replies from respondents. Respondents provide data, which

researchers use to evaluate current processes and make

recommendations about enhancing the research process.

This is more effective and can potentially reach a

considerable number of individuals simultaneously. In

addition, to answer concerns regarding the usage of the

current system, the researchers carried out the survey

42
utilizing the system’s standards and criteria of ISO /IEC

25010:2011, including functionality, reliability,

usability, efficiency, maintainability, and portability.

The questionnaire was designed by the researchers

called "Deepfake Technology: Impact of Blockchain

Technology to Protect Video and Image Integrity from

Identity Theft Using Deepfake Analyzer "in this study.

The instrument's content was based on the information

gathered during the literature review to know the impact

of blockchain technology on protecting video and image

integrity from identity theft using the Deepfake

analyzer.

The questionnaire was divided into two (2) sections

and three (3) sets of questions:

I. Section 1: Data Privacy Consent

1. Section 2: Set of Questions

a) Set 1: Respondents Profile

b) Set 2: Likert Scale

Statistical Treatment of Data

43
The following statistical tools were used to

interpret the results according to sub-problems. In the

study, the following statistical methods were used:

1. Frequency- The respondent’s response to a particular

item/question in the questionnaire, where he or she

checks their option.

2. Weighted Mean / Likert Scale- Right after the data

collected from the field were analyzed.

Statistically, the weighted mean was used in

answering the research questions. The response

options in the instrument are weighted as shown

below:

Table 4. Likert’s Scale to evaluate the result and its

Descriptive Interpretation

INTERVAL RATING INTERPRETATION

4.20-5.00 5 Strongly Agree

(SA)

3.40-4.19 4 Agree (A)

2.60-3.39 3 Minimal Agree

(MA)

1.8-2.59 2 Disagree (D)

44
1.00-1.79 1 Strongly Disagree

(SD)

Table 4 shows the descriptive interpretation of

evaluation on the Likert Scale. The Likert scale was

interpreted as “5” strongly agree, “4” as agree, “3”

minimally agree, “2” as disagree, and “1” as strongly

disagree.

3. Ranking- This was used to reinforce the percentage

to show the proportional importance of an idea

considered.

4. Percentage- Used to describe descriptive statistics

or parts of a whole.

f
%f = ×100
n

Where:

%ƒ – relative frequency

ƒ- frequency

n - number of observations or sample size.

5. Weighted Mean- It was used to represent the

respondents’ midpoint answer of the qualitative

45
response. This was a criterion for determining the

status.

The weighted mean was used as follows:

∑ wx
wx=
∑w

Where:

wx - weighted mean

x - any particular value

n - number of observation or sample

Σ - summation symbol means to “sum up”

6. Independent Sample Testing- An independent sample

test is a statistical test that determines if two

groups differ significantly in terms of a variable

of interest. The researchers want to investigate the

gap between user ratings and expert ratings for each

system function.

x 1−x 2
t=


2 2
s 1 s2
+
n1 n2

Where:

46
t - t value

x 1−mean of the first group

x 2−mean of the second group

2
s1−variance of the first group

2
s2−variance of the first group squared

n1 −sample ¿the first group

n2 −sample ¿the second group

Analytical Tool

Analytical tools are representations of a structure

in graphical or visual form. These tools are essential

for the researchers because they act as communication and

planning tools, identify roles, provide an overview of

the proposed system, promote logical procedures,

demonstrate relationships, aid in troubleshooting, and

document the system for future use. The researchers used

analytical techniques to give readers a rapid overview of

the suggested system design. The various graphical models

depict the system’s boundaries and the information used

in the proposed system. These tools gave the researchers

47
a better understanding of the existing and developed

system.

The following diagrams adequately described and give

an insight into the study project that the researchers

proposed; the first is the system flowchart, which shows

the flow of the data in the system and how decisions are

made to control events. The second is the context

diagram, which presents the external entities with whom

the system interacts. Next is the data flow diagram,

which presents the accurate flow of data through a

process or a system. Then the use case diagram, this

graphical illustration, shows the possible interaction

between the end-user and the system. The entity-

relationship diagram describes the interrelated things of

interest in a specific knowledge domain.

Software Model

48
Figure 3 The Scrum Model

Figure 3 illustrates the type of method used in "The

Impact of Blockchain Technology to Protect Video and

Image Integrity from Identity Theft using Deepfake

Analyzer" is the Scrum method. The process involves

iterative practices that lean towards a defined goal or

objective. In planning the developed system, three

leading roles were involved in the development process:

the project manager, the scrum master, and the scrum

team. The project manager is the member responsible for

giving inputs to ensure all expected outcomes will be in

the final output. In terms of scrum master, this member

facilitates the scrum team and is responsible for

49
overseeing that the scrum process and practices are

followed to ensure the project is moving forward.

Regarding a scrum team, the researchers worked

towards the main tasks in the scrum, which consisted of

development, analysis, and testing. The scrum methodology

integrated a framework that facilitated team

collaboration through its 5 phases product backlog

creation, sprint planning and sprint backlog creation,

the sprint and daily scrum meetings, the sprint review,

and the sprint retrospective. Regarding product backlog,

the researchers brainstormed what features and

requirements would be implemented during the development

process. In terms of sprint planning and sprint backlog,

the researchers determined the sprint's duration and the

goal or tasks that were assigned for each sprint that the

scrum team is capable of finishing on time.

Regarding sprint and daily scrum meetings, the

researchers started the development process according to

the project's specifics and conducted daily scrum

meetings that provide the current project status,

ensuring that all team members are on track. Regarding

the sprint review, the researchers analyzed the

50
development progress and overall results for planning the

next sprint and further project changes. The results were

discussed in terms of sprint retrospectives to find ways

to improve the scrum team's development process for

future sprint iterations.

System Requirements

The researchers utilized a set of system

requirements to be able to accomplish the study project.

This requirement aims to provide a better-quality system

that will be presented to the target respondents and the

academe.

The system requirements that the researchers provide

were a set of minimum specifications that the researchers

used in the process of developing the system project. In

line with this, the researchers sought to provide.

Hardware

The researchers will utilize this set of hardware

devices to create, build, and assess the system's

quality.

51
OS: Windows 11 Pro

Version 21H2

OS build 22000.739

Experience Windows Feature Experience Pack

1000.22000.739.0

CPU: Processor AMD Ryzen 3 2200G with Radeon Vega

Graphics 3.50 GHz

GPU: Nvidia 1660 Ti (6GB)

Ram: Installed RAM 16.0 GB (2 x 8 2666 mhz)

System type: 64-bit operating system, x64-based processor

Disk Storage: 4 GB of free disk space

Monitor Resolution: 1920x1080

Software

The researchers used a specific Integrated

Development Environment (IDE) to develop the research

system. The different libraries were also utilized to

develop and enhance the accuracy of the research system.

IDE: Anaconda Integrated Development Environment version

2.2.0 Anaconda IDE has simplified package management

52
consisting of different Python and R Programming

languages for scientific computing.

Jupyter Notebook was utilized in developing the system

project; it is an open-source web application that the

end-users can use to create and share documents

containing live codes, equations, visualization, and

text.

Python 3.5 -

Python is a high-level, interpreted, general-purpose

programming language. Its design philosophy emphasizes

code readability with the use of significant indentation.

Numpy 1.14.2 - NumPy is the fundamental package needed

for scientific computing with Python.

Keras 2.1.5 - Deep Learning for Python

imageio 2.19.3 - A Python library for reading and writing

image data.

ffmpeg 5.0.1 - Cross-platform solution to record, convert

and stream audio and video.

face_recognition 1.3.0 - Recognize faces from Python or

from the command line.

53
tensorflow 2.8.1 - TensorFlow is an end-to-end open-

source platform for machine learning

Peopleware

The following experts provided a better

understanding of the topic of this study and gave an

insight into the process of creating the system. Firstly,

there is the data scientist, whose specialty is

analyzing, processing, and modeling data before

interpreting the findings to provide practical business

and other organizational strategies. Second are the

digital forensics specialists with backgrounds in

criminal justice and cybersecurity. Next are the experts

in machine learning who specialize in creating

algorithms. After that, the cybercrime division

implements cybercrime prevention and suppression laws,

performs vulnerability assessments, and aids various law

enforcement agencies with technical investigative

support. Next are Computer Science and Information

Technology professors, whose expertise is in teaching a

wide range of technical knowledge. Finally, the system's

eventual users will take advantage of the research team's

creation.

54
Network

Figure 4 The Network

Data Warehouse

The researchers used a database for the pre-trained

Deepfake datasets for image and video cross-validation. A

blockchain database also stores the hash of the processed

images and video.

CHAPTER 4

Presentation, Analysis, and Interpretation of Data

55
This chapter describes the analysis of data followed

by a discussion of the research findings. The findings

relate to the research questions that guided the study.

Data were analyzed to identify, describe, and explore the

Impact of blockchain technology to protect video and

image integrity from identity theft using a deepfake

analyzer. Data were obtained from self-administered

questionnaires validated by professionals such as

researchers Statisticians and Thesis Advisers. The

researchers used two research participants; (1) research

beneficiaries and (2) experts related to the study. This

study was evaluated in terms of International

Standardization Organization (ISO/ IEC) 25010:2011 and

functional sustainability, performance efficiency,

compatibility, usability, reliability, security based on

confidentiality, integrity, and non-repudiation, and

maintainability based on modifiability and testability.

Table 5
Assessment of respondents in Functional Suitability

Indicators Expert User Composite


Mean
WM VI WM VI WM VI

56
The system covers all the 4.40 A 4.37 A 4.37 A
specified tasks and user
objectives.
(Functional Completeness)

The system provides the 4.40 A 4.26 A 4.27 A


correct results with the
needed degree of
precision.
(Functional Correctness)

The system facilitates the 4.70 SA 4.11 A 4.17 A


accomplishment of
specified tasks and
objectives.
(Functional
Appropriateness)

Overall Weighted Mean 4.49 A 4.24 A 4.27 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean
Point Range Verbal Symbol
Interpretation
5 4.50- Strongly Agree SA
5.0
4 3.50- Agree A
4.49
3 2.50- Minimally Agree MA
3.49
2 1.50- Disagree D
2.49
1 1.00- Strongly SDA
1.49 Disagree

Table 5 demonstrates the assessment of respondents

in Functional Suitability. It was shown that the

respondents agreed that the system covers all the

specified tasks and user objectives Functional

Completeness (WM=4.37). Furthermore, the respondents

agreed that the system provides the correct results with

the needed degree of precision Functional Correctness

(WM=4.27). On the other hand, the respondents agreed that

57
the system facilitates the accomplishment of specified

tasks and objectives of Functional Appropriateness

(WM=4.17).

Overall, the respondents strongly agreed with the

Functional Suitability of the developed Impact of

blockchain technology to protect video and image

integrity from identity theft using a deep fake analyzer

system (OWM=4.27).

Table 6
Assessment of respondents in Performance Efficiency

Indicators Expert User Composite


Mean
WM VI WM VI WM VI
The system’s response and 4.80 SA 4.20 A 4.26 A
processing times and
throughput rates when
performing its functons,
meet requirements.
(Time Behavior)

The system’s amounts and 4.70 SA 4.04 A 4.11 A


types of resources used
when performing its
functions, meet
requirements.
(Resource Utilization)

The system’s maximum 4.50 SA 4.10 A 4.14 A


limits of parameter meet
requirements.
(Capacity)

Overall Weighted Mean 4.67 SA 4.11 A 4.17 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean
Table 6 demonstrates the assessment of respondents

in Performance Efficiency. It was shown that the

58
respondents agreed that the system response and

processing times and throughput rates when performing its

functions meet the requirements Time behavior (WM=4.26).

Furthermore, the respondents agreed that the system

amounts and types of resources used when performing its

functions meet the requirements Resource Utilization

(WM=4.11). On the other hand, the respondents agreed that

the system’s maximum limits of parameters meet the

requirements Capacity (WM=4.14).

Overall, the respondents strongly agreed with the

performance efficiency of the developed Impact of

blockchain technology to protect video and image

integrity from identity theft using a deep fake analyzer

system (OWM=4.17).

Table 7
Assessment of respondents in Compatibility

59
Indicators Expert User Composite
Mean
WM VI WM VI WM VI
The system can perform its 4.50 SA 4.24 A 4.27 A
required functions
efficiently while sharing
a common environment and
resources with other
products, without
detrimental impact on any
other product.
(Co-existence)

The system can exchange 4.40 SA 4.14 A 4.17 A


information and use the
information that has been
exchanged.
(Interoperability)

Overall Weighted Mean 4.45 SA 4.19 A 4.22 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 7 demonstrates the assessment of respondents

in Compatibility. It was shown that the respondents

agreed that the system can perform its required functions

efficiently while sharing a common environment and

resources with other products, without detrimental impact

on any other product Co-existence (WM=4.27). Furthermore,

the respondents agreed that the system can exchange

information and use the information that has been

exchanged Interoperability (WM=4.17).

Overall, the respondents strongly agreed with the

compatibility of the developed Impact of blockchain

technology to protect video and image integrity from

60
identity theft using a deep fake analyzer system

(OWM=4.22).

Table 8
Assessment of respondents in Usability

Indicators Expert User Composite


Mean
WM VI WM VI WM VI
The system allows users to 4.60 SA 4.02 A 4.08 A
recognize if it is
appropriate for their
needs.
(Appropriateness
Recognizability)

The system can be used by 4.50 SA 4.04 A 4.09 A


specified users to achieve
specified goals of
learning to use the
application with
effectiveness, efficiency,
freedom from risk and
satisfaction in a
specified context of use.
(Learnability)

The system has attributes 4.60 SA 4.12 A 4.17 A


that make it easy to
operate and control.
(Operability)

The system protects users 4.40 A 4.08 A 4.11 A


against making errors.
(User Error Protection)

The system’s user 4.30 A 4.17 A 4.18 A


interface enables pleasing
and satisfying interaction
for the user.
(User Interaction
Aesthetics)
The system can be used by 4.70 SA 4.14 A 4.20 A
people with the widest
range of characteristics
and capabilities to
achieve a specified goal
in a specified context of
use.

61
(Accessibility)

Overall Weighted Mean 4.52 SA 4.10 A 4.14 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 8 demonstrates the assessment of respondents

in Usability. It was shown that the respondents agreed

that the system allows users to recognize if it is

appropriate for their needs Appropriateness

Recognizability (WM=4.08). Furthermore, the respondents

agreed that the system can be used by specified users to

achieve specified goals of learning to use the

application with effectiveness, efficiency, freedom from

risk and satisfaction in a specified context of use

Learnability (WM=4.09). In addition, the respondents

agreed that the system has attributes that make it easy

to operate and control Operability (WM=4.17). On the

other hand, the respondents agreed that the system

protects users against making errors User Error

Protection (WM=4.11). Moreover, the respondents agreed

that the system user interface enables pleasing and

satisfying interaction for the user, User Interaction

Aesthetics (WM=4.18). Along with this, the respondents

agreed that the system can be used by people with the

62
widest range of characteristics and capabilities to

achieve a specified goal in a specified context of use

Accessibility (WM=4.20).

Overall, the respondents strongly agreed with the

usability of the developed Impact of blockchain

technology to protect video and image integrity from

identity theft using a deep fake analyzer system

(OWM=4.14).

Table 9
Assessment of respondents in Reliability

Indicators Expert User Composite


Mean
WM VI WM VI WM VI
The system meets the needs 4.50 SA 4.19 A 4.22 A
for reliability under
normal operation.
(Maturity)

The system is operational 4.50 SA 4.11 A 4.15 A


and accessible when
required for use.
(Availability)

The system can recover the 4.50 SA 4.07 A 4.11 A


data directly affected and
re-establish the desired
state.
(Recoverability)

Overall Weighted Mean 4.50 SA 4.12 A 4.16 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 9 demonstrates the assessment of respondents in

Reliability. It was shown that the respondents agreed

that the system meets the needs for reliability under

63
normal operation Maturity (WM=4.22) Furthermore, the

respondents agreed that the system is operational and

accessible when required for use Availability (WM=4.15).

In addition, the respondents agreed that the system is

can recover the data directly affected and re-establish

the desired state Recoverability (WM=4.11).

Overall, the respondents strongly agreed with the

reliability of the developed Impact of blockchain

technology to protect video and image integrity from

identity theft using a deep fake analyzer system

(OWM=4.16).

Table 10
Assessment of respondents in Security

Indicators Expert User Composite


Mean
WM VI WM VI WM VI
The system ensures that 4.50 SA 4.18 A 4.21 A
data are accessible only
to those authorized to
have access.
(Confidentiality)

The system prevents 4.50 SA 4.14 A 4.18 A


unauthorized access to,
or modification of,
computer programs or
data.
(Integrity)

The system can be proven 4.30 A 4.19 A 4.20 A


to have taken place, so
that the events or
actions cannot be
repudiated later.
(Non-repudiation)

64
Overall Weighted Mean 4.43 A 4.17 A 4.20 A
Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 10 demonstrates the assessment of respondents

in Security. It was shown that the respondents agreed

that the system ensures that data are accessible only to

those authorized to have access Confidentiality (WM=

4.21). Furthermore, the respondents agreed that the

system prevents unauthorized access to, or modification

of, computer programs or data Integrity (WM= 4.18). On

the other hand, the respondents agreed that the system

can be proven to have taken place, so that the events or

actions cannot be repudiated later Non-repudiation

(WM=4.20).

Overall, the respondents strongly agreed with the

security of the developed Impact of blockchain technology

to protect video and image integrity from identity theft

using a deep fake analyzer system (OWM=4.20).

Table 11
Assessment of respondents in Maintainability

65
Indicators Expert User Composite
Mean
WM VI WM VI WM VI
Reducing inter-service 4.50 SA 4.19 A 4.22 A
dependencies enhances the
system's modifiability.
(Modifiability)

The system can be tested 4.50 SA 4.22 A 4.25 A


using a functional
testing instrument.
(Testability)

Overall Weighted Mean 4.50 SA 4.21 A 4.24 A


Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 11 demonstrates the assessment of respondents

in Maintainability. It was shown that the respondents

agreed that the system reduced inter-service dependencies

enhances the system's modifiability (WM=4.22).

Furthermore, the respondents agreed that the system can

be tested using a functional testing instrument

Testability (WM=4.25).

Overall, the respondents strongly agreed with the

maintainability of the developed Impact of blockchain

technology to protect video and image integrity from

identity theft using a deep fake analyzer system

(OWM=4.24).

Table 12
Summary of assessment of respondents in enumerated system
features

66
Weighted Verbal Rank
Indicators Mean Interpretation
Functional Suitability 4.27 Agree 1
Performance Efficiency 4.17 Agree 5
Compatibility 4.22 Agree 3
Usability 4.14 Agree 7
Reliability 4.16 Agree 6
Security 4.20 Agree 4
Maintainability 4.24 Agree 2
Note: WM - Weighted Mean, VI – Verbal Interpretation,
OWM – Overall Weighted Mean

Table 12 summarizes the assessment of respondents in

different System Features. It was exposed that the

assessment in functional suitability got the highest

weighted mean of 4.68 and was interpreted as agree. This

because the respondents determines that the systems

provide all the functions that meet all the stated or

implicit needs when used under specific conditions. On

the contrary, the assessment in usability got the lowest

weighted mean of 4.47 and interpreted as agree. Given the

fact that the system is user- friendly, some of the

respondents might not learn it easily. Due to this the

research come up with the idea of focusing on improving

the user usability in a way of, making the system ease-

of- use during the design process and user experience.

Table 13

67
Post-analysis of the Differences between the assessment
of IT Experts and Customers in the Enumerated Features of
the Impact of blockchain technology to protect video and
image integrity from identity theft using deep fake
analyzer.

Indicators t-value p-value Decision Interpretation


Functional 1.826 0.071 Fail to No
Suitability Reject Ho Significance
Performance 3.096 0.003 Reject Ho Significant
Efficiency
Compatibility 1.384 0.170 Fail to No
Reject Ho Significance
Usability 2.608 0.011 Reject Ho Significant
Reliability 2.157 0.033 Reject Ho Significant
Security 1.402 0.164 Fail to No
Reject Ho Significance
Maintainability 1.700 0.192 Fail to No
Reject Ho Significance
t-ratio α = 0.05; df = 98; Critical value = 1.984
If Computed t-value > Critical value, then reject Ho.

Table 13 displays the post-analysis of the

differences in the assessment of Experts and Users in the

enumerated features of the Impact of blockchain

technology to protect video and image integrity from

identity theft using a deep fake analyzer. It was

revealed that the associated computed t-values for

functional suitability (t=1.826), compatibility

(t=1.384), security (t=1.402), and portability (t=1.700)

are all less than 1.984 critical value (df=98, α = 0.05)

of This implies that there is not enough evidence to

reject the null hypothesis and conclude that there is no

significant difference between the assessment of experts

68
and users in the abovementioned enumerated features. The

perception of both respondents in the enumerated features

is excellent and it was tested that there is no

difference between them. Therefore, both respondents

accepted the Impact of blockchain technology to protect

video and image integrity from identity theft using a

deepfake analyzer in their view.

Conversely, the associated t-values for performance

efficiency (t=3.096), usability (t=2.608), and

reliability (t=2.157) are all greater than 1.984 critical

value (df=98, α = 0.05). This yields the rejection of the

null hypothesis and concludes that there is a significant

difference between the assessment of experts and users.

Looking back at the comparison of the assessments, the

experts’ assessment is greater than the users’

assessment. This means that the system is appreciated by

experts from a technical view but not much by the user.

The expert appreciates the performance efficiency of the

system compared to the user since the experts are most

knowledgeable by means of time behavior, resource

utilization, and capacity of the system. In addition, the

expert appreciates the usability of the system since the

69
experts learn features more quickly and retain their

knowledge longer, which directly correlates to decreased

training costs and time. Lastly, the expert appreciates

the reliability of the system compared to the user since

the system meets their expectation by means of it can

operate in a defined environment without failure.

70
CHAPTER 5

Summary, Conclusion, and Recommendations

This chapter presents the summary of the research

work undertaken, the conclusions drawn, and the

recommendations made as an outgrowth of this study. The

findings presented in this report were based on the

investigation performed using specific materials. Some

limitations have been identified.

Summary of Findings

The salient findings of this study to the specific

question are as follows:

Problem 1. What is the Impact of Blockchain Technology to

Protect the Integrity of the Video and Image to prevent

Identity Theft using Deepfake Analyzer?

With emerging technology initially alarming since

image manipulation, and face-swapping create a

massive threat to violation of privacy and identity,

researchers were driven to develop a system that

will identify the impact of blockchain technology to

protect video and image integrity from identity

71
theft using a deepfake analyzer. Table 3 displays

the data acquired in the pre-survey of the study

determining the Impact of blockchain technology to

protect video and image integrity from identity

theft using a deepfake analyzer. The series of

questions is strongly supported by all three groups

of responders. The pre-survey suggests that there is

a problem on Deepfake that must be addressed and

fixed.

Problem 2. How do the respondents evaluate “Deepfake

analyzer using Blockchain technology” in terms of the

following:

a. Functional Suitability

b. Performance Efficiency

c. Compatibility

d. Usability

e. Reliability

f. Security; and

g. Maintainability

According to the research findings, the system

"agreed" with both users’ and expert respondents'

assessments in terms of Functional Suitability,

72
Performance Efficiency, Compatibility, Usability,

Reliability, Security, Maintainability, implying that the

system solved the problems and integrated all of the

features required for the system to function. In

addition, table 8 displays that among the eight features

of the system, the functional appropriateness evaluation

had the highest weighted mean of 4.68 and was interpreted

as agree by the respondents. On the contrary, the

usability evaluation had the lowest weighted mean of 4.47

and was read as agree by the respondents.

Conclusion

Nowadays, we hear about current AI developments,

particularly deepfakes, and see terrifying news about the

use of deepfake technology against famous personalities

and politicians. We all know that invasion of privacy can

harm people and this behavior is not acceptable. Based on

the indicated findings the researchers concluded the

following statement of the problems.

1. What is the Impact of Blockchain Technology to

Protect the Integrity of the Video and Image to

prevent Identity Theft using Deepfake Analyzer?

73
Based on the findings, the result shows that the

problem that drove the researcher in creating “deepfake

analyzer to protect the integrity of the video and image

to prevent identity theft” are “Do you agree that

Deepfake can be used to spread fake news and lead to an

increase in fake scandals”, “Do you agree that deepfake

can be misused to commit fraud, extortion, bullying as

well as to falsify evidence” and “it is important to

fight against false information and to take an action

about Deepfake”. These are the factors or the problems

that should be solved by the developed system.

2. How do the respondents evaluate “Deepfake analyzer

using Blockchain technology” in terms of the

following:

- Functional Suitability

- Performance Efficiency

- Compatibility

- Usability

- Reliability

- Security

- Maintainability

74
Based on the findings of the research, it showed that the

system was assessed as “agree” by the respondents both

users and experts in terms of Functional Suitability,

Performance Efficiency, Compatibility, Usability,

Reliability, Security, Maintainability, and can be

interpreted that the system successfully solved the

problems and integrated all of the feature needed for the

system to be functional.

Recommendation

Here are a few recommendations to further improve

and maximize the system's capabilities. The following

list should be regarded with caution, as no comprehensive

research has been conducted to determine whether or not

they are viable in this circumstance.

1. The study shows that the system can protect the

integrity of the Video and Image to prevent

Identity Theft using Deepfake Analyzer. The

researchers recommend adding audio detection to

be studied another feature for deepfake

detection.

75
2. Future researchers can focus on improving the

system user’s usability as this feature receive

the lowest evaluation by means of appropriateness

recognizability, learnability, operability, user

error protection, user interaction aesthetic, and

accessibility.

3. Future studies can broaden the system's use and

increase the size of the sampled data for the

system.

76
REFERENCES:

Akwei, A. (2022). o g n a M o g n a M o g n a M o g n a
M. https://44bars.com/andrea-brillantes-viral-
deepfake-video-is-the-new-internet-obsession/

Bgen, C., Crame, R. T., & City, Q. (n.d.). PHILIPPINE


NATIONAL POLICE ANTI-CYBERCRIME GROUP.
https://www.mondaq.com/canada/copyright/687716/what-
can-the-law-do-

Chauhan, A., & Kumar, A. (n.d.). Establishing Environment


Setup for Preventing Deepfakes using Blockchain
Technology.

Cheikosman, E., Analyst, P., Impact, C., Forum, W. E.,


Hewett, N., Lead, P., Technology, D. L., Forum, W.
E., Gabriel, K., Services, H. D., & Electronica, A.
(2021). Blockchain can help combat the threat of
deepfakes. Here’s how.

Ge, S., Lin, F., Li, C., Zhang, D., Tan, J., Wang, W., &
Zeng, D. (2021, December 1). Latent Pattern Sensing:
Deepfake Video Detection via Predictive
Representation Learning. ACM International Conference
Proceeding Series.
https://doi.org/10.1145/3469877.3490586

77
Hasan, H. R., & Salah, K. (2019). Combating Deepfake
Videos Using Blockchain and Smart Contracts. IEEE
Access, 7, 41596–41606.
https://doi.org/10.1109/ACCESS.2019.2905689

Li, X., Lang, Y., Chen, Y., Mao, X., He, Y., Wang, S.,
Xue, H., & Lu, Q. (2020). Sharp Multiple Instance
Learning for DeepFake Video Detection. MM 2020 -
Proceedings of the 28th ACM International Conference
on Multimedia, 1864–1872.
https://doi.org/10.1145/3394171.3414034

Li, Y., & Lyu, S. (n.d.). Exposing DeepFake Videos By


Detecting Face Warping Artifacts.

Lugstein, F., Baier, S., Bachinger, G., & Uhl, A. (2021).


PRNU-based Deepfake Detection. IH and MMSec 2021 -
Proceedings of the 2021 ACM Workshop on Information
Hiding and Multimedia Security, 7–12.
https://doi.org/10.1145/3437880.3460400

Mamunur Rashid, M., Lee, S.-H., & Kwon, K.-R. (2021).


Blockchain Technology for Combating Deepfake and
Protect Video/Image Integrity. Journal of Korea
Multimedia Society, 24(8), 1044–1058.
https://doi.org/10.9717/kmms.2021.24.8.1044

Nagothu, D., Xu, R., Chen, Y., Blasch, E., & Aved, A.
(2022). DeFake: Decentralized ENF-Consensus Based
DeepFake Detection in Video Conferencing. 1–6.
https://doi.org/10.1109/mmsp53017.2021.9733503

News, S. (2022). What are Deepfakes and Fake News? Listen

78
to this Story What are deepfakes?
https://sulit.ph/what-are-deepfakes-and-fake-news/?
fbclid=IwAR1oxogpwdZ4_tXCBX-PQdcrI-
Nkoqg5ru_NmkOfE0hbbYJ-VpCgy-2nfYE

Patil, U., & Chouragade, P. M. (2021a). Deepfake Video


Authentication Based on Blockchain. Proceedings of
the 2nd International Conference on Electronics and
Sustainable Communication Systems, ICESC 2021, 1110–
1113. https://doi.org/10.1109/ICESC51422.2021.9532725

Patil, U., & Chouragade, P. P. M. (2021b). Blockchain


Based Approach for tackling Deepfake videos.
International Journal of Scientific Research in
Computer Science, Engineering and Information
Technology, 342–347.
https://doi.org/10.32628/cseit217372

Tambe, S. N., & Pawar, A. B. (2020). Detecting fake


Videos using Block Chain and Smart Contracts.
International Journal of Recent Technology and
Engineering, 8(4S5), 209–213.
https://doi.org/10.35940/ijrte.d1049.1284s519

79
APPENDIX A

Plagiarism Test Result

80
APPENDIX B

Communication Letters

81
APPENDIX C

Sample Collected Forms and Reports Pre-Survey

82
Figure. 12 Age of the Respondents

Figure. 13 Question No. 1

Figure. 14 Question No. 2

Figure. 15 Question No. 3

Figure. 16 Question No. 4

83
Figure. 17 Question No. 5

84
Figure. 18 Question No. 6

Figure. 19 Question No. 7

85
Figure. 20 Question No. 8

Figure. 21 Question No. 9

86
Figure. 22 Question No. 10

87
APPENDIX D

Sample Collected Forms and Reports Post-Survey

Figure. 23 Age of Respondents

Figure. 24 Birth Year of Respondents

88
Figure. 25 Functional Suitability in terms of Functional

Completeness

Figure. 26 Functional Suitability in terms of Functional

Correctness

89
Figure. 27 Functional Suitability in terms of Functional

Appropriateness

Figure. 28 Performance Efficiency in terms of Time

Behavior

90
Figure. 29 Performance Efficiency in terms of Resource

Utilization

Figure. 30 Performance Efficiency in terms of Capacity

91
Figure. 31 Compatibility in terms of Co-existence

Figure. 32 Compatibility in terms of Interoperability

92
Figure. 33 Usability in terms of Appropriateness

Recognizability

Figure. 34 Usability in terms of Learnability

93
Figure. 35 Usability in terms of Operability

Figure. 36 Usability in terms of User Error Protection

94
Figure. 37 Usability in terms of User Interface

Aesthetics

Figure 38. Usability in terms of Accessibility

95
Figure. 39 Reliability in terms of Maturity

Figure. 40 Reliability in terms of Availability

96
Figure. 41 Reliability in terms of Recoverability

Figure. 42 Security in terms of Confidentiality

97
Figure. 43 Security in terms of Integrity

Figure. 44 Security in terms of Non-Repudiation

98
Figure. 45 Maintainability in terms of Modifiability

Figure. 46 Maintainability in terms of Testability

99
APPENDIX E

Figure. 47 User Interface for Image Upload and

Prediction

100
Figure. 48 User Interface for Video Upload and

Prediction

Figure. 49 User Interface for the Result

101
APPENDIX F

User Manual

Figure. 50 Select a photo that you want to test

102
Figure. 51 Generation of Hash Code

Figure. 52 Testing of Altered Image to see the Accuracy

Figure. 53 Result of the Test

103
Figure. 54 Testing of Video

Figure. 55 Generation of Hash Code

104
Figure. 56 History of the Previous Result

Figure. 57 Delete Button

105
APPENDIX G

Curriculum Vitae

Personal Information

Mathew Ern V. Aquilizan

1 Lilac Street Area 9B Veterans


Village Q.C

09777629694

[email protected]

Academic History
Eulogio “Amang” Rodriguez Institute of (2019 – Present)
Science and Technology
Scholar: First year- Present

Senior High School: New Era University (2017 – 2019)


Awards and Honors

Student Assistant Office of the President (2022-2023)


Chairman Commission on Student Election (2022-2023)
President Computer Science Association (2021-2022)
CAS Commissioner Commission on (2021-2022)
Student Election
President Youth Organization (2021-2022)
Class Mayor (2019 – Present)
CAS Athlete (2019-2020)

106
Senior High Graduate with Highest Honor (2018-2019)

Personal Information

John Angelo C. Manuel

09167940894

2 G. Fernando St. Malanday Marikina City

[email protected]

A young aspiring developer who aims to learn more.

Academic History
Eulogio “Amang” Rodriguez Institute of (2019 – Present)
Science and Technology
Scholar: First year- Present

SHS: Christian Life College (2017 – 2019)


Awards and Honors

Class President (2017- 2018)

SSG Officer (2017- 2019)

Journalist (2017- 2019)

NCLC News Team Editor (2017- 2019)

Class Vice President (2018- 2019)

107
Personal Information

Kyle Vincent L. Merencilla

148 -A Osmeña St. Tondo Manila.

09998099695

[email protected]

Academic History

Eulogio “Amang” Rodriguez Institute of (2019 – Present)


Science and Technology
Scholar: First year- Present

SHS: Tondo High School Manila, (2017 – 2019)


Awards and Honors

SSG Officer (2015 - 2016)

Class Vice President (2016 - 2017)

Class Vice President (2018 – 2019)

Class Vice Mayor (2020 – 2021)

Class Vice Mayor (2021 – 2022)

108
Personal Information

Liezl Leine P. Perez


750 Sunstone Street, Palmera 2,
Taytay, Rizal
09772403961
perezliezl.bscs@gmail. com

A hard- working, motivated, and optimistic student who


takes up responsibilities with utmost enthusiasm.
Academic History
Eulogio “Amang” Rodriguez Institute of (2019 – Present)
Science and Technology
Scholar: First year- Present

SHS: Juan Sumulong Memorial Junior Colleg(2017 – 2019)


Awards and Honors

Secretary: Supreme Student Council (2016- 2017)

With Honors: Grade 11 (2017- 2018)

President: Teatro Sumulong (2018- 2019)

Member: JSMJC SHS Chorale (2018- 2019)

Art Representative: Supreme Student Council (2018- 2019)

With Honors: Grade 12 (2018- 2019)

Player: EARIST Taekwondo (2019)

109
Personal Information
Raffy D. Uao
Address: Block 28 Unit 6 Sitio Sto. Niño
Mayamot Antipolo City
09569285131
[email protected]

Educational Background
Eulogio Amang Rodriguez Institute of (2019–Present)
Science and Technology
SHS: Ama East Rizal (2016-2018)
High School: Antipolo National High School (2012-2016)
Elementary: Bagong Nayon 1 Elementary School (2007 –
2012)
Elementary: Cupang Elementary School (2006–2007)

110
111

You might also like