{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T22:24:22Z","timestamp":1750544662804},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030267513"},{"type":"electronic","value":"9783030267520"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26752-0_6","type":"book-chapter","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T06:02:51Z","timestamp":1568700171000},"page":"161-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Manipulations in Video"],"prefix":"10.1007","author":[{"given":"Gr\u00e9goire","family":"Mercier","sequence":"first","affiliation":[]},{"given":"Foteini","family":"Markatopoulou","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Cozien","sequence":"additional","affiliation":[]},{"given":"Markos","family":"Zampoglou","sequence":"additional","affiliation":[]},{"given":"Evlampios","family":"Apostolidis","sequence":"additional","affiliation":[]},{"given":"Alexandros I.","family":"Metsai","sequence":"additional","affiliation":[]},{"given":"Symeon","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Vasileios","family":"Mezaris","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Patras","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,18]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"X Qi","year":"2015","unstructured":"Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312\u2013327","journal-title":"J Vis Commun Image Represent"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"issue":"75","key":"6_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"100","author":"NBA Warif","year":"2016","unstructured":"Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 100(75):259\u2013278","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/iet-ipr.2017.0441","volume":"12","author":"B Soni","year":"2017","unstructured":"Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Process 12(2):167\u2013178","journal-title":"IET Image Process"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forens Secur 4(1):154\u2013160","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jvcir.2018.05.011","volume":"54","author":"C Iakovidou","year":"2018","unstructured":"Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J Vis Commun Image Represent 54:155\u2013170","journal-title":"J Vis Commun Image Represent"},{"issue":"10","key":"6_CR8","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","volume":"27","author":"B Mahdian","year":"2009","unstructured":"Mahdian B, Saic S (2009) Using noise inconsistencies for blind image forensics. Image Vis Comput 27(10):1497\u20131503","journal-title":"Image Vis Comput"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2015) Splicebuster: a new blind image splicing detector. In: 2015 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS.2015.7368565"},{"key":"6_CR10","unstructured":"Dirik AE, Memon N (2009) Image tamper detection based on demosaicing artifacts. In: Proceedings of the 2009 IEEE international conference on image processing (ICIP 2009). IEEE, pp 1497\u20131500"},{"issue":"5","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"P Ferrara","year":"2012","unstructured":"Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forens Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image forgery detection through residual-based local descriptors and block-matching. In: 2014 IEEE international conference on image processing (ICIP). IEEE, pp 5297\u20135301","DOI":"10.1109\/ICIP.2014.7026072"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00138-013-0547-4","volume":"25","author":"G Muhammad","year":"2014","unstructured":"Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vis Appl 25(4):985\u2013995","journal-title":"Mach Vis Appl"},{"issue":"21","key":"6_CR14","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/LSP.2013.2295858","volume":"3","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Li S, Wang S, Shi YQ (2014) Revealing the traces of median filtering using high-order local ternary patterns. IEEE Signal Process Lett 3(21):275\u2013279","journal-title":"IEEE Signal Process Lett"},{"issue":"7","key":"6_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.aeue.2014.01.013","volume":"68","author":"GK Birajdar","year":"2014","unstructured":"Birajdar GK, Mankar VH (2014) Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation. AEU-Int J Electron Commun 68(7):644\u2013652","journal-title":"AEU-Int J Electron Commun"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"V\u00e1zquez-Pad\u00edn D, Comesana P, P\u00e9rez-Gonz\u00e1lez F (2015) An SVD approach to forensic image resampling detection. In: 2015 23rd European signal processing conference (EUSIPCO). IEEE, pp 2067\u20132071","DOI":"10.1109\/EUSIPCO.2015.7362748"},{"issue":"11","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen J, Kang X, Liu Y, Wang ZJ (2015) Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett 22(11):1849\u20131853","journal-title":"IEEE Signal Process Lett"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security. ACM, pp 5\u201310","DOI":"10.1145\/2909827.2930786"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2017) On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2152\u20132156","DOI":"10.1109\/ICASSP.2017.7952537"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Liu Y, Guan Q, Zhao X, Cao Y (2018) Image forgery localization based on multi-scale convolutional neural networks. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security. ACM, pp 85\u201390","DOI":"10.1145\/3206004.3206010"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forens Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2017) Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security. ACM, pp 159\u2013164","DOI":"10.1145\/3082031.3083247"},{"issue":"4","key":"6_CR23","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s11042-016-3795-2","volume":"76","author":"M Zampoglou","year":"2017","unstructured":"Zampoglou M, Papadopoulos S, Kompatsiaris Y (2017) Large-scale evaluation of splicing localization algorithms for web images. Multim Tools Appl 76(4):4801\u20134834","journal-title":"Multim Tools Appl"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.diin.2016.06.003","volume":"18","author":"K Sitara","year":"2016","unstructured":"Sitara K, Mehtre BM (2016) Digital video tampering detection: an overview of passive techniques. Digit Investig 18:8\u201322","journal-title":"Digit Investig"},{"issue":"1\u20132","key":"6_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11235-008-9141-x","volume":"40","author":"R Singh","year":"2009","unstructured":"Singh R, Vatsa M, Singh SK, Upadhyay S (2009) Integrating SVM classification with svd watermarking for intelligent video authentication. Telecommun Syst 40(1\u20132):5\u201315","journal-title":"Telecommun Syst"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Zhi-yu H, Xiang-hong T (2011) Integrity authentication scheme of color video based on the fragile watermarking. In: 2011 international conference on electronics, communications and control (ICECC). IEEE, pp 4354\u20134358","DOI":"10.1109\/ICECC.2011.6067709"},{"issue":"5","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/TIM.2014.2299371","volume":"63","author":"M Fallahpour","year":"2014","unstructured":"Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J (2014) Tampering detection in compressed digital video using watermarking. IEEE Trans Instrum Meas 63(5):1057\u20131072","journal-title":"IEEE Trans Instrum Meas"},{"issue":"13","key":"6_CR28","doi-asserted-by":"publisher","first-page":"8045","DOI":"10.1007\/s11042-015-2722-2","volume":"75","author":"M Tong","year":"2016","unstructured":"Tong M, Guo J, Tao S, Wu Y (2016) Independent detection and self-recovery video authentication mechanism using extended NMF with different sparseness constraints. Multim Tools Appl 75(13):8045\u20138069","journal-title":"Multim Tools Appl"},{"key":"6_CR29","first-page":"159","volume":"41","author":"K Sowmya","year":"2018","unstructured":"Sowmya K, Chennamma H, Rangarajan L (2018) Video authentication using spatio temporal relationship for tampering detection. J Inf Secur Appl 41:159\u2013169","journal-title":"J Inf Secur Appl"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/496701","volume":"2013","author":"Alessandro Piva","year":"2013","unstructured":"Piva A (2013) An overview on image forensics. ISRN Signal Process:1\u201322","journal-title":"ISRN Signal Processing"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Pandey R, Singh S, Shukla K (2014) Passive copy-move forgery detection in videos. In: IEEE international conference on computer and communication technology (ICCCT), pp 301\u2013306","DOI":"10.1109\/ICCCT.2014.7001509"},{"issue":"2","key":"6_CR32","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.diin.2014.03.016","volume":"11","author":"CS Lin","year":"2014","unstructured":"Lin CS, Tsay JJ (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11(2):120\u2013140","journal-title":"Digit Investig"},{"key":"6_CR33","doi-asserted-by":"publisher","first-page":"6641","DOI":"10.1007\/s11042-014-1915-4","volume":"74","author":"L Su","year":"2015","unstructured":"Su L, Huang T, Yang J (2015) A video forgery detection algorthm based on compressive sensing. Multim Tools Appl 74:6641\u20136656","journal-title":"Multim Tools Appl"},{"issue":"2","key":"6_CR34","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.diin.2012.07.002","volume":"9","author":"Qiong Dong","year":"2012","unstructured":"Dong Q, Yang G, Zhu N (2012) A MCEA based passive forensics scheme for detecting frame based video tampering. Digit Investig:151\u2013159","journal-title":"Digital Investigation"},{"key":"6_CR35","unstructured":"Fu D, Shi Y, Su W (2009) A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE, security, steganography and watermarking of multimedia contents IX, vol 6505, pp 39\u201348"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Milani S, Bestagini P, Tagliasacchi M, Tubaro S (2012) Multiple compression detection for video sequences. In: MMSP. IEEE, pp 112\u2013117. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=6331800","DOI":"10.1109\/MMSP.2012.6343425"},{"issue":"01","key":"6_CR37","doi-asserted-by":"publisher","first-page":"1354001","DOI":"10.1142\/S0218001413540013","volume":"27","author":"JUNYU XU","year":"2013","unstructured":"Xu J, Su Y, liu Q (2013) Detection of double MPEG-2 compression based on distribution of DCT coefficients. Int J Pattern Recognit Artif Intell 27(1)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2006) Exposing digital forgery in video by detecting double MPEG compression. In: Proceedings of the 8th workshop on multimedia and security. ACM, pp 37\u201347","DOI":"10.1145\/1161366.1161375"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Su Y, Xu J (2010) Detection of double compression in MPEG-2 videos. In: IEEE 2nd international workshop on intelligent systems and application (ISA)","DOI":"10.1109\/IWISA.2010.5473474"},{"issue":"4","key":"6_CR40","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.diin.2013.10.004","volume":"10","author":"Tamer Shanableh","year":"2013","unstructured":"Shanableh T (2013) Detection of frame deletion for digital video forensics. Digit Investig 10(4):350\u2013360. https:\/\/doi.org\/10.1016\/j.diin.2013.10.004","journal-title":"Digital Investigation"},{"issue":"2","key":"6_CR41","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1002\/sec.981","volume":"8","author":"Zhenzhen Zhang","year":"2014","unstructured":"Zhang Z, Hou J, Ma Q, Li Z (2015) Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. Secur Commun Netw 8(2)","journal-title":"Security and Communication Networks"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Gironi A, Fontani M, Bianchi T, Piva A, Barni M (2014) A video forensic technique for detecting frame deletion and insertion. In: ICASSP","DOI":"10.1109\/ICASSP.2014.6854801"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP)","DOI":"10.1109\/ICASSP.2014.6854085"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Papadopoulou O, Zampoglou M, Papadopoulos S, Kompatsiaris I (2018) A corpus of debunked and verified user-generated videos. Online Inf Rev","DOI":"10.1108\/OIR-03-2018-0101"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Choi Y, Choi M, Kim M, Ha JW, Kim S, Choo J (2018) StarGAN: unified generative adversarial networks for multi-domain image-to-image translation. In: IEEE conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2018.00916"},{"key":"6_CR46","unstructured":"Baek K, Bang D, Shim H (2018) Editable generative adversarial networks: generating and editing faces simultaneously. CoRR. arXiv:1807.07700"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Bansal A, Ma S, Ramanan D, Sheikh Y (2018) Recycle-GAN: unsupervised video retargeting. In: Ferrari V, Hebert M, Sminchisescu C, Weiss Y (eds) Computer vision\u2014ECCV 2018\u201415th European conference, Munich, Germany, September 8\u201314, 2018, Proceedings, Part V. Lecture notes in computer science, vol 11209. Springer, pp 122\u2013138","DOI":"10.1007\/978-3-030-01228-1_8"},{"key":"6_CR48","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-01246-5_3","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Hsin-Ying Lee","year":"2018","unstructured":"Lee HY, Tseng HY, Huang JB, Singh M, Yang MH (2018) Diverse image-to-image translation via disentangled representations. In: Proceedings of the European conference on computer vision (ECCV), pp 35\u201351"},{"key":"6_CR49","unstructured":"Wang Y, Tao X, Qi X, Shen X, Jia J (2018) Image inpainting via generative multi-column convolutional neural networks. In: Advances in neural information processing systems, pp 331\u2013340"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Yu J, Lin Z, Yang J, Shen X, Lu X, Huang TS (2018) Generative image inpainting with contextual attention. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5505\u20135514","DOI":"10.1109\/CVPR.2018.00577"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Dehnie S, Sencar HT, Memon ND (2006) Digital image forensics for identifying computer generated and digital camera images. In: Proceedings of the 2006 IEEE international conference on image processing (ICIP 2006). IEEE, pp 2313\u20132316. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=4106439","DOI":"10.1109\/ICIP.2006.312849"},{"key":"6_CR52","doi-asserted-by":"crossref","unstructured":"Dirik AE, Bayram S, Sencar HT, Memon ND (2007) New features to identify computer generated images. In: Proceedings of the 2007 IEEE international conference on image processing (ICIP 2007). IEEE, pp 433\u2013436. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=4378863","DOI":"10.1109\/ICIP.2007.4380047"},{"issue":"22","key":"6_CR53","doi-asserted-by":"publisher","first-page":"23721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"J Wang","year":"2017","unstructured":"Wang J, Li T, Shi YQ, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multim Tools Appl 76(22):23721\u201323737","journal-title":"Multim Tools Appl"},{"key":"6_CR54","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: learning to detect manipulated facial images. arXiv:1901.08971","DOI":"10.1109\/ICCV.2019.00009"},{"key":"6_CR55","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2018) Faceforensics: a large-scale video dataset for forgery detection in human faces. CoRR. arXiv:1803.09179v1"},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) MesoNet: a compact facial video forgery detection network. CoRR. arXiv:1809.00888","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"6_CR58","doi-asserted-by":"crossref","unstructured":"Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In: 2007 IEEE international conference on multimedia and expo. IEEE, pp 12\u201315","DOI":"10.1109\/ICME.2007.4284574"},{"key":"6_CR59","unstructured":"Mallat S (2009) A wavelet tour of signal processing, 3rd edn. Academic Press"},{"key":"6_CR60","doi-asserted-by":"crossref","unstructured":"Zampoglou M, Markatopoulou F, Mercier G, Touska D, Apostolidis E, Papadopoulos S, Cozien R, Patras I, Mezaris V, Kompatsiaris I (2019) Detecting tampered videos with multimedia forensics and deep learning. In: International conference on multimedia modeling. Springer, pp 374\u2013386","DOI":"10.1007\/978-3-030-05710-7_31"},{"key":"6_CR61","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR 2015), pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"6_CR62","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR 2016), pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"6_CR63","first-page":"102","volume-title":"MultiMedia Modeling","author":"Nikiforos Pittaras","year":"2016","unstructured":"Pittaras N, Markatopoulou F, Mezaris V, Patras I (2017) Comparison of fine-tuning and extension strategies for deep convolutional neural networks. In: Proceedings of the 23rd international conference on multimedia modeling (MMM 2017). Springer, Reykjavik, Iceland, pp 102\u2013114"},{"key":"6_CR64","unstructured":"Papadopoulou O, Zampoglou M, Papadopoulos S, Kompatsiaris Y, Teyssou D (2018) Invid fake video corpus v2.0 (version 2.0). Dataset on Zenodo"},{"issue":"1","key":"6_CR65","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/sym10010003","volume":"10","author":"Y Yao","year":"2017","unstructured":"Yao Y, Shi Y, Weng S, Guan B (2017) Deep learning for detection of object-based forgery in advanced video. Symmetry 10(1):3","journal-title":"Symmetry"}],"container-title":["Video Verification in the Fake News Era"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26752-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T01:22:32Z","timestamp":1611192152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26752-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030267513","9783030267520"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26752-0_6","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}