Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A quantum resilient deepfake detection framework using enhanced resnext and post quantum cryptography defence
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 20 February 2026

A quantum resilient deepfake detection framework using enhanced resnext and post quantum cryptography defence

  • Kollipara Naga Shreeya1,
  • Brindha Subburaj1,
  • Kollipara Sai Govinda Saketh1,
  • T. V. Padmavathy1,
  • Sherly Alphonse1 &
  • …
  • Girish Subramanian2 

Scientific Reports , Article number:  (2026) Cite this article

  • 25 Accesses

  • 2 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Deepfakes are digital-media which may contain audio, videos or images synthesised by usage of Generative Adversarial Networks (GANs) with the aid of Artificial Intelligence (AI) technologies. These deepfakes have the capability to replicate and mimic the behaviour of real people. Although deepfakes are beneficial in filmmaking and in education sector, but they can have serious implications within the other areas or fields such as in politics, social network platforms, human security and law. The deepfakes can mislead several people with false information. By creating false evidence that can behave like real people and damage the reputation of one. There are several ways for deepfake detection. They work on the basis of analysing and discriminating between various features such as facial features, movements, blinking, variations in voice, variation in tones and background noises. However, these detection systems may be vulnerable to quantum adversaries and futuristic adversarial attacks. This may result in an ambiguity within trustworthy detection systems, which creates an overriding necessity for effective and trustworthy detection framework. The paper highlights a reliable deepfake image detection framework based on the ResNeXt architecture optimized with use of lattice-based adversarial training that is learning with errors (LWE) mechanism to make it resilient against several adversarial manipulations. In addition to this, when followed by the unification of Kyber and Dilithium with quantum cryptography methods, these ensure the authenticity and encryption of the detection results. The proposed scheme DeepQShield is quantum-resistant because it incorporates the executions of post cryptography algorithms and is trained and tested on the Deepfake Detection Challenge dataset (DFDC). On the DFDC database it achieved significantly higher accuracy of 99.28% and an impressive AUC value of 0.9997. When compared to the existing systems such as EfficientNet-B7 (accuracy: 97.2% on DFDC), Vision Transformers (ViT) (90 to 98% on Celeb-DF and DFDC), Multi-attentional CNN-LSTM networks (98.2% on DFDC), FuzzyDFD (accuracy: 99% FF++ and 93% on (Celeb-DF). DeepQShield outshines the conventional models in terms of security, scalability, accuracy and robustness making it best suitable for various applications in real-world scenarios like face forensics, social media data authentication.

Data availability

The code developed during the current study can be accessed from: https://github.com/sakethksg/DeepQShield. The data that support the findings of this study are available from: DFDC: https://www.kaggle.com/datasets/xhlulu/140k-real-and-fake-faces. Celeb-DF(V2): https://www.kaggle.com/datasets/reubensuju/celeb-df-v2. FF+: https://www.kaggle.com/datasets/greatgamedota/faceforensics.

References

  1. Jin, X. et al. A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos. Forensic Sci. Int. Digit. Invest. 49, 301747. https://doi.org/10.1016/j.fsidi.2024.301747 (2024).

    Google Scholar 

  2. Casu, M. et al. GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions. Forensic Sci. Int. Digit. Invest. 50, 301795. https://doi.org/10.1016/j.fsidi.2024.301795 (2024).

    Google Scholar 

  3. Tran, V. N. et al. Generalization of forgery detection with meta deepfake detection model. IEEE Access. 11, 535–546. https://doi.org/10.1109/ACCESS.2022.3232290 (2023).

    Google Scholar 

  4. Maheshwari, R. U. et al. Advanced plasmonic Resonance-enhanced biosensor for comprehensive real-time detection and analysis of deepfake content. Plasmonics 20, 1859–1876. https://doi.org/10.1007/s11468-024-02407-0 (2025).

    Google Scholar 

  5. Kumar, A. et al. Advances in deepfake detection algorithms: Exploring fusion techniques in single and multi-modal approach. Inform. Fusion. 118, 102993. https://doi.org/10.1016/j.inffus.2024.102993 (2025).

    Google Scholar 

  6. Budhiraja, R. et al. MaD–CoRN: An efficient and lightweight deepfake detection approach using convolutional reservoir network. Multimedia Tools Appl. https://doi.org/10.1007/s11042-024-20223-w (2024).

    Google Scholar 

  7. Hydara, E., et al. Empirical assessment of deepfake detection: Advancing judicial evidence verification through artificial intelligence. IEEE Access. 12, 151188–151203. https://doi.org/10.1109/ACCESS.2024.3480320 (2024).

    Google Scholar 

  8. Sandoval, M. P. et al. Threat of deepfakes to the criminal justice system: A systematic review. Crime. Sci. 13, Article 41. https://doi.org/10.1186/s40163-024-00239-1 (2024).

  9. Brown, S. D. Virtual unreality: Potential implications of deepfake technology for the course of justice. ERA Forum. 24, 501–518. https://doi.org/10.1007/s12027-024-00780-1 (2023).

    Google Scholar 

  10. Maheshwari, R. U. et al. Innovative quantum PlasmoVision-based imaging for real-time deepfake detection. Plasmonics https://doi.org/10.1007/s11468-025-02846-3 (2025).

    Google Scholar 

  11. Lin, C. A. et al. Quantum–trained convolutional neural network for deepfake audio detection [Preprint]. https://doi.org/10.48550/arXiv.2410.09250 (2024).

  12. Sharma, P. et al. A robust ensemble model for deepfake detection of GAN-generated images on social media. Discov Comput. 28, 41. https://doi.org/10.1007/s10791-025-09538-w (2025).

    Google Scholar 

  13. Sunil, R. et al. Exploring autonomous methods for deepfake detection: A detailed survey on techniques and evaluation. Heliyon 11 (2), e42273. https://doi.org/10.1016/j.heliyon.2024.e42273 (2025).

    Google Scholar 

  14. Abbas, F. & Taeihagh, A. Unmasking deepfakes: A systematic review of deepfake detection and generation techniques using artificial intelligence. Expert Syst. Appl. 252, 124260. https://doi.org/10.1016/j.eswa.2024.124260 (2024).

    Google Scholar 

  15. Tanwar, S. & Singh, J. ResNext50 based convolution neural network-long short term memory model for plant disease classification. Multimedia Tools Appl. 82, 1–19. https://doi.org/10.1007/s11042-023-14851-x (2023).

    Google Scholar 

  16. Li, B. et al. FDPNet Deep forgery detection by leveraging multi-scale self-forgery images generating. J. Supercomput.. 81, 778. https://doi.org/10.1007/s11227-025-07229-3 (2025).

    Google Scholar 

  17. Qiu, X. et al. Fusion: Dual-domain fusion with feature superposition for deepfake detection. Inform. Fus.. 119, 103087. https://doi.org/10.1016/j.inffus.2025.103087 (2025).

    Google Scholar 

  18. Zhao, C. et al. ISTVT: Interpretable spatial-temporal video transformer for deepfake detection. IEEE Trans. Inf. Forensics Secur. 18, 1335–1348. https://doi.org/10.1109/TIFS.2023.3239223 (2023).

    Google Scholar 

  19. Kingra, S., et al. Assessing deepfake detection methods: A comparative evaluation on novel large-scale Asian deepfake dataset. Int. J. Data Sci. Anal. https://doi.org/10.1007/s41060-025-00741-y (2025).

    Google Scholar 

  20. Hu, J. et al. Delocate: Detection and localization for deepfake videos with randomly-located tampered traces. https://arxiv.org/abs/2401.13516 (2024).

  21. von Schenk, A. et al. Lie detection algorithms disrupt the social dynamics of accusation behavior. Article 27, 7110201. https://doi.org/10.1016/j.isci.2024.107239 (2024).

  22. Raveena, et al. MSFF-Net: A deepfake detection network based on multi-space feature fusion technique. J. Inf. Syst. Eng. Manag. 10(55s), 131. https://www.jisem-journal.com/index.php/journal/article/view/11433 (2025).

    Google Scholar 

  23. Qi, X. et al. MADD: A multi–lingual multi–speaker audio deepfake detection dataset. In Proceedings of the 2024 IEEE 14th International Symposium on Chinese Spoken Language Processing (ISCSLP). https://doi.org/10.1109/ISCSLP63861.2024.10800535 (2024).

  24. Tahaoglu, G. et al. Deepfake audio detection with spectral features and ResNeXt-based architecture. Knowl.-Based Syst. 293, 113726. https://doi.org/10.1016/j.knosys.2025.113726 (2025).

    Google Scholar 

  25. Samhita, V. et al. Self-distillation framework for improving fake speech detection in the domain variability scenario. Neural Comput. Appl. 37 (5), 3111–3127. https://doi.org/10.1007/s00521-024-10760-8 (2024).

    Google Scholar 

  26. Gandhi, K. et al. A multimodal framework for deepfake detection [Preprint]. Journal of Electrical Systems, 2024. Retrieved from https://arxiv.org/abs/2410.03487 (2024).

  27. Chawla, D. & Mehra, P. S. A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled iot: Challenges, opportunities and solutions. Internet of Things 24, 100950 (2023). https://doi.org/10.1016/j.iot.2023.100950

  28. Tian, J. et al. ADMM-based adversarial false data injection attacks against multi-label locational detection. IEEE Trans. Dependable Secur. Comput.. https://doi.org/10.1109/TDSC.2025.3605689 (2025).

  29. Tian, J. et al. Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet Things J. 9(22), 22399–22409. https://doi.org/10.1109/JIOT.2021.3111024 (2022).

    Google Scholar 

  30. Yogarajan, G. et al. Robust deepfake detection using multi-scale feature fusion. Multimed Tools Appl. https://doi.org/10.1007/s11042-025-20768-4 (2025).

    Google Scholar 

  31. Xu, Z. et al. Public perception towards deepfakes through topic modelling and sentiment analysis of social media data. Soc. Netw. Anal. Min. 15, Article 16. https://doi.org/10.1007/s13278-025-01445-8 (2025).

  32. Chakraborty, R. & Naskar, R. Role of human physiology and facial biomechanics towards Building robust deepfake detectors: A comprehensive survey and analysis. Comput. Sci. Rev. 54, 100677. https://doi.org/10.1016/j.cosrev.2024.100677 (2024).

    Google Scholar 

  33. Asha, S. et al. A defensive framework for deepfake detection under adversarial settings using temporal and spatial features. Int. J. Inf. Secur. 22, 1371–1382. https://doi.org/10.1007/s10207-023-00695-x (2023).

    Google Scholar 

  34. Subburaj, B. & Ragavendra, R. Deepfake detection using spatio-temporal-structural anomaly learning and fuzzy system-based decision fusion. IEEE Access, 13, 82747–82758 (2025). https://doi.org/10.1109/ACCESS.2025.3567523

  35. Ben Jabra, M. et al. Deepfake detection through ensemble learning. Multimedia Tools Appl. https://doi.org/10.1007/s11042-025-20932-w (2025).

    Google Scholar 

  36. xhlulu. 140k Real and Fake Faces [Data set]. Kaggle. (2019). https://www.kaggle.com/datasets/xhlulu/140k-real-and-fake-faces

  37. Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM. 56 (6). https://doi.org/10.1145/1568318.1568324 (2009). Article 34.

  38. Lin, T. Y. et al. Focal loss for dense object detection. In 2017 IEEE International Conference on Computer Vision (ICCV) 2999–3007. IEEE (2017). https://doi.org/10.1109/ICCV.2017.324

  39. Loshchilov, I. & Hutter, F. Decoupled weight decay regularization. International Conference on Learning Representations (ICLR) (2017). https://arxiv.org/abs/1711.05101

  40. Bos, J. et al. CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In K. Paterson & J. Möller (Eds.), Advances in Cryptology – EUROCRYPT 2018 353–383. Springer (2021). https://doi.org/10.1007/978-3-319-78381-9_13

  41. Ducas, L. et al. CRYSTALS-Dilithium: A lattice-based digital signature scheme. In J.-S. Coron & J. B. Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2018 (pp. 238–268). Springer. (2018). https://doi.org/10.1007/978-3-319-78375-8_9

  42. Sudarshana, K. & Vamsidhar, Y. UAM-Net: robust deepfake detection through hybrid attention into scalable convolutional network. Expert Syst. 42 (3), e70009. https://doi.org/10.1111/exsy.70009 (2025).

    Google Scholar 

  43. Chepchirchir, R. & Mboli, J. Exploring deepfake detection: A comparative analysis. TechRxiv. (2025). https://doi.org/10.36227/techrxiv.174918233.32766378/v1

  44. Balafrej, I. & Dahmane, M. Enhancing practicality and efficiency of deepfake detection. Sci. Rep. 14, 31084. https://doi.org/10.1038/s41598-024-82223-y (2024).

    Google Scholar 

  45. Nelson, L. et al. Deepfake detection in manipulated images/audio/videos: A three-stage multi-modal deep learning framework. Inteligencia Artif. 28 (76), 20–39. https://doi.org/10.4114/intartif.vol28iss76pp20-39 (2025).

    Google Scholar 

  46. Pintelas, E. & Livieris, I. E. Convolutional neural network framework for deepfake detection: A diffusion-based approach. Comput. Vis. Image Underst. 257, 104375. https://doi.org/10.1016/j.cviu.2025.104375 (2025).

    Google Scholar 

  47. Reubensuju. (n.d.). Celeb-DF (v2) [Data set]. Kaggle. Retrieved September 25. from (2025). https://www.kaggle.com/datasets/reubensuju/celeb-df-v2

  48. GreatGameDota. (n.d.). FaceForensics [Data set]. Kaggle. Retrieved from https://www.kaggle.com/datasets/greatgamedota/faceforensics

  49. Thing, V. L. L. Deepfake detection with deep learning: Convolutional neural networks versus transformers. https://arxiv.org/abs/2304.03698(2023).

  50. Hua, Y. et al. Learning patch-channel correspondence for interpretable face forgery detection. IEEE Trans. Image Process. 32, 1668–1680. https://doi.org/10.1109/TIP.2023.3246793 (2023).

    Google Scholar 

Download references

Funding

Open access funding provided by Vellore Institute of Technology.

Author information

Authors and Affiliations

  1. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India

    Kollipara Naga Shreeya, Brindha Subburaj, Kollipara Sai Govinda Saketh, T. V. Padmavathy & Sherly Alphonse

  2. School of Business Administration, Penn State Harrisburg, Middletown, PA, USA

    Girish Subramanian

Authors
  1. Kollipara Naga Shreeya
    View author publications

    Search author on:PubMed Google Scholar

  2. Brindha Subburaj
    View author publications

    Search author on:PubMed Google Scholar

  3. Kollipara Sai Govinda Saketh
    View author publications

    Search author on:PubMed Google Scholar

  4. T. V. Padmavathy
    View author publications

    Search author on:PubMed Google Scholar

  5. Sherly Alphonse
    View author publications

    Search author on:PubMed Google Scholar

  6. Girish Subramanian
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Conceptualization: Brindha Subburaj and Kollipara Naga Shreeya; methodology: Brindha Subburaj, Kollipara Naga Shreeya and Kollipara Sai Govinda Saketh; writing— original draft preparation: Brindha Subburaj, Kollipara Naga Shreeya and Kollipara Sai Govinda Saketh, Padmavathy T V, Sherly Alphonse, Girish Subramanian. All authors have reviewed the manuscript.

Corresponding author

Correspondence to Brindha Subburaj.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shreeya, K.N., Subburaj, B., Saketh, K.S.G. et al. A quantum resilient deepfake detection framework using enhanced resnext and post quantum cryptography defence. Sci Rep (2026). https://doi.org/10.1038/s41598-026-38924-7

Download citation

  • Received: 28 October 2025

  • Accepted: 01 February 2026

  • Published: 20 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-38924-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Deepfake detection
  • ResNeXt
  • Lattice-based adversarial training
  • Post quantum cryptography
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics