{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T11:51:48Z","timestamp":1769773908917,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032159861","type":"print"},{"value":"9783032159878","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15987-8_38","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:27:36Z","timestamp":1769718456000},"page":"571-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Face-Obfuscated Deepfake Detection by\u00a0Learning Spatial and\u00a0High-Frequency Generative Artifacts"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o Rabello","family":"Alvim","sequence":"first","affiliation":[]},{"given":"Miguel D. S.","family":"Wanderley","sequence":"additional","affiliation":[]},{"given":"Italo Duarte","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Itallo","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Matheus Paz","family":"Gamba","sequence":"additional","affiliation":[]},{"given":"K\u00e1tia","family":"Poloni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed, S.R., Sonu\u00e7, E., Ahmed, M.R., Duru, A.D.: Analysis survey on deepfake detection and recognition with convolutional neural networks. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp.\u00a01\u20137. https:\/\/doi.org\/10.1109\/HORA55278.2022.9799858, https:\/\/ieeexplore.ieee.org\/document\/9799858\/?arnumber=9799858","DOI":"10.1109\/HORA55278.2022.9799858"},{"key":"38_CR2","unstructured":"Amazon Web Services: Amazon SageMaker Studio (2020). https:\/\/aws.amazon.com\/sagemaker\/studio\/. Accessed 09 May 2025"},{"key":"38_CR3","doi-asserted-by":"publisher","unstructured":"Bl\u00fcmer, S., Steinebach, M., Frick, R.A., Bunzel, N.: Detection of deepfakes using background-matching (2023). https:\/\/doi.org\/10.1145\/3581783.3600480","DOI":"10.1145\/3581783.3600480"},{"key":"38_CR4","doi-asserted-by":"publisher","unstructured":"Convertini, V.N., Impedovo, D., Lopez, U., Pirlo, G., Sterlicchio, G.: Discrete Fourier transform in unmasking deepfake images: a comparative study of stylegan creations. Information 15(11) (2024). https:\/\/doi.org\/10.3390\/info15110711, https:\/\/www.mdpi.com\/2078-2489\/15\/11\/711","DOI":"10.3390\/info15110711"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.: On the detection of digital face manipulation (2020). https:\/\/arxiv.org\/abs\/1910.01717","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"38_CR6","doi-asserted-by":"publisher","unstructured":"Daubechies, I.: Ten lectures on wavelets. Soc. Ind. Appl. Math. (1992). https:\/\/doi.org\/10.1137\/1.9781611970104, https:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9781611970104","DOI":"10.1137\/1.9781611970104"},{"key":"38_CR7","unstructured":"Deng, J., Guo, J., Zhou, Y., Yu, J., Kotsia, I., Zafeiriou, S.: Retinaface: single-stage dense face localisation in the wild (2019). https:\/\/arxiv.org\/abs\/1905.00641"},{"key":"38_CR8","unstructured":"Durall, R., Keuper, M., Keuper, J.: Watch your up-convolution: CNN based generative deepfake image detection (2020)"},{"key":"38_CR9","unstructured":"Frank, J., Eisenhofer, T., H\u00fcllermeier, E., Brox, T.: Leveraging frequency analysis for deep fake image recognition (2020)"},{"key":"38_CR10","unstructured":"Goodfellow, I., et al.: Generative adversarial nets (2014)"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Harris, C.R., et al.: Array programming with numpy. Nature 585(7825), 357\u2013362 (2020). https:\/\/doi.org\/10.1038\/s41586-020-2649-2","DOI":"10.1038\/s41586-020-2649-2"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks (2019). https:\/\/arxiv.org\/abs\/1812.04948","DOI":"10.1109\/CVPR.2019.00453"},{"key":"38_CR14","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? Assessment and detection. arXiv preprint arXiv:1812.08685 (2018)"},{"key":"38_CR15","unstructured":"Kundu, R., Subramanyam, A., Manjunath, B., Nguyen, H.H., Liu, Y., Nguyen, T.Q.: Towards a universal synthetic video detector: from face or background manipulations to fully AI-generated content (unite). arXiv preprint arXiv:2401.12345 (2024). https:\/\/arxiv.org\/abs\/2401.12345"},{"issue":"9","key":"38_CR16","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.3390\/math11092031","volume":"11","author":"EG Lee","year":"2023","unstructured":"Lee, E.G., Lee, I., Yoo, S.: Cluecatcher: catching domain-wise independent clues for deepfake detection. Mathematics 11(9), 2031 (2023). https:\/\/doi.org\/10.3390\/math11092031","journal-title":"Mathematics"},{"key":"38_CR17","doi-asserted-by":"publisher","unstructured":"Lee, G.R., Gommers, R., Waselewski, F.N., Wohlfahrt, K., O\u2019Leary, A.: Pywavelets: a Python package for wavelet analysis. J. Open Source Softw. 4(36), 1237 (2019). https:\/\/doi.org\/10.21105\/joss.01237","DOI":"10.21105\/joss.01237"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, S., Li, P., Lyu, S.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection (2021)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: ICCV, pp. 3730\u20133738. IEEE Computer Society (2015). http:\/\/dblp.uni-trier.de\/db\/conf\/iccv\/iccv2015.html#LiuLWT15","DOI":"10.1109\/ICCV.2015.425"},{"key":"38_CR20","doi-asserted-by":"publisher","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","volume":"10","author":"A Malik","year":"2022","unstructured":"Malik, A., Kuribayashi, M., Abdullahi, S.M., Khan, A.N.: Deepfake detection for human face images and videos: a survey. IEEE Access 10, 18757\u201318775 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3151186","journal-title":"IEEE Access"},{"issue":"7","key":"38_CR21","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"S Mallat","year":"1989","unstructured":"Mallat, S.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674\u2013693 (1989). https:\/\/doi.org\/10.1109\/34.192463","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"38_CR22","doi-asserted-by":"publisher","unstructured":"Neves, J.C., Tolosana, R., Vera-Rodriguez, R., Lopes, V., Proen\u00e7a, H., Fierrez, J.: GANprintR: improved fakes and evaluation of the state of the art in face manipulation detection 14(5), 1038\u20131048. https:\/\/doi.org\/10.1109\/JSTSP.2020.3007250, http:\/\/arxiv.org\/abs\/1911.05351","DOI":"10.1109\/JSTSP.2020.3007250"},{"key":"38_CR23","volume":"8","author":"H Nguyen","year":"2019","unstructured":"Nguyen, H., Yamagishi, J., Echizen, I.: Deep learning-based face manipulation detection and its applications. APSIPA Trans. Sig. Inf. Process. 8, e23 (2019)","journal-title":"APSIPA Trans. Sig. Inf. Process."},{"key":"38_CR24","doi-asserted-by":"publisher","unstructured":"Nirkin, Y., Wolf, L., Keller, Y., Hassner, T.: Deepfake detection based on discrepancies between faces and their context, 43, 4119\u20134131 (2021). https:\/\/doi.org\/10.1109\/TPAMI.2020.3017880","DOI":"10.1109\/TPAMI.2020.3017880"},{"key":"38_CR25","doi-asserted-by":"publisher","unstructured":"Ojha, U., Li, Y., Lee, Y.J.: Towards universal fake image detectors that generalize across generative models. https:\/\/doi.org\/10.48550\/arXiv.2302.10174, http:\/\/arxiv.org\/abs\/2302.10174","DOI":"10.48550\/arXiv.2302.10174"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: British Machine Vision Conference (2015)","DOI":"10.5244\/C.29.41"},{"key":"38_CR27","unstructured":"Paszke, A., et al.: PyTorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, vol.\u00a032. Curran Associates, Inc. (2019)"},{"key":"38_CR28","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"38_CR29","doi-asserted-by":"publisher","unstructured":"Pei, G., et al.: Deepfake generation and detection: a benchmark and survey. arXiv preprint arXiv:2403.17881 (2024). https:\/\/doi.org\/10.48550\/arXiv.2403.17881","DOI":"10.48550\/arXiv.2403.17881"},{"key":"38_CR30","unstructured":"da Rep\u00fablica, P., do Brasil: Lei no,: 13.709, de 14 de agosto de 2018. Lei Geral de Prote\u00e7\u00e3o de Dados Pessoais (LGPD) (2018). https:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm. Accessed 28 Apr 2025"},{"key":"38_CR31","unstructured":"Radford, A., et al.: Learning transferable visual models from natural language supervision (2021)"},{"key":"38_CR32","doi-asserted-by":"publisher","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","volume":"10","author":"MS Rana","year":"2022","unstructured":"Rana, M.S., Nobi, M.N., Murali, B., Sung, A.H.: Deepfake detection: a systematic literature review. IEEE access 10, 25494\u201325513 (2022)","journal-title":"IEEE access"},{"key":"38_CR33","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"38_CR34","doi-asserted-by":"publisher","unstructured":"Sha, Z., Li, Z., Yu, N., Zhang, Y.: DE-FAKE: detection and attribution of fake images generated by text-to-image generation models. https:\/\/doi.org\/10.48550\/arXiv.2210.06998, http:\/\/arxiv.org\/abs\/2210.06998","DOI":"10.48550\/arXiv.2210.06998"},{"key":"38_CR35","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. Inf. Fusion 64, 131\u2013148 (2020). https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Inf. Fusion"},{"key":"38_CR36","unstructured":"Uni\u00e3o Europeia: Regulamento (UE) 2016\/679 do Parlamento Europeu e do Conselho, de 27 de abril de 2016, relativo \u00e0 prote\u00e7\u00e3o das pessoas singulares no que diz respeito ao tratamento de dados pessoais e \u00e0 livre circula\u00e7\u00e3o desses dados (Regulamento Geral sobre a Prote\u00e7\u00e3o de Dados). https:\/\/eur-lex.europa.eu\/legal-content\/PT\/TXT\/?uri=CELEX%3A32016R0679 (2016). Accessed 28 Apr 2025"},{"key":"38_CR37","doi-asserted-by":"publisher","unstructured":"Wolter, M., Blanke, F., Heese, R., Garcke, J.: Wavelet-packets for deepfake image analysis and detection 111(11), 4295\u20134327. https:\/\/doi.org\/10.1007\/s10994-022-06225-5","DOI":"10.1007\/s10994-022-06225-5"},{"key":"38_CR38","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Li, Q., Wang, J., Xu, C.Z., Sun, Z.: One shot face swapping on megapixels (2021)","DOI":"10.1109\/CVPR46437.2021.00480"}],"container-title":["Lecture Notes in Computer Science","Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15987-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:27:42Z","timestamp":1769718462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15987-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032159861","9783032159878"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15987-8_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"All the conclusions expressed by the authors do not reflect the opinions of Ita\u00fa Unibanco and Instituto de Ci\u00eancia e Tecnologia Ita\u00fa. Also, it must not result in any commercial process. Finally, all data used in this study comply with the Brazilian General Data Protection Law.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"BRACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazilian Conference on Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fortaleza-CE","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bracis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bracis.sbc.org.br\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}