Abstract
Deepfakes are digital-media which may contain audio, videos or images synthesised by usage of Generative Adversarial Networks (GANs) with the aid of Artificial Intelligence (AI) technologies. These deepfakes have the capability to replicate and mimic the behaviour of real people. Although deepfakes are beneficial in filmmaking and in education sector, but they can have serious implications within the other areas or fields such as in politics, social network platforms, human security and law. The deepfakes can mislead several people with false information. By creating false evidence that can behave like real people and damage the reputation of one. There are several ways for deepfake detection. They work on the basis of analysing and discriminating between various features such as facial features, movements, blinking, variations in voice, variation in tones and background noises. However, these detection systems may be vulnerable to quantum adversaries and futuristic adversarial attacks. This may result in an ambiguity within trustworthy detection systems, which creates an overriding necessity for effective and trustworthy detection framework. The paper highlights a reliable deepfake image detection framework based on the ResNeXt architecture optimized with use of lattice-based adversarial training that is learning with errors (LWE) mechanism to make it resilient against several adversarial manipulations. In addition to this, when followed by the unification of Kyber and Dilithium with quantum cryptography methods, these ensure the authenticity and encryption of the detection results. The proposed scheme DeepQShield is quantum-resistant because it incorporates the executions of post cryptography algorithms and is trained and tested on the Deepfake Detection Challenge dataset (DFDC). On the DFDC database it achieved significantly higher accuracy of 99.28% and an impressive AUC value of 0.9997. When compared to the existing systems such as EfficientNet-B7 (accuracy: 97.2% on DFDC), Vision Transformers (ViT) (90 to 98% on Celeb-DF and DFDC), Multi-attentional CNN-LSTM networks (98.2% on DFDC), FuzzyDFD (accuracy: 99% FF++ and 93% on (Celeb-DF). DeepQShield outshines the conventional models in terms of security, scalability, accuracy and robustness making it best suitable for various applications in real-world scenarios like face forensics, social media data authentication.
Data availability
The code developed during the current study can be accessed from: https://github.com/sakethksg/DeepQShield. The data that support the findings of this study are available from: DFDC: https://www.kaggle.com/datasets/xhlulu/140k-real-and-fake-faces. Celeb-DF(V2): https://www.kaggle.com/datasets/reubensuju/celeb-df-v2. FF+: https://www.kaggle.com/datasets/greatgamedota/faceforensics.
References
Jin, X. et al. A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos. Forensic Sci. Int. Digit. Invest. 49, 301747. https://doi.org/10.1016/j.fsidi.2024.301747 (2024).
Casu, M. et al. GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions. Forensic Sci. Int. Digit. Invest. 50, 301795. https://doi.org/10.1016/j.fsidi.2024.301795 (2024).
Tran, V. N. et al. Generalization of forgery detection with meta deepfake detection model. IEEE Access. 11, 535–546. https://doi.org/10.1109/ACCESS.2022.3232290 (2023).
Maheshwari, R. U. et al. Advanced plasmonic Resonance-enhanced biosensor for comprehensive real-time detection and analysis of deepfake content. Plasmonics 20, 1859–1876. https://doi.org/10.1007/s11468-024-02407-0 (2025).
Kumar, A. et al. Advances in deepfake detection algorithms: Exploring fusion techniques in single and multi-modal approach. Inform. Fusion. 118, 102993. https://doi.org/10.1016/j.inffus.2024.102993 (2025).
Budhiraja, R. et al. MaD–CoRN: An efficient and lightweight deepfake detection approach using convolutional reservoir network. Multimedia Tools Appl. https://doi.org/10.1007/s11042-024-20223-w (2024).
Hydara, E., et al. Empirical assessment of deepfake detection: Advancing judicial evidence verification through artificial intelligence. IEEE Access. 12, 151188–151203. https://doi.org/10.1109/ACCESS.2024.3480320 (2024).
Sandoval, M. P. et al. Threat of deepfakes to the criminal justice system: A systematic review. Crime. Sci. 13, Article 41. https://doi.org/10.1186/s40163-024-00239-1 (2024).
Brown, S. D. Virtual unreality: Potential implications of deepfake technology for the course of justice. ERA Forum. 24, 501–518. https://doi.org/10.1007/s12027-024-00780-1 (2023).
Maheshwari, R. U. et al. Innovative quantum PlasmoVision-based imaging for real-time deepfake detection. Plasmonics https://doi.org/10.1007/s11468-025-02846-3 (2025).
Lin, C. A. et al. Quantum–trained convolutional neural network for deepfake audio detection [Preprint]. https://doi.org/10.48550/arXiv.2410.09250 (2024).
Sharma, P. et al. A robust ensemble model for deepfake detection of GAN-generated images on social media. Discov Comput. 28, 41. https://doi.org/10.1007/s10791-025-09538-w (2025).
Sunil, R. et al. Exploring autonomous methods for deepfake detection: A detailed survey on techniques and evaluation. Heliyon 11 (2), e42273. https://doi.org/10.1016/j.heliyon.2024.e42273 (2025).
Abbas, F. & Taeihagh, A. Unmasking deepfakes: A systematic review of deepfake detection and generation techniques using artificial intelligence. Expert Syst. Appl. 252, 124260. https://doi.org/10.1016/j.eswa.2024.124260 (2024).
Tanwar, S. & Singh, J. ResNext50 based convolution neural network-long short term memory model for plant disease classification. Multimedia Tools Appl. 82, 1–19. https://doi.org/10.1007/s11042-023-14851-x (2023).
Li, B. et al. FDPNet Deep forgery detection by leveraging multi-scale self-forgery images generating. J. Supercomput.. 81, 778. https://doi.org/10.1007/s11227-025-07229-3 (2025).
Qiu, X. et al. Fusion: Dual-domain fusion with feature superposition for deepfake detection. Inform. Fus.. 119, 103087. https://doi.org/10.1016/j.inffus.2025.103087 (2025).
Zhao, C. et al. ISTVT: Interpretable spatial-temporal video transformer for deepfake detection. IEEE Trans. Inf. Forensics Secur. 18, 1335–1348. https://doi.org/10.1109/TIFS.2023.3239223 (2023).
Kingra, S., et al. Assessing deepfake detection methods: A comparative evaluation on novel large-scale Asian deepfake dataset. Int. J. Data Sci. Anal. https://doi.org/10.1007/s41060-025-00741-y (2025).
Hu, J. et al. Delocate: Detection and localization for deepfake videos with randomly-located tampered traces. https://arxiv.org/abs/2401.13516 (2024).
von Schenk, A. et al. Lie detection algorithms disrupt the social dynamics of accusation behavior. Article 27, 7110201. https://doi.org/10.1016/j.isci.2024.107239 (2024).
Raveena, et al. MSFF-Net: A deepfake detection network based on multi-space feature fusion technique. J. Inf. Syst. Eng. Manag. 10(55s), 131. https://www.jisem-journal.com/index.php/journal/article/view/11433 (2025).
Qi, X. et al. MADD: A multi–lingual multi–speaker audio deepfake detection dataset. In Proceedings of the 2024 IEEE 14th International Symposium on Chinese Spoken Language Processing (ISCSLP). https://doi.org/10.1109/ISCSLP63861.2024.10800535 (2024).
Tahaoglu, G. et al. Deepfake audio detection with spectral features and ResNeXt-based architecture. Knowl.-Based Syst. 293, 113726. https://doi.org/10.1016/j.knosys.2025.113726 (2025).
Samhita, V. et al. Self-distillation framework for improving fake speech detection in the domain variability scenario. Neural Comput. Appl. 37 (5), 3111–3127. https://doi.org/10.1007/s00521-024-10760-8 (2024).
Gandhi, K. et al. A multimodal framework for deepfake detection [Preprint]. Journal of Electrical Systems, 2024. Retrieved from https://arxiv.org/abs/2410.03487 (2024).
Chawla, D. & Mehra, P. S. A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled iot: Challenges, opportunities and solutions. Internet of Things 24, 100950 (2023). https://doi.org/10.1016/j.iot.2023.100950
Tian, J. et al. ADMM-based adversarial false data injection attacks against multi-label locational detection. IEEE Trans. Dependable Secur. Comput.. https://doi.org/10.1109/TDSC.2025.3605689 (2025).
Tian, J. et al. Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet Things J. 9(22), 22399–22409. https://doi.org/10.1109/JIOT.2021.3111024 (2022).
Yogarajan, G. et al. Robust deepfake detection using multi-scale feature fusion. Multimed Tools Appl. https://doi.org/10.1007/s11042-025-20768-4 (2025).
Xu, Z. et al. Public perception towards deepfakes through topic modelling and sentiment analysis of social media data. Soc. Netw. Anal. Min. 15, Article 16. https://doi.org/10.1007/s13278-025-01445-8 (2025).
Chakraborty, R. & Naskar, R. Role of human physiology and facial biomechanics towards Building robust deepfake detectors: A comprehensive survey and analysis. Comput. Sci. Rev. 54, 100677. https://doi.org/10.1016/j.cosrev.2024.100677 (2024).
Asha, S. et al. A defensive framework for deepfake detection under adversarial settings using temporal and spatial features. Int. J. Inf. Secur. 22, 1371–1382. https://doi.org/10.1007/s10207-023-00695-x (2023).
Subburaj, B. & Ragavendra, R. Deepfake detection using spatio-temporal-structural anomaly learning and fuzzy system-based decision fusion. IEEE Access, 13, 82747–82758 (2025). https://doi.org/10.1109/ACCESS.2025.3567523
Ben Jabra, M. et al. Deepfake detection through ensemble learning. Multimedia Tools Appl. https://doi.org/10.1007/s11042-025-20932-w (2025).
xhlulu. 140k Real and Fake Faces [Data set]. Kaggle. (2019). https://www.kaggle.com/datasets/xhlulu/140k-real-and-fake-faces
Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM. 56 (6). https://doi.org/10.1145/1568318.1568324 (2009). Article 34.
Lin, T. Y. et al. Focal loss for dense object detection. In 2017 IEEE International Conference on Computer Vision (ICCV) 2999–3007. IEEE (2017). https://doi.org/10.1109/ICCV.2017.324
Loshchilov, I. & Hutter, F. Decoupled weight decay regularization. International Conference on Learning Representations (ICLR) (2017). https://arxiv.org/abs/1711.05101
Bos, J. et al. CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In K. Paterson & J. Möller (Eds.), Advances in Cryptology – EUROCRYPT 2018 353–383. Springer (2021). https://doi.org/10.1007/978-3-319-78381-9_13
Ducas, L. et al. CRYSTALS-Dilithium: A lattice-based digital signature scheme. In J.-S. Coron & J. B. Nielsen (Eds.), Advances in Cryptology – EUROCRYPT 2018 (pp. 238–268). Springer. (2018). https://doi.org/10.1007/978-3-319-78375-8_9
Sudarshana, K. & Vamsidhar, Y. UAM-Net: robust deepfake detection through hybrid attention into scalable convolutional network. Expert Syst. 42 (3), e70009. https://doi.org/10.1111/exsy.70009 (2025).
Chepchirchir, R. & Mboli, J. Exploring deepfake detection: A comparative analysis. TechRxiv. (2025). https://doi.org/10.36227/techrxiv.174918233.32766378/v1
Balafrej, I. & Dahmane, M. Enhancing practicality and efficiency of deepfake detection. Sci. Rep. 14, 31084. https://doi.org/10.1038/s41598-024-82223-y (2024).
Nelson, L. et al. Deepfake detection in manipulated images/audio/videos: A three-stage multi-modal deep learning framework. Inteligencia Artif. 28 (76), 20–39. https://doi.org/10.4114/intartif.vol28iss76pp20-39 (2025).
Pintelas, E. & Livieris, I. E. Convolutional neural network framework for deepfake detection: A diffusion-based approach. Comput. Vis. Image Underst. 257, 104375. https://doi.org/10.1016/j.cviu.2025.104375 (2025).
Reubensuju. (n.d.). Celeb-DF (v2) [Data set]. Kaggle. Retrieved September 25. from (2025). https://www.kaggle.com/datasets/reubensuju/celeb-df-v2
GreatGameDota. (n.d.). FaceForensics [Data set]. Kaggle. Retrieved from https://www.kaggle.com/datasets/greatgamedota/faceforensics
Thing, V. L. L. Deepfake detection with deep learning: Convolutional neural networks versus transformers. https://arxiv.org/abs/2304.03698(2023).
Hua, Y. et al. Learning patch-channel correspondence for interpretable face forgery detection. IEEE Trans. Image Process. 32, 1668–1680. https://doi.org/10.1109/TIP.2023.3246793 (2023).
Funding
Open access funding provided by Vellore Institute of Technology.
Author information
Authors and Affiliations
Contributions
Conceptualization: Brindha Subburaj and Kollipara Naga Shreeya; methodology: Brindha Subburaj, Kollipara Naga Shreeya and Kollipara Sai Govinda Saketh; writing— original draft preparation: Brindha Subburaj, Kollipara Naga Shreeya and Kollipara Sai Govinda Saketh, Padmavathy T V, Sherly Alphonse, Girish Subramanian. All authors have reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Shreeya, K.N., Subburaj, B., Saketh, K.S.G. et al. A quantum resilient deepfake detection framework using enhanced resnext and post quantum cryptography defence. Sci Rep (2026). https://doi.org/10.1038/s41598-026-38924-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-38924-7