{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:03:18Z","timestamp":1743051798391,"version":"3.40.3"},"publisher-location":"Cham","reference-count":78,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030876630"},{"type":"electronic","value":"9783030876647"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":30,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this chapter, we present the various categories of Face Manipulation\u00a0and their use within different remote operational systems. We then use the example of remote identity document\u00a0onboarding systems to illustrate how each category can be used in practice to compromise such a system. After a definition of the different Face Manipulation\u00a0categories and the common algorithms used to produce them, we go through the various manipulation detection\u00a0algorithms and common image and video forgery\u00a0datasets. We then introduce some known counter-forensics methods that can be used by an attacker to avoid detection. Knowing the detection methods and the counter-forensic, we present how we can build up a safer system by using the correct methods at the correct time. But also how knowledge about the tampering process could be used to design the user\u00a0experience to make the systems harder to compromise. We complete this review by the standardisation effort and legal aspect on the matter. And we conclude by discussing the remaining challenges and perspectives for better use of nowadays detection methods in practical usage.<\/jats:p>","DOI":"10.1007\/978-3-030-87664-7_19","type":"book-chapter","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T09:03:06Z","timestamp":1643619786000},"page":"413-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Face Manipulation Detection in\u00a0Remote Operational Systems"],"prefix":"10.1007","author":[{"given":"Marc Michel","family":"Pic","sequence":"first","affiliation":[]},{"given":"Ga\u00ebl","family":"Mahfoudi","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Trabelsi","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"Ruben Tolosana","year":"2020","unstructured":"Tolosana Ruben, Vera-Rodriguez Ruben, Fierrez Julian, Morales Aythami, Ortega-Garcia Javier (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148","journal-title":"Inf Fusion"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bitouk D, Kumar N, Dhillon S, Belhumeur P, Nayar S (2008) Face swapping: automatically replacing faces in photographs. In: SIGGRAPH 2008","DOI":"10.1145\/1399504.1360638"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Korshunova I, Shi W, Dambre J, Theis L (2017) Fast face-swap using convolutional neural networks. In: Proceedings of the IEEE international conference on computer vision, pp 3677\u20133685","DOI":"10.1109\/ICCV.2017.397"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Ferrara M, Franco A, Maltoni D (2014) The magic passport. In: IEEE international joint conference on biometrics. IEEE, pp 1\u20137","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"19_CR5","unstructured":"Ferrara M, Franco A, Maltoni D (2019) Decoupling texture blending and shape warping in face morphing. In: 2019 international conference of the biometrics special interest group (BIOSIG)"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Phillips PJ, Flynn PJ, Scruggs T, Bowyer KW, Chang J, Hoffman K, Marques J, Min J, Worek W (2005) Overview of the face recognition grand challenge. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905), vol. 1. IEEE, pp 947\u2013954","DOI":"10.1109\/CVPR.2005.268"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Korshunov P, Araimo C, De Simone F, Velardo C, Dugelay JL, Ebrahimi T (2012) Subjective study of privacy filters in video surveillance. In: 2012 IEEE 14th international workshop on multimedia signal processing (MMSP). IEEE, pp 378\u2013382","DOI":"10.1109\/MMSP.2012.6343472"},{"key":"19_CR8","volume-title":"Automatic face anonymization in visual data: are we really well protected?","author":"Natacha Ruchaud","year":"2016","unstructured":"Ruchaud Natacha, Dugelay Jean-Luc (2016) Automatic face anonymization in visual data: are we really well protected? Algorithms and Systems, In Image Processing"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Gafni O, Wolf L, Taigman Y (2019) Live face de-identification in video. In: 2019 IEEE\/CVF international conference on computer vision (ICCV). IEEE, pp 9377\u20139386","DOI":"10.1109\/ICCV.2019.00947"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Antipov G, Baccouche M, Dugelay JL (2017) Face aging with conditional generative adversarial networks. In: 2017 IEEE international conference on image processing (ICIP). IEEE, pp 2089\u20132093","DOI":"10.1109\/ICIP.2017.8296650"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the IEEE conference on computer vision and pattern recognition. IEEE, pp 1867\u20131874","DOI":"10.1109\/CVPR.2014.241"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Vlasic D, Brand M, Pfister H, Popovic J (2005) Face transfer with multilinear models. In: SIGGRAPH 2005","DOI":"10.1145\/1186822.1073209"},{"issue":"4","key":"19_CR13","first-page":"1","volume":"33","author":"Chen Cao","year":"2014","unstructured":"Cao Chen, Hou Qiming, Zhou Kun (2014) Displaced dynamic expression regression for real-time facial tracking and animation. ACM Trans Graph (TOG) 33(4):1\u201310","journal-title":"ACM Trans Graph (TOG)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Jeni LA, Cohn JF, Kanade T (2015) Dense 3d face alignment from 2d videos in real-time. In: 2015 11th IEEE international conference and workshops on automatic face and gesture recognition (FG), vol 1. IEEE, pp 1\u20138","DOI":"10.1109\/FG.2015.7163142"},{"issue":"6","key":"19_CR15","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/2816795.2818056","volume":"34","author":"Justus Thies","year":"2015","unstructured":"Thies Justus, Zollh\u00f6fer Michael, Nie\u00dfner Matthias, Valgaerts Levi, Stamminger Marc, Theobalt Christian (2015) Real-time expression transfer for facial reenactment. ACM Trans. Graph. 34(6):183\u20131","journal-title":"ACM Trans. Graph."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Thies J, Zollh\u00f6fer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2face: real-time face capture and reenactment of rgb videos. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Averbuch-Elor H, Cohen-Or D, Kopf J, Cohen MF (2017) Bringing portraits to life. ACM Trans Graph (TOG) 36:1\u201313","DOI":"10.1145\/3130800.3130818"},{"key":"19_CR18","unstructured":"Liu MY, Breuel T, Kautz J (2017) Unsupervised image-to-image translation networks. In: NIPS"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. IEEE, pp 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"19_CR20","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks. arXiv:1406.2661"},{"key":"19_CR21","unstructured":"Siarohin A, Lathuili\u00e8re S, Tulyakov S, Ricci E, Sebe N (2020) First order motion model for image animation. arXiv:2003.00196"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Li Y, Chang MC, Lyu S (2018) In ictu oculi: exposing ai created fake videos by detecting eye blinking. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu S (2019) Exposing deep fakes using inconsistent head poses. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Amerini I, Galteri L, Caldelli R, Del Bimbo A (2019) Deepfake video detection through optical flow based cnn. In: 2019 IEEE\/CVF international conference on computer vision workshop (ICCVW). IEEE, pp 1205\u20131207","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"19_CR25","unstructured":"Li Y, Lyu S (2019) Exposing deepfake videos by detecting face warping artifacts. arXiv:1811.00656"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Guera D, Delp EJ (2018) Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1\u20136","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"19_CR27","unstructured":"Lima O, Franklin S, Basu S, Karwoski B, George A (2020) Deepfake detection using spatiotemporal convolutional networks. arXiv:2006.14749"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Kumar P, Vatsa M, Singh R (2020) Detecting face2face facial reenactment in videos. In: 2020 IEEE winter conference on applications of computer vision (WACV). IEEE, pp 2578\u20132586","DOI":"10.1109\/WACV45572.2020.9093628"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Megahed A, Han Q (2020) Face2face manipulation detection based on histogram of oriented gradients. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1260\u20131267","DOI":"10.1109\/TrustCom50675.2020.00169"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision. IEEE, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Neekhara P, Dolhansky B, Bitton J, Ferrer CC (2020) Adversarial threats to deepfake detection: a practical perspective. arXiv:2011.09957","DOI":"10.1109\/CVPRW53098.2021.00103"},{"issue":"2","key":"19_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"19_CR34","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/TIFS.2014.2302078","volume":"9","author":"Giovanni Chierchia","year":"2014","unstructured":"Chierchia Giovanni, Poggi Giovanni, Sansone Carlo, Verdoliva Luisa (2014) A bayesian-mrf approach for prnu-based image forgery detection. IEEE Trans Inf Forensics Secur 9(4):554\u2013567","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"19_CR35","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TIFS.2016.2636089","volume":"12","author":"Pawe\u0142 Korus","year":"2016","unstructured":"Korus Pawe\u0142, Huang Jiwu (2016) Multi-scale analysis strategies in prnu-based tampering localization. IEEE Trans Inf Forensics Secur 12(4):809\u2013824","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"19_CR36","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","volume":"7","author":"Pasquale Ferrara","year":"2012","unstructured":"Ferrara Pasquale, Bianchi Tiziano, De Rosa Alessia, Piva Alessandro (2012) Image forgery localization via fine-grained analysis of cfa artifacts. IEEE Trans Inf Forensics Secur 7(5):1566\u20131577","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"125038","DOI":"10.1109\/ACCESS.2019.2938467","volume":"7","author":"N Le","year":"2019","unstructured":"Le N, Retraint F (2019) An improved algorithm for digital image authentication and forgery localization using demosaicing artifacts. IEEE Access 7:125038\u2013125053","journal-title":"IEEE Access"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Thai TH, Retraint F, Cogranne R (2015) Generalized signal-dependent noise model and parameter estimation for natural images. Signal Process 114:164\u2013170","DOI":"10.1016\/j.sigpro.2015.02.020"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Pan X, Zhang X, Lyu S (2011) Exposing image forgery with blind noise estimation. In: Proceedings of the thirteenth ACM multimedia workshop on multimedia and security. IEEE, pp 15\u201320","DOI":"10.1145\/2037252.2037256"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Johnson MK, Farid H (2006) Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th workshop on multimedia and security. IEEE, pp 48\u201355","DOI":"10.1145\/1161366.1161376"},{"issue":"4","key":"19_CR41","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/TIFS.2010.2077628","volume":"5","author":"Yu-Feng Hsu","year":"2010","unstructured":"Hsu Yu-Feng, Chang Shih-Fu (2010) Camera response functions for image forensics: an automatic algorithm for splicing detection. IEEE Trans Inf Forensics Secur 5(4):816\u2013825","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"Chen C, McCloskey S, Yu J (2017) Image splicing detection via camera response function analysis. In: Proceedings of the IEEE conference on computer vision and pattern recognition. IEEE, pp 5087\u20135096","DOI":"10.1109\/CVPR.2017.203"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Cao G, Zhao Y, Ni R, Yu L, Tian H (2010) Forensic detection of median filtering in digital images. In: 2010 IEEE international conference on multimedia and expo. IEEE, pp 89\u201394","DOI":"10.1109\/ICME.2010.5583869"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"Cao G, Zhao Y, Ni R, Kot AC (2011) Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process Lett 18(10):603\u2013606","DOI":"10.1109\/LSP.2011.2164791"},{"issue":"6","key":"19_CR45","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2012.2218597","volume":"7","author":"Vincent Christlein","year":"2012","unstructured":"Christlein Vincent, Riess Christian, Jordan Johannes, Riess Corinna, Angelopoulou Elli (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur 7(6):1841\u20131854","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19_CR46","doi-asserted-by":"crossref","unstructured":"Wen B, Zhu Y, Subramanian R, Ng TT, Shen X, Winkler S (2016) COVERAGE-A novel database for copy-move forgery detection. In: 2016 IEEE international conference on image processing (ICIP). IEEE, pp 161\u2013165","DOI":"10.1109\/ICIP.2016.7532339"},{"issue":"5","key":"19_CR47","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TIFS.2018.2876837","volume":"14","author":"Yuanman Li","year":"2018","unstructured":"Li Yuanman, Zhou Jiantao (2018) Fast and effective image copy-move forgery detection via hierarchical feature point matching. IEEE Trans Inf Forensics Secur 14(5):1307\u20131322","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19_CR48","doi-asserted-by":"crossref","unstructured":"Mahfoudi G, Morain-Nicollier F, Retraint F, Pic MM (2019) Copy and move forgery detection using sift and local color dissimilarity maps. In: 2019 IEEE global conference on signal and information processing (GlobalSIP). IEEE, pp 1\u20135","DOI":"10.1109\/GlobalSIP45357.2019.8969355"},{"issue":"10","key":"19_CR49","doi-asserted-by":"publisher","first-page":"11823","DOI":"10.1007\/s11042-017-4829-0","volume":"77","author":"Dengyong Zhang","year":"2018","unstructured":"Zhang Dengyong, Liang Zaoshan, Yang Gaobo, Li Qingguo, Li Leida, Sun Xingming (2018) A robust forgery detection algorithm for object removal by exemplar-based image inpainting. Multimed Tools Appl 77(10):11823\u201311842","journal-title":"Multimed Tools Appl"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Mahfoudi G, Morain-Nicolier F, Retraint F, Pic MM (2020) Object-removal forgery detection through reflectance analysis. In: 2020 IEEE international symposium on signal processing and information technology (ISSPIT) (ISSPIT-2020), virtual","DOI":"10.1109\/ISSPIT51521.2020.9408870"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"Retraint F, Zitzmann C (2020) Quality factor estimation of jpeg images using a statistical model. Digital Signal Process 103:102759","DOI":"10.1016\/j.dsp.2020.102759"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"Farid H (2009) Exposing digital forgeries from jpeg ghosts. IEEE Trans Inf Forensics Secur 4(1):154\u2013160","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"19_CR53","unstructured":"Heller S, Rossetto L, Schuldt H (2018) The ps-battles dataset-an image collection for image manipulation detection. arXiv:1804.04866"},{"key":"19_CR54","doi-asserted-by":"crossref","unstructured":"Mahfoudi G, Tajini B, Retraint F, Morain-Nicolier F, Dugelay JL, Pic MM (2019) DEFACTO: image and face manipulation dataset. In: 2019 27th European signal processing conference (EUSIPCO). IEEE, pp 1\u20135","DOI":"10.23919\/EUSIPCO.2019.8903181"},{"key":"19_CR55","doi-asserted-by":"crossref","unstructured":"Novozamsky A, Mahdian B, Saic S (2020) IMD2020: a large-scale annotated dataset tailored for detecting manipulated images. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops. IEEE, pp 71\u201380","DOI":"10.1109\/WACVW50321.2020.9096940"},{"key":"19_CR56","doi-asserted-by":"crossref","unstructured":"Hsu Y-F, Chang SF (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. In: 2006 IEEE international conference on multimedia and expo. IEEE, pp 549\u2013552","DOI":"10.1109\/ICME.2006.262447"},{"issue":"3","key":"19_CR57","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"Irene Amerini","year":"2011","unstructured":"Amerini Irene, Ballan Lamberto, Caldelli Roberto, Del Bimbo Alberto, Serra Giuseppe (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19_CR58","doi-asserted-by":"crossref","unstructured":"Dong J, Wang W, Tan T (2013) Casia image tampering detection evaluation database. In: 2013 IEEE China summit and international conference on signal and information processing. IEEE, pp 422\u2013426","DOI":"10.1109\/ChinaSIP.2013.6625374"},{"key":"19_CR59","unstructured":"Biometix dataset. https:\/\/www.linkedin.com\/pulse\/new-face-morphing-dataset-vulnerability-research-ted-dunstone. Last Accessed 22 Feb 2021"},{"key":"19_CR60","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2017) Two-stream neural networks for tampered face detection. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1831\u20131839","DOI":"10.1109\/CVPRW.2017.229"},{"key":"19_CR61","doi-asserted-by":"crossref","unstructured":"Guan H, Kozak M, Robertson E, Lee Y, Yates AN, Delgado A, Zhou D, Kheyrkhah T, Smith J, Fiscus J (2019) MFC datasets: large-scale benchmark datasets for media forensic challenge evaluation. In: 2019 IEEE winter applications of computer vision workshops (WACVW). IEEE, pp 63\u201372","DOI":"10.1109\/WACVW.2019.00018"},{"key":"19_CR62","doi-asserted-by":"crossref","unstructured":"Qadir G, Yahaya S, Ho AT (2012) Surrey university library for forensic analysis (sulfa) of video content. In: IET conference on image processing (IPR 2012). IEEE, pp 1\u20136","DOI":"10.1049\/cp.2012.0422"},{"key":"19_CR63","doi-asserted-by":"crossref","unstructured":"Al-Sanjary OI, Ahmed AA, Sulong G (2016) Development of a video tampering dataset for forensic investigation. Forensic Sci Int 266:565\u2013572","DOI":"10.1016\/j.forsciint.2016.07.013"},{"key":"19_CR64","unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Canton Ferrer C (2020) The deepfake detection challenge dataset. arXiv:2006.07397"},{"key":"19_CR65","doi-asserted-by":"crossref","unstructured":"Villalba LJ, Orozco AL, Corripio JR, Hernandez-Castro J (2017) A PNRU-based counter-forensic method to manipulate smartphone image source identification techniques. Future Gener Comput Syst 76:418\u2013427","DOI":"10.1016\/j.future.2016.11.007"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"Chuang WH, Wu M (2012) Robustness of color interpolation identification against anti-forensic operations. In: International workshop on information hiding. Springer, pp 16\u201330","DOI":"10.1007\/978-3-642-36373-3_2"},{"key":"19_CR67","doi-asserted-by":"crossref","unstructured":"Stamm MC, Tjoa SK, Lin WS, Liu KR (2010) Undetectable image tampering through jpeg compression anti-forensics. In: 2010 IEEE international conference on image processing. IEEE, pp 2109\u20132112","DOI":"10.1109\/ICIP.2010.5652553"},{"issue":"1","key":"19_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-5281-2013-18","volume":"2013","author":"Irene Amerini","year":"2013","unstructured":"Amerini Irene, Barni Mauro, Caldelli Roberto, Costanzo Andrea (2013) Counter-forensics of sift-based copy-move detection by means of keypoint classification. EURASIP J Image Video Process 2013(1):1\u201317","journal-title":"EURASIP J Image Video Process"},{"key":"19_CR69","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. CoRR. arXiv:1312.6199"},{"key":"19_CR70","doi-asserted-by":"crossref","unstructured":"Hussain S, Neekhara P, Jere M, Koushanfar F, McAuley J (2020) Adversarial deepfakes: evaluating vulnerability of deepfake detectors to adversarial examples. arXiv:2002.12749","DOI":"10.1109\/WACV48630.2021.00339"},{"key":"19_CR71","doi-asserted-by":"crossref","unstructured":"Carlini N, Farid H (2020) Evading deepfake-image detectors with white- and black-box attacks. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 2804\u20132813","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"19_CR72","doi-asserted-by":"crossref","unstructured":"Ruiz N, Bargal SA, Sclaroff S (2020) Disrupting deepfakes: adversarial attacks against conditional image translation networks and facial manipulation systems. In: ECCV workshops 2020","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"19_CR73","doi-asserted-by":"crossref","unstructured":"Lee CF, Shen JJ, Hsu FW (2019) A survey of semi-fragile watermarking authentication. In: Jeng-Shyang P, Akinori I, Pei-Wei T, Lakhmi CJ (eds) Recent advances in intelligent information hiding and multimedia signal processing. Springer International Publishing, Cham, pp 264\u2013271","DOI":"10.1007\/978-3-030-03745-1_33"},{"key":"19_CR74","doi-asserted-by":"crossref","unstructured":"Pic MM, Ouddan A (2017) Photometrix$$^{\\rm {TM}}$$: a digital seal for offline identity picture authentication. In: European intelligence and security informatics conference (EISIC). IEEE","DOI":"10.1109\/EISIC.2017.34"},{"key":"19_CR75","unstructured":"Pic MM, Mahfoudi G, Trabelsi A (2019) A phygital vector for identity, robust to morphing. In: Digital document security (DDS2019)"},{"key":"19_CR76","unstructured":"R\u00e9f\u00e9rentiel d\u2019exigences pvid (v1.0). https:\/\/www.ssi.gouv.fr\/uploads\/2020\/11\/anssi_pvid_referentiel_exigences-v1.0.pdf. Last Accessed 22 Feb 2021"},{"key":"19_CR77","unstructured":"Remote id proofing. https:\/\/www.enisa.europa.eu\/publications\/enisa-report-remote-id-proofing\/at_download\/fullReport. Last Accessed 22 Feb 2021"},{"key":"19_CR78","unstructured":"Technical guideline tr-03147 assurance level assessment of procedures for identity verification of natural persons. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TR03147\/TR03147.pdf. Last Accessed 22 Feb 2021"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Digital Face Manipulation and Detection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87664-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T16:07:28Z","timestamp":1706371648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87664-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030876630","9783030876647"],"references-count":78,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87664-7_19","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}