{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:28:06Z","timestamp":1775737686161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031486418","type":"print"},{"value":"9783031486425","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48642-5_19","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:02:16Z","timestamp":1700902936000},"page":"197-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dataset Generation and\u00a0Study of\u00a0Deepfake Techniques"],"prefix":"10.1007","author":[{"given":"Sergio A.","family":"Falc\u00f3n-L\u00f3pez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5181-0199","authenticated-orcid":false,"given":"Antonio","family":"Robles-G\u00f3mez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2779-4042","authenticated-orcid":false,"given":"Llanos","family":"Tobarra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4089-9538","authenticated-orcid":false,"given":"Rafael","family":"Pastor-Vargas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"19_CR1","unstructured":"Avatarify. https:\/\/github.com\/alievk\/avatarify-desktop. Accessed 23 Oct 2023"},{"key":"19_CR2","unstructured":"Dall-E2. https:\/\/openai.com\/dall-e-2\/. Accessed 23 Oct 2023"},{"key":"19_CR3","unstructured":"DeepFaceLab. https:\/\/github.com\/iperov\/DeepFaceLab. Accessed 23 Oct 2023"},{"key":"19_CR4","unstructured":"FaceApp. https:\/\/play.google.com\/store\/apps\/details?id=io.faceapp&gl=ES&pli=1. Accessed 23 Oct 2023"},{"key":"19_CR5","unstructured":"Forensically. https:\/\/29a.ch\/photo-forensics. Accessed 23 Oct 2023"},{"key":"19_CR6","unstructured":"INCIBE: Deepfakes (In Spanish). https:\/\/www.incibe.es\/aprendeciberseguridad\/deepfakes. Accessed 23 Oct 2023"},{"key":"19_CR7","unstructured":"MantraNet. https:\/\/github.com\/ISICV\/ManTraNet. Accessed 23 Oct 2023"},{"key":"19_CR8","unstructured":"MesoNet. https:\/\/github.com\/DariusAf\/MesoNet. Accessed 23 Oct 2023"},{"key":"19_CR9","unstructured":"OBS Studio. https:\/\/obsproject.com\/. Accessed 23 Oct 2023"},{"key":"19_CR10","unstructured":"This Person Does Not Exist. https:\/\/this-person-does-not-exist.com\/. Accessed 23 Oct 2023"},{"key":"19_CR11","doi-asserted-by":"publisher","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE (2018). https:\/\/doi.org\/10.1109\/wifs.2018.8630761, https:\/\/doi.org\/10.1109%2Fwifs.2018.8630761","DOI":"10.1109\/wifs.2018.8630761"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.W., Kim, S., Choo, J.: StarGAN: unified generative adversarial networks for multi-domain image-to-image translation (2017). https:\/\/doi.org\/10.48550\/ARXIV.1711.09020","DOI":"10.48550\/ARXIV.1711.09020"},{"issue":"8","key":"19_CR13","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/tifs.2018.2807791","volume":"13","author":"E Gonzalez-Sosa","year":"2018","unstructured":"Gonzalez-Sosa, E., Fierrez, J., Vera-Rodriguez, R., Alonso-Fernandez, F.: Facial soft biometrics for recognition in the wild: recent works, annotation, and COTS evaluation. IEEE Trans. Inf. Forensics Secur. 13(8), 2001\u20132014 (2018). https:\/\/doi.org\/10.1109\/tifs.2018.2807791","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR14","doi-asserted-by":"publisher","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of styleGAN (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.04958","DOI":"10.48550\/ARXIV.1912.04958"},{"key":"19_CR15","doi-asserted-by":"publisher","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for DeepFake forensics (2019). https:\/\/doi.org\/10.48550\/ARXIV.1909.12962, https:\/\/arxiv.org\/abs\/1909.12962","DOI":"10.48550\/ARXIV.1909.12962"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/WIFS.2016.7823911","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"19_CR17","unstructured":"Ferreiras, S.: Photo and video manipulations detector. https:\/\/github.com\/saraferreirascf\/Photo-and-video-manipulations-detector. Accessed 23 Oct 2023"},{"key":"19_CR18","unstructured":"Sergio A. Falc\u00f3n: Deepfake Repository. https:\/\/github.com\/oigres5\/DeepfakeTFM_UNED. Accessed 23 Oct 2023"},{"key":"19_CR19","doi-asserted-by":"publisher","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures (2019). https:\/\/doi.org\/10.48550\/ARXIV.1904.12356, https:\/\/arxiv.org\/abs\/1904.12356","DOI":"10.48550\/ARXIV.1904.12356"},{"key":"19_CR20","doi-asserted-by":"publisher","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of RGB videos (2020). https:\/\/doi.org\/10.48550\/ARXIV.2007.14808, https:\/\/arxiv.org\/abs\/2007.14808","DOI":"10.48550\/ARXIV.2007.14808"},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: DeepFakes and beyond: a survey of face manipulation and fake detection (2020). https:\/\/doi.org\/10.48550\/ARXIV.2001.00179, https:\/\/arxiv.org\/abs\/2001.00179","DOI":"10.48550\/ARXIV.2001.00179"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 15th International Conference on Ubiquitous Computing &amp; Ambient Intelligence (UCAmI 2023)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48642-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T09:14:33Z","timestamp":1700903673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48642-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031486418","9783031486425"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48642-5_19","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Riviera Maya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ucami.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}