{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:10:01Z","timestamp":1748074201614,"version":"3.41.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031893599","type":"print"},{"value":"9783031893605","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-89360-5_15","type":"book-chapter","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:27:53Z","timestamp":1748071673000},"page":"249-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pixel-Level Face Correction Task for\u00a0More Generalized Deepfake Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6790-6604","authenticated-orcid":false,"given":"Xiang","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2642-6005","authenticated-orcid":false,"given":"Weike","family":"You","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2850-5397","authenticated-orcid":false,"given":"Qingran","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linna","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., Fried, O., Agrawala, M.: Detecting deep-fake videos from phoneme-viseme mismatches. In: CVPR Workshops, pp. 2814\u20132822 (2020)","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Amerini, I., Caldelli, R.: Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos. In: IH &MMSec, pp. 97\u2013102. ACM (2020)","DOI":"10.1145\/3369412.3395070"},{"key":"15_CR3","unstructured":"Bao, H., Dong, L., Piao, S., Wei, F.: Beit: BERT pre-training of image transformers. In: Proceedings of International Conference on Learning Representations (ICLR) (2022)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Binh, L.M., Woo, S.S.: ADD: frequency attention and multi-view based knowledge distillation to detect low-quality compressed deepfake images. In: AAAI, pp. 122\u2013130 (2022)","DOI":"10.1609\/aaai.v36i1.19886"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cai, Z., et al.: Marlin: masked autoencoder for facial video representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1493\u20131504 (2023)","DOI":"10.1109\/CVPR52729.2023.00150"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TAFFC.2014.2336244","volume":"5","author":"H Cao","year":"2014","unstructured":"Cao, H., Cooper, D.G., Keutmann, M.K., Gur, R.C., Nenkova, A., Verma, R.: CREMA-D: crowd-sourced emotional multimodal actors dataset. IEEE Trans. Affect. Comput. 5(4), 377\u2013390 (2014)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4103\u20134112 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"15_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109179","volume":"135","author":"H Chen","year":"2023","unstructured":"Chen, H., Li, Y., Lin, D., Li, B., Wu, J.: Watching the big artifacts: exposing deepfake videos via bi-granularity artifacts. Pattern Recognit. 135, 109179 (2023)","journal-title":"Pattern Recognit."},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.1109\/TCSVT.2022.3209336","volume":"33","author":"H Chen","year":"2023","unstructured":"Chen, H., Lin, Y., Li, B., Tan, S.: Learning features of intra-consistency and inter-diversity: keys toward generalizable deepfake detection. IEEE Trans. Circuits Syst. Video Technol. 33(3), 1468\u20131480 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., Ji, R.: Local relation learning for face forgery detection. In: AAAI, pp. 1081\u20131088 (2021)","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"15_CR11","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.E.: A simple framework for contrastive learning of visual representations. In: Proceedings of the International Conference on Machine Learning (ICML), pp. 1597\u20131607 (2020)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liu, Y., Jiang, D., Zhang, X., Dai, W., Xiong, H., Tian, Q.: SdAE: self-distillated masked autoencoder. In: Proceedings of the European Conference on Computer Vision (ECCV), vol. 13690, pp. 108\u2013124 (2022)","DOI":"10.1007\/978-3-031-20056-4_7"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1800\u20131807 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., Zisserman, A.: Voxceleb2: deep speaker recognition. In: INTERSPEECH, pp. 1086\u20131090 (2018)","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"15_CR15","unstructured":"Deepfakes: Faceswap: Deepfakes Software. https:\/\/github.com\/deepfakes\/faceswap\/. Accessed 2023"},{"key":"15_CR16","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Canton-Ferrer, C.: The deepfake detection challenge (DFDC) preview dataset. CoRR abs\/1910.08854 (2019)"},{"key":"15_CR17","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: Proceedings of International Conference on Learning Representations (ICLR) (2021)"},{"issue":"4","key":"15_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/3197517.3201357","volume":"37","author":"A Ephrat","year":"2018","unstructured":"Ephrat, A., et al.: Looking to listen at the cocktail party: a speaker-independent audio-visual model for speech separation. ACM Trans. Graph. 37(4), 112 (2018)","journal-title":"ACM Trans. Graph."},{"key":"15_CR19","unstructured":"Feichtenhofer, C., Fan, H., Li, Y., He, K.: Masked autoencoders as spatiotemporal learners. In: NeurIPS (2022)"},{"key":"15_CR20","unstructured":"Gidaris, S., Singh, P., Komodakis, N.: Unsupervised representation learning by predicting image rotations. In: ICLR (2018)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Mira, R., Petridis, S., Pantic, M.: Leveraging real talking faces via self-supervision for robust forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14930\u201314942 (2022)","DOI":"10.1109\/CVPR52688.2022.01453"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., Pantic, M.: Lips don\u2019t lie: a generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5039\u20135049 (2021)","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"He, K., Chen, X., Xie, S., Li, Y., Doll\u00e1r, P., Girshick, R.B.: Masked autoencoders are scalable vision learners. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15979\u201315988 (2022)","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.B.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), pp. 9726\u20139735 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"He, Y., et al.: Forgerynet: a versatile benchmark for comprehensive forgery analysis. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4360\u20134369 (2021)","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Hu, J., Liao, X., Liang, J., Zhou, W., Qin, Z.: Finfer: frame inference-based deepfake detection for high-visual-quality videos. In: AAAI, pp. 951\u2013959 (2022)","DOI":"10.1609\/aaai.v36i1.19978"},{"issue":"7","key":"15_CR27","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1007\/s11263-022-01606-8","volume":"130","author":"F Juefei-Xu","year":"2022","unstructured":"Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., Liu, Y.: Countering malicious deepfakes: survey, battleground, and horizon. Int. J. Comput. Vis. 130(7), 1678\u20131734 (2022)","journal-title":"Int. J. Comput. Vis."},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"83144","DOI":"10.1109\/ACCESS.2020.2988660","volume":"8","author":"T Jung","year":"2020","unstructured":"Jung, T., Kim, S., Kim, K.: Deepvision: deepfakes detection using human eye blinking pattern. IEEE Access 8, 83144\u201383154 (2020)","journal-title":"IEEE Access"},{"key":"15_CR29","unstructured":"Kowalski, M.: FaceSwap: Deep Learning for Face Swapping. https:\/\/github.com\/MarekKowalski\/FaceSwap. Accessed 2023"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M., Lyu, S.: In ictu oculi: exposing AI created fake videos by detecting eye blinking. In: WIFS, pp.\u00a01\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"15_CR31","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. In: CVPR Workshops, pp. 46\u201352 (2019)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3204\u20133213 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 772\u2013781 (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"issue":"5","key":"15_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0196391","volume":"13","author":"SR Livingstone","year":"2018","unstructured":"Livingstone, S.R., Russo, F.A.: The ryerson audio-visual database of emotional speech and song (RAVDESS): a dynamic, multimodal set of facial and vocal expressions in North American English. PLoS ONE 13(5), 1\u201335 (2018)","journal-title":"PLoS ONE"},{"key":"15_CR35","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: Proceedings of International Conference on Learning Representations (ICLR) (2019)"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: WACV Workshops, pp. 83\u201392 (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"15_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-46466-4_5","volume-title":"Computer Vision \u2013 ECCV 2016","author":"M Noroozi","year":"2016","unstructured":"Noroozi, M., Favaro, P.: Unsupervised learning of visual representations by solving jigsaw puzzles. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9910, pp. 69\u201384. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46466-4_5"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 86\u2013103 (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"15_CR40","unstructured":"Tan, M., Le, Q.V.: Efficientnet: rethinking model scaling for convolutional neural networks. In: Proceedings of the International Conference on Machine Learning (ICML), vol.\u00a097, pp. 6105\u20136114 (2019)"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. 38(4), 66:1\u201366:12 (2019)","DOI":"10.1145\/3306346.3323035"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of RGB videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2387\u20132395 (2016)","DOI":"10.1109\/CVPR.2016.262"},{"key":"15_CR43","unstructured":"Tong, Z., Song, Y., Wang, J., Wang, L.: Videomae: masked autoencoders are data-efficient learners for self-supervised video pre-training. In: NeurIPS (2022)"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Tursman, E., George, M., Kamara, S., Tompkin, J.: Towards untrusted social video verification to combat deepfakes via face geometry consistency. In: CVPR Workshops, pp. 2784\u20132793 (2020)","DOI":"10.1109\/CVPRW50498.2020.00335"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, J., Chen, B., Zeng, Z., Xia, S.: Contrastive masked autoencoders for self-supervised video hashing. In: AAAI, pp. 2733\u20132741 (2023)","DOI":"10.1609\/aaai.v37i3.25373"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Wei, C., Fan, H., Xie, S., Wu, C., Yuille, A.L., Feichtenhofer, C.: Masked feature prediction for self-supervised visual pre-training. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), pp. 14648\u201314658 (2022)","DOI":"10.1109\/CVPR52688.2022.01426"},{"key":"15_CR47","doi-asserted-by":"crossref","unstructured":"Xie, Z., et al.: Simmim: a simple framework for masked image modeling. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9643\u20139653 (2022)","DOI":"10.1109\/CVPR52688.2022.00943"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: Proceedings of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8261\u20138265 (2019)","DOI":"10.1109\/ICASSP.2019.8683164"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-89360-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:28:06Z","timestamp":1748071686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-89360-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031893599","9783031893605"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-89360-5_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubrovnik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}