Conceptual Approach to Detecting Deepfake Modifications of Biometric Images Using Neural Networks

2024;
: pp. 124 - 132
1
Lviv Polytechnic National University
2
Lviv Polytechnic National University, Department of Information Security

The National Cybersecurity Cluster of Ukraine is functionally oriented towards building systems to protect various platforms of information infrastructure, including the creation of secure technologies for detecting deepfake modifications of biometric images based on neural networks in cyberspace. 

This space proposes a conceptual approach to detecting deepfake modifications, which is deployed based on the functioning of a convolutional neural network and the classifier algorithm for biometric images structured as “sensitivity-Yuden index-optimal threshold-specificity”.

An analytical security structure for neural network information technologies is presented based on a multi-level model of “resources-systems-processes-networks-management” according to the concept of “object-threat-defense”. The core of the IT security structure is the integrity of the neural network system for detecting deepfake modifications of biometric face images as well as data analysis systems implementing the information process of “video file segmentation into frames-feature detection, processing – classifier image accuracy assessment”.

A constructive algorithm for detecting deepfake modifications of biometric images has been developed: splitting the video file of biometric images into frames – recognition by the detector – reproduction of normalized facial images – processing by neural network tools – feature matrix computation – image classifier construction.

  1. Kietzmann J., Lee L. W., McCarthy I. P., and Kietzmann T. C. Deepfakes: Trick or treat? Business Horizons, vol. 63(2), pp. 135–146, 2020. DOI: 10.1016/j.bushor.2019.11.006
  2. Yevseiev S., Ponomarenko V., Laptiev O., Milov O., Korol O., Milevskyi S. et. al.; Yevseiev S., Ponomarenko V., Laptiev O., Milov O. (eds.) Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, p.188, 2021. DOI: https://doi.org/10.15587/978-617-7319-31-2
  3. Стратегія         кібербезпеки          України         (2021–2025).         [Електронний          ресурс]         Available         at: https://www.rnbo.gov.ua/files/2021/STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_kyberbezpeki_Ukr.pdf. (Accessed: 19 March 2024)
  4. Karpinski M., Khoma V., Dudvkevych V., Khoma Y. and Sabodashko D. Autoencoder Neural Networks for Outlier Correction in ECG- Based Biometric Identification, 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), pp. 210–215, 2018. DOI: 10.1109/IDAACS-SWS.2018.8525836
  5. Rybalskyi O. V., Soloviev V. Y. On the development of the theory, methods and means of conducting the examination of digital photo, video and sound recording materials, methods and means of conducting the examination of digital photo, video and sound recording materials”. Modern Special Technique, vol. 3 (30), pp. 119–121, 2012. [In Russian]. Available at: http://nbuv.gov.ua/UJRN/sstt_2012_3_19 (Accessed on 19 March 2024).
  6. Li L., Bao J., Zhang T., Yang H., Chen D., Wen F., & Guo B., Face X-ray for more general face forgery detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001–5010, 2020. DOI: https://doi.org/10.48550/arXiv.1912.13458
  7. Li Y., Lyu S. Exposing deepfake videos by detecting face warping artifacts. In Proceedings of the IEEE 14 Conference on Computer Vision and Pattern Recognition Workshops, pp. 46–52, 2019. DOI: https://doi.org/10.48550/arXiv.1811.00656
  8. Lee G., Kim M. Deepfake Detection Using the Rate of Change between Frames Based on Computer Vision. Sensors vol. 21:7367, 2021. DOI: https://doi.org/10.3390%2Fs21217367
  9. (2016) ISO/IEC 30107-1: Information technology – Biometric presentation attack detection – Part 1: Framework.
  10. SC42 WG3: Assessment of the robustness of neural networks – part 1: Overview.Tech. Rep. CD TR 24029-1, ISO/IEC JTC 1/SC 42 Artificial Intelligence (2019).
  11. (2017) DSTU ISO/IEC 15408-1: Information security, cybersecurity and privacy protection. Evaluation criteria for IT security. Part 1: Introduction and general model.
  12. C2PA. 2020. Coalition for Content Provenance and Authenticity. [Електронний ресурс] Available at: https://c2pa.org/ (Accessed: 19 March 2024).
  13. Albawi S., Mohammed T. A. and Al-Zawi S. Understanding of a convolutional neural network, International Conference on Engineering and Technology (ICET), pp. 1–6, 2017. DOI: https://doi.org/10.1109/ICEngTechnol. 2017.8308186
  14. Yerushalmy S. Statistical problems in assessing methods of medical diagnosis, with special reference to x-ray techniques. Public Health Rep, 1947. DOI: https://doi.org/10.2307/4586294
  15. Schisterman E. F., Perkins N. J., Liu A., Bondell H. Optimal cut-point and its corresponding Youden Index to discriminate individuals using pooled blood samples. Epidemiology. vol. 16 (1), pp. 73–81, 2005. DOI: https://doi.org/10.1097/01.ede.0000147512.81966.ba