{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004440,"version":"3.40.4"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_5","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:45:33Z","timestamp":1736149533000},"page":"81-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Microposture Features and Optical Flows for Deepfake Detection"],"prefix":"10.1007","author":[{"given":"Kai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Duohe","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhenchao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhimin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junye","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"D. Afchar, V. Nozick, J. Yamagishi and I. Echizen, MesoNet: A compact facial video forgery detection network, Proceedings of the IEEE International Workshop on Information Forensics and Security, 2018.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"I. Amerini, L. Galteri, R. Caldelli and A. Del Bimbo, Deepfake video detection through optical-flow-based CNN, Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshop, pp. 1205\u20131207, 2019.","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"S. Baker and I. Matthews, Lucas-Kanade 20 years on: A unifying framework, International Journal of Computer Vision, vol. 56(3), pp. 221\u2013255, 2004.","DOI":"10.1023\/B:VISI.0000011205.11775.fd"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"T. Baltrusaitis, A. Zadeh, Y. Lim and L. Morency, OpenFace 2.0: Facial behavior analysis toolkit, Proceedings of the Thirteenth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 59\u201366, 2018.","DOI":"10.1109\/FG.2018.00019"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"F. Chollet, Xception: Deep learning with depthwise separable convolutions, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1800\u20131807, 2017.","DOI":"10.1109\/CVPR.2017.195"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"U. Ciftci, I. Demir and L. Yin, How do the hearts of deepfakes beat? Deepfake source detection via interpreting residuals with biological signals, Proceedings of the IEEE International Conference on Biometrics, 2020.","DOI":"10.1109\/IJCB48548.2020.9304909"},{"key":"5_CR7","unstructured":"D. Citron, How deepfakes undermine truth and threaten democracy, presented at TEDSummit 2019, 2019."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"T. Cootes, G. Edwards and C. Taylor, Active appearance models, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23(6), pp. 681\u2013685, 2001.","DOI":"10.1109\/34.927467"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"D. Cozzolino, A. Rossler, J. Thies, M. Niessner and L. Verdoliva, ID-Reveal: Identity-aware deepfake video detection, Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15088\u201315097, 2021.","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"5_CR10","unstructured":"D. Cristinacce and T. Cootes, Feature detection and tracking with constrained local models, Proceedings of the British Machine Vision Conference, pp. 929\u2013938, 2006."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"X. Dong, S. Yu, X. Weng, S. Wei, Y. Yang and Y. Sheikh, Supervision-by-registration: An unsupervised approach to improve the precision of facial landmark detectors, Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1360\u20131368, 2018.","DOI":"10.1109\/CVPR.2018.00045"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"S. Fernandes, S. Raj, E. Ortiz, I. Vintila, M. Salter, G. Urosevic and S. Jha, Predicting heart rate variations of deepfake videos using neural ODE, Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshop, pp. 1721\u20131729, 2019.","DOI":"10.1109\/ICCVW.2019.00213"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"D. Guera and E. Delp, Deepfake video detection using recurrent neural networks, Proceedings of the Fifteenth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"5_CR14","unstructured":"A. Haliassos, K. Vougioukas, S. Petridis and M. Pantic, Lips Don\u2019t Lie: A Generalizable and Robust Approach to Face Forgery Detection, arXiv: 2012.07657v3 (arxiv.org\/abs\/2012.07657v3), 2020."},{"key":"5_CR15","unstructured":"Y. He, B. Gan, S. Chen, Y. Zhou, G. Yin, L. Song, L. Sheng, J. Shao and Z. Lu, ForgeryNet: A Versatile Benchmark for Comprehensive Forgery Analysis, arXiv: 2103.05630v2 (arxiv.org\/abs\/2103.05630v2), 2021."},{"key":"5_CR16","unstructured":"D. King, Dlib-ml: A machine learning toolkit, Journal of Machine Learning Research, vol. 10, pp. 1755\u20131758, 2009."},{"key":"5_CR17","unstructured":"P. Korshunov and S. Marcel, Deepfakes: A New Threat to Face Recognition? Assessment and Detection, arXiv: 1812.08685v1 (arxiv.org\/abs\/1812.08685v1), 2018."},{"key":"5_CR18","unstructured":"J. Li, H. Xie, J. Li, Z. Wang and Y. Zhang, Frequency-Aware Discriminative Feature Learning Supervised by Single-Center Loss for Face Forgery Detection, arXiv: 2103.09096v1 (arxiv.org\/abs\/2103.09096v1), 2021."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"L. Li, J. Bao, T. Zhang, H. Yang, D. Chen, F. Wen and B. Guo, Face x-ray for more general face forgery detection, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001\u20135010, 2020.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Y. Li, M. Chang and S. Lyu, In ictu oculi: Exposing AI-created fake videos by detecting eye blinking, Proceedings of the IEEE International Workshop on Information Forensics and Security, 2018.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"5_CR21","unstructured":"Y. Li and S. Lyu, Exposing deepfake videos by detecting face warping artifacts, Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshop, pp. 46\u201352, 2019."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Y. Li, X. Yang, P. Sun, H. Qi and S. Lyu, Celeb-DF: A large-scale challenging dataset for deepfake forensics, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3204\u20133213, 2020.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"L. LoPresti and M. La Cascia, 3D-skeleton-based human action classification: A survey, Pattern Recognition, vol. 53(C), pp. 130\u2013147, 2016.","DOI":"10.1016\/j.patcog.2015.11.019"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"F. Matern, C. Riess and M. Stamminger, Exploiting visual artifacts to expose deepfakes and face manipulations, Proceedings of the IEEE Winter Applications of Computer Vision Workshops, pp. 83\u201392, 2019.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"T. Mittal, U. Bhattacharya, R. Chandra, A. Bera and D. Manocha, Emotions don\u2019t lie: An audio-visual deepfake detection method using affective cues, Proceedings of the Twenty-Eighth ACM International Conference on Multimedia, pp. 2823\u20132832, 2020.","DOI":"10.1145\/3394171.3413570"},{"key":"5_CR26","unstructured":"A. Rossler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies and M. Niesner, FaceForensics++: Learning to Detect Manipulated Facial Images, arXiv: 1901.08971v3 (arxiv.org\/abs\/1901.08971v3), 2019."},{"key":"5_CR27","unstructured":"E. Sabir, J. Cheng, A. Jaiswal, W. AbdAlmageed, I. Masi and P. Natarajan, Recurrent convolutional strategies for face manipulation detection in videos, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshop, pp. 80\u201387, 2019."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"D. Sun, X. Yang, M. Liu and J. Kautz, PWC-Net: CNNs for optical flow using pyramid, warping and cost volume, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8934\u20138943, 2018.","DOI":"10.1109\/CVPR.2018.00931"},{"key":"5_CR29","unstructured":"K. Sun, Y. Zhao, B. Jiang, T. Cheng, B. Xiao, D. Liu, Y. Mu, X. Wang, W. Liu and J. Wang, High-Resolution Representations for Labeling Pixels and Regions, arXiv: 1904.04514v1 (arxiv.org\/abs\/1904.04514v1), 2019."},{"key":"5_CR30","unstructured":"Z. Sun, Y. Han, Z. Hua, N. Ruan and W. Jia, Improving the Efficiency and Robustness of Deepfake Detection Through Precise Graphic Features, arXiv: 2104.04480v1 (arxiv.org\/abs\/2104.04480v1), 2021."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"J. Thies, M. Zollhofer, M. Stamminger, C. Theobalt and M. Niessner, Face2Face: Real-time face capture and reenactment of RGB videos, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2387\u20132395, 2016.","DOI":"10.1109\/CVPR.2016.262"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales and J. Ortega-Garcia, Deepfakes and beyond: A survey of face manipulation and fake detection, Information Fusion, vol. 64, pp. 131\u2013148, 2020.","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"S. Wei, V. Ramakrishna, T. Kanade and Y. Sheikh, Convolutional pose machines, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4724\u20134732, 2016.","DOI":"10.1109\/CVPR.2016.511"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"X. Xiong and F. De la Torre, Supervised descent method and its applications to face alignment, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 532\u2013539, 2013.","DOI":"10.1109\/CVPR.2013.75"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"W. Yang, S. Li, W. Ouyang, H. Li and X. Wang, Learning feature pyramids for human pose estimation, Proceedings of the IEEE International Conference on Computer Vision, pp. 1290\u20131299, 2017.","DOI":"10.1109\/ICCV.2017.144"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"X. Yang, Y. Li and S. Lyu, Exposing deepfakes using inconsistent head poses, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8261\u20138265, 2019.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"A. Zadeh, Y. Lim, T. Baltrusaitis and L. Morency, Convolutional experts constrained local model for 3D facial landmark detection, Proceedings of the IEEE Conference on Computer Vision Workshops, pp. 2519\u20132528, 2017.","DOI":"10.1109\/ICCVW.2017.296"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"E. Zhou, H. Fan, Z. Cao, Y. Jiang and Q. Yin, Extensive facial landmark localization with a coarse-to-fine convolutional network cascade, Proceedings of the IEEE Conference on Computer Vision Workshops, pp. 386\u2013391, 2013.","DOI":"10.1109\/ICCVW.2013.58"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:15:31Z","timestamp":1745320531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}