{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T11:48:06Z","timestamp":1767959286522,"version":"3.49.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031429903","type":"print"},{"value":"9783031429910","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42991-0_9","type":"book-chapter","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T12:02:32Z","timestamp":1697630552000},"page":"161-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deepfake Detection Using Multiple Facial Features"],"prefix":"10.1007","author":[{"given":"Xinzhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Duohe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhitong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhenchao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junye","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,19]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"D. Afchar, V. Nozick, J. Yamagishi and I. Echizen, Mesonet: A compact facial video forgery detection network, Proceedings of the IEEE International Workshop on Information Forensics and Security, 2018.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"9_CR2","unstructured":"S. Agarwal, H. Farid, Y. Gu, M. He, K. Nagano and H. Li, Protecting world leaders against deep fakes, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 38\u201345, 2019."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"J. Bappy, A. Roy-Chowdhury, J. Bunk, L. Nataraj and B. Manjunath, Exploiting spatial structure for localizing manipulated image regions, Proceedings of the IEEE International Conference on Computer Vision, pp. 4980\u20134989, 2017.","DOI":"10.1109\/ICCV.2017.532"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"R. Chesney and D. Citron, Deep fakes: A looming challenge for privacy, democracy and national security, California Law Review, vol. 107, pp. 1753\u20131820, 2019.","DOI":"10.2139\/ssrn.3213954"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"F. Chollet, Xception: Deep learning with depthwise-separable convolutions, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1801\u20131807, 2017.","DOI":"10.1109\/CVPR.2017.195"},{"key":"9_CR6","unstructured":"D. Citron, How deepfakes undermine truth and threaten democracy, presented at TEDSummit 2019, 2019."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"D. Cozzolino, D. Gragnaniello and L. Verdoliva, Image forgery detection through residual-based local descriptors and block-matching, Proceedings of the IEEE International Conference on Image Processing, pp. 5297\u20135301, 2014.","DOI":"10.1109\/ICIP.2014.7026072"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"D. Cozzolino, A. Rossler, J. Thies, M. Niessner and L. Verdoliva, ID-Reveal: Identity-aware deepfake video detection, Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15088\u201315097, 2021.","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"X. Cun and C. Pun, Image splicing localization via semi-global network and fully-connected conditional random fields, Proceedings of the Fifteenth European Conference on Computer Vision Workshops, Part II, pp. 252\u2013266, 2018.","DOI":"10.1007\/978-3-030-11012-3_22"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"D. Guerra and E. Delp, Deepfake video detection using recurrent neural networks, Proceedings of the Fifteenth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"A. Houssaini, M. Sabri, H. Qjidaa and A. Aarab, Real-time driver\u2019s hypovigilance detection using facial landmarks, Proceedings of the International Conference on Wireless Technologies, Embedded and Intelligent Systems, 2019.","DOI":"10.1109\/WITS.2019.8723768"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"M. Huh, A. Liu, A. Owens and A. Efros, Fighting fake news: Image splice detection via learned self-consistency, Proceedings of the Fifteenth European Conference on Computer Vision, Part XI, pp. 106\u2013124, 2018.","DOI":"10.1007\/978-3-030-01252-6_7"},{"key":"9_CR13","unstructured":"T. Karras, T. Aila, S. Laine and J. Lehtinen, Progressive Growing of GANs for Improved Quality, Stability and Variation, arXiv: 1710.10196v3 (arxiv.org\/abs\/1710.10196v3), 2018."},{"key":"9_CR14","unstructured":"P. Korshunov and S. Marcel, Deepfakes: A New Threat to Face Recognition? Assessment and Detection, arXiv: 1812.08685v1 (arxiv.org\/abs\/1812.08685v1), 2018."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"P. Korus and J. Huang, Multi-scale analysis strategies in PRNU-based tampering localization, IEEE Transactions on Information Forensics and Security, vol 12(4), pp. 809\u2013824, 2017.","DOI":"10.1109\/TIFS.2016.2636089"},{"key":"9_CR16","unstructured":"M. Kowalski, FaceSwap, GitHub (github.com\/MarekKowalski\/FaceSwap), 2021."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"L. Li, J. Bao, T. Zhang, H. Yang, D. Chen, F. Wen and B. Guo, Face X-Ray for more general face forgery detection, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5000\u20135009, 2020.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Y. Li, M. Chang and S. Lyu, In ictu oculi: Exposing AI-created fake videos by detecting eye blinking, Proceedings of the IEEE International Workshop on Information Forensics and Security, 2018.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"9_CR19","unstructured":"Y. Li and S. Lyu, Exposing deepfake videos by detecting face warping artifacts, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 46\u201352, 2019."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Y. Li, X. Yang, P. Sun, H. Qi and S. Lyu, Celeb-DF: A large-scale challenging dataset for deepfake forensics, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3204\u20133213, 2020.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"9_CR21","unstructured":"S. Lu, faceswap-GAN, GitHub (github.com\/shaoanlu\/faceswap-GAN), 2022."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"F. Matern, C. Riess and M. Stamminger, Exploiting visual artifacts to expose deepfakes and face manipulations, Proceedings of the IEEE Winter Applications of Computer Vision Workshops, pp. 83\u201392, 2019.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"9_CR23","unstructured":"H. Nguyen, F. Fang, J. Yamagishi and I. Echizen, Multi-Task Learning for Detecting and Segmenting Manipulated Facial Images and Videos, arXiv: 1906.06876v1 (arxiv.org\/abs\/1906.06876v1), 2019."},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"A. Rossler, D. Cozzolino, L. Verdoliva, J. Thies and M. Niessner, FaceForensics++: Learning to detect manipulated facial images, Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311, 2019.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"9_CR25","unstructured":"E. Sabir, J. Cheng, A. Jaiswal, W. AbdAlmageed, I. Masi and P. Natarajan, Recurrent convolutional strategies for face manipulation detection in videos, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 80\u201387, 2019."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"M. Sheng, Z. Ma, H. Jia, Q. Mao and M. Dong, Face aging with conditional generative adversarial network guided by ranking-CNN, Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval, pp. 314\u2013319, 2020.","DOI":"10.1109\/MIPR49039.2020.00071"},{"key":"9_CR27","unstructured":"T. Soukupova and J. Cech, Real-time eye blink detection using facial landmarks, Proceedings of the Computer Vision Workshop (vision.fe.uni-lj.si\/cvww2016\/proceedings\/papers\/05.pdf), 2016."},{"key":"9_CR28","unstructured":"K. Sun, Y. Zhao, B. Jiang, T. Cheng, B. Xiao, D. Liu, Y. Mu, X. Wang, W. Liu and J. Wang, High-Resolution Representations for Labeling Pixels and Regions, arXiv: 1904.04514v1 (arxiv.org\/abs\/1904.04514v1), 2019."},{"key":"9_CR29","unstructured":"Z. Sun, Y. Han, Z. Hua, N. Ruan and W. Jia, Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features, arXiv: 2104.04480v1 (arxiv.org\/abs\/2104.04480v1), 2021."},{"key":"9_CR30","unstructured":"M. Tan and Q. Le, EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks, arXiv: 1905.11946v5 (arxiv.org\/abs\/1905.11946v5), 2020."},{"key":"9_CR31","unstructured":"M. Tarasiou and S. Zafeiriou, Extracting Deep Local Features to Detect Manipulated Images of Human Faces, arXiv: 1911.13269v2 (arxiv.org\/abs\/1911.13269v2), 2020."},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"J. Thies, M. Zollhofer, M. Stamminger, C. Theobalt and M. Niessner, Face2Face: Real-time face capture and reenactment of RGB videos, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2387\u20132395, 2016.","DOI":"10.1109\/CVPR.2016.262"},{"key":"9_CR33","unstructured":"R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales and J. Ortega-Garcia, DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection, arXiv: 2001.00179v3 (arxiv.org\/abs\/2001.00179v3), 2020."},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"X. Yang, Y. Li and S. Lyu, Exposing deep fakes using inconsistent head poses, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8261\u20138265, 2019.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"9_CR35","unstructured":"X. Yang, Y. Li, H. Qi and S. Lyu, Exposing GAN-Synthesized Faces Using Landmark Locations, arXiv: 1904.00167v1 (arxiv.org\/abs\/1904.00167v1), 2019."},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"P. Zhou, X. Han, V. Morariu and L. Davis, Learning rich features for image manipulation detection, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1053\u20131061, 2018.","DOI":"10.1109\/CVPR.2018.00116"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42991-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:35:05Z","timestamp":1767954905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42991-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031429903","9783031429910"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42991-0_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 January 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}