{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:46:47Z","timestamp":1743022007809,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031565823"},{"type":"electronic","value":"9783031565830"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56583-0_6","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:02:23Z","timestamp":1712034143000},"page":"79-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SHIELD: A Specialized Dataset for\u00a0Hybrid Blind Forensics of\u00a0World Leaders"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2850-5397","authenticated-orcid":false,"given":"Qingran","family":"Lin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6790-6604","authenticated-orcid":false,"given":"Xiang","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3024-0983","authenticated-orcid":false,"given":"Beilin","family":"Chu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4192-8054","authenticated-orcid":false,"given":"Renying","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7031-1440","authenticated-orcid":false,"given":"Xianhao","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6698-5390","authenticated-orcid":false,"given":"Yuzhe","family":"Mao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9657-0854","authenticated-orcid":false,"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2642-6005","authenticated-orcid":false,"given":"Weike","family":"You","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"6_CR1","unstructured":"Amazon rekognition: Automate your image and video analysis with machine learning. https:\/\/aws.amazon.com\/cn\/rekognition\/. Accessed 11 Oct 2022"},{"key":"6_CR2","unstructured":"Hillary Clinton impersonator teresa barnwell on vibe with sinbad. https:\/\/www.youtube.com\/watch?v=r-lKbeOg0ro. Accessed 11 Oct 2022"},{"key":"6_CR3","unstructured":"Life as donald trump, hillary clinton impersonators. https:\/\/www.youtube.com\/watch?v=bBl67bYAJm8 &t=113s. Accessed 11 Oct 2022"},{"key":"6_CR4","unstructured":"Microsoft azure cognitive services: an AI service that analyzes content in images and video. https:\/\/azure.microsoft.com\/en-us\/products\/cognitive-services\/computer-vision\/#overview. Accessed 11 Oct 2022"},{"key":"6_CR5","unstructured":"A nixon deepfake, a \u2018moon disaster\u2019 speech and an information ecosystem at risk. https:\/\/www.scientificamerican.com\/article\/a-nixon-deepfake-a-moon-disaster-speech-and-an-information-ecosystem-at-risk1\/. Accessed 11 Oct 2022"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: WIFS, pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., El-Gaaly, T., Lim, S.: Detecting deep-fake videos from appearance and behavior. In: WIFS, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/WIFS49906.2020.9360904"},{"key":"6_CR8","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: CVPR Workshops, pp. 38\u201345. Computer Vision Foundation\/IEEE (2019)"},{"key":"6_CR9","unstructured":"Boh\u00e1cek, M., Farid, H.: Protecting president zelenskyy against deep fakes. CoRR abs\/2206.12043 (2022)"},{"key":"6_CR10","unstructured":"Castillo, M.: Fake video news is coming, and this clip of Obama \u2018insulting\u2019 Trump shows how dangerous it could be. https:\/\/www.cnbc.com\/2018\/04\/17\/jordan-peele-buzzfeed-psa-edits-obama-saying-things-he-never-said.html. Accessed 11 Oct 2022"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: CVPR, pp. 1800\u20131807. IEEE Computer Society (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., R\u00f6ssler, A., Thies, J., Nie\u00dfner, M., Verdoliva, L.: Id-reveal: identity-aware deepfake video detection. In: ICCV, pp. 15088\u201315097. IEEE (2021)","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Das, S., Seferbekov, S.S., Datta, A., Islam, M.S., Amin, M.R.: Towards solving the deepfake problem : an analysis on improving deepfake detection using dynamic face augmentation. In: ICCVW, pp. 3769\u20133778. IEEE (2021)","DOI":"10.1109\/ICCVW54120.2021.00421"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: CVPR, pp. 4690\u20134699. Computer Vision Foundation\/IEEE (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Zhou, Y., Yu, J., Kotsia, I., Zafeiriou, S.: Retinaface: Single-stage dense face localisation in the wild. CoRR abs\/1905.00641 (2019)","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"6_CR16","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Canton-Ferrer, C.: The deepfake detection challenge (DFDC) preview dataset. CoRR abs\/1910.08854 (2019)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Dong, X., et al.: Protecting celebrities from deepfake with identity consistency transformer. In: CVPR, pp. 9458\u20139468. IEEE (2022)","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778. IEEE Computer Society (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-99579-3_21","volume-title":"Speech and Computer","author":"F Hernandez","year":"2018","unstructured":"Hernandez, F., Nguyen, V., Ghannay, S., Tomashenko, N., Est\u00e8ve, Y.: TED-LIUM 3: twice as much data and corpus repartition for experiments on speaker adaptation. In: Karpov, A., Jokisch, O., Potapova, R. (eds.) SPECOM 2018. LNCS (LNAI), vol. 11096, pp. 198\u2013208. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99579-3_21"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Huang, J., Wang, X., Du, B., Du, P., Xu, C.: Deepfake MNIST+: a deepfake facial animation dataset. In: ICCVW, pp. 1973\u20131982. IEEE (2021)","DOI":"10.1109\/ICCVW54120.2021.00224"},{"key":"6_CR21","unstructured":"Khalid, H., Tariq, S., Kim, M., Woo, S.S.: Fakeavceleb: a novel audio-video multimodal deepfake dataset. In: NeurIPS Datasets and Benchmarks (2021)"},{"key":"6_CR22","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection. CoRR abs\/1812.08685 (2018)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Kwon, P., You, J., Nam, G., Park, S., Chae, G.: Kodf: a large-scale korean deepfake detection dataset. In: ICCV, pp. 10724\u201310733. IEEE (2021)","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Le, T., Nguyen, H.H., Yamagishi, J., Echizen, I.: Openforensics: large-scale challenging dataset for multi-face forgery detection and segmentation in-the-wild. In: ICCV, pp. 10097\u201310107. IEEE (2021)","DOI":"10.1109\/ICCV48922.2021.00996"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: CVPR, pp. 6458\u20136467, Computer Vision Foundation\/IEEE (2021)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M., Lyu, S.: In ictu oculi: exposing AI generated fake face videos by detecting eye blinking. CoRR abs\/1806.02877 (2018)","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: a large-scale challenging dataset for deepfake forensics. In: CVPR, pp. 3204\u20133213. Computer Vision Foundation\/IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: WACV Workshops, pp. 83\u201392. IEEE (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Prajwal, K.R., Mukhopadhyay, R., Namboodiri, V.P., Jawahar, C.V.: A lip sync expert is all you need for speech to lip generation in the wild. In: ACM Multimedia, pp. 484\u2013492. ACM (2020)","DOI":"10.1145\/3394171.3413532"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-58610-2_6","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Qian","year":"2020","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12357, pp. 86\u2013103. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: ICCV, pp. 1\u201311. IEEE (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"6_CR32","unstructured":"Siarohin, A., Lathuili\u00e8re, S., Tulyakov, S., Ricci, E., Sebe, N.: First order motion model for image animation. In: NeurIPS, pp. 7135\u20137145 (2019)"},{"key":"6_CR33","unstructured":"Tan, M., Le, Q.V.: Efficientnet: rethinking model scaling for convolutional neural networks. In: ICML. Proceedings of Machine Learning Research, vol. 97, pp. 6105\u20136114. PMLR (2019)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. 38(4), 66:1\u201366:12 (2019)","DOI":"10.1145\/3306346.3323035"},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/3292039","volume":"62","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of RGB videos. Commun. ACM 62(1), 96\u2013104 (2019)","journal-title":"Commun. ACM"},{"key":"6_CR36","unstructured":"torzdf: Faceswap. https:\/\/github.com\/deepfakes\/faceswap. Accessed 11 Oct 2022"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP, pp. 8261\u20138265. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.: Wilddeepfake: a challenging real-world dataset for deepfake detection. In: ACM Multimedia, pp. 2382\u20132390. ACM (2020)","DOI":"10.1145\/3394171.3413769"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56583-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T10:03:50Z","timestamp":1724925830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56583-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031565823","9783031565830"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56583-0_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}