{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:47:07Z","timestamp":1768272427964,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556755","type":"print"},{"value":"9789819556762","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5676-2_26","type":"book-chapter","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T20:32:20Z","timestamp":1768249940000},"page":"384-399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Imperceptible Face Forgery Attack via\u00a0Adversarial Semantic Mask"],"prefix":"10.1007","author":[{"given":"Yuhao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qixuan","family":"Su","sequence":"additional","affiliation":[]},{"given":"Decheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunlei","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,13]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Bai, W., Liu, Y., Zhang, Z., Li, B., Hu, W.: Aunet: learning relations between action units for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24709\u201324719 (2023)","DOI":"10.1109\/CVPR52729.2023.02367"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4113\u20134122 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"26_CR5","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp.\u00a01\u20136 (2018)","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Komkov, S., Petiushko, A.: Advhat: real-world adversarial attack on arcface face id system. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 819\u2013826 (2021)","DOI":"10.1109\/ICPR48806.2021.9412236"},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s44267-024-00066-7","volume":"2","author":"D Kong","year":"2024","unstructured":"Kong, D., Liang, S., Zhu, X., Zhong, Y., Ren, W.: Patch is enough: naturalistic adversarial patch against vision-language pre-training models. Visual Intell. 2(1), 33 (2024). https:\/\/doi.org\/10.1007\/s44267-024-00066-7","journal-title":"Visual Intell."},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial intelligence safety and security, pp. 99\u2013112. Chapman and Hall\/CRC (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"26_CR10","volume-title":"Discriminative feature mining based on frequency information and metric learning for face forgery detection","author":"J Li","year":"2021","unstructured":"Li, J., Xie, H., Yu, L., Gao, X., Zhang, Y.: Discriminative feature mining based on frequency information and metric learning for face forgery detection. IEEE Trans. Knowl, Data Eng (2021)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Liu, D., Zheng, Z., Peng, C., Wang, Y., Wang, N., Gao, X.: Hierarchical forgery classifier on multi-modality face forgery clues. IEEE Trans. Multimedia, 1\u201312 (2023)","DOI":"10.1109\/TMM.2023.3304913"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1002\/col.1049","volume":"26","author":"M Luo","year":"2001","unstructured":"Luo, M., Cui, G., Rigg, B.: The development of the cie 2000 colour-difference formula: ciede2000. Color. Res. Appl. 26, 340\u2013350 (2001)","journal-title":"Color. Res. Appl."},{"key":"26_CR13","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F 2 trans: high-frequency fine-grained transformer for face forgery detection. IEEE Trans. Inf. Forensics Secur. 18, 1039\u20131051 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Ni, Y., Meng, D., Yu, C., Quan, C., Ren, D., Zhao, Y.: Core: consistent representation learning for face forgery detection (2022)","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"26_CR16","unstructured":"Nilsson, J., Akenine-M\u00f6ller, T.: Understanding ssim (2020)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"issue":"1","key":"26_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s44267-025-00079-w","volume":"3","author":"Y Shi","year":"2025","unstructured":"Shi, Y., et al.: Shield: an evaluation benchmark for face spoofing and forgery detection with multimodal large language models. Visual Intell. 3(1), 9 (2025). https:\/\/doi.org\/10.1007\/s44267-025-00079-w","journal-title":"Visual Intell."},{"issue":"5","key":"26_CR21","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evolutionary Comput. 23(5), 828\u2013841 (2019)","journal-title":"IEEE Trans. Evolutionary Comput."},{"key":"26_CR22","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhu, Y., Wang, L., Ma, L., Wu, J., Li, T.: Generative adversarial network-based jitter distortion correction for high resolution spaceborne images. In: IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium, pp. 2532\u20132536 (2024)","DOI":"10.1109\/IGARSS53475.2024.10642594"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Wang, K., He, X., Wang, W., Wang, X.: Boosting adversarial transferability by block shuffle and rotation (2024)","DOI":"10.1109\/CVPR52733.2024.02297"},{"issue":"4","key":"26_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR26","unstructured":"Wei, J., Wang, S., Huang, Q.: F3net: fusion, feedback and focus for salient object detection (2019)"},{"issue":"9","key":"26_CR27","doi-asserted-by":"publisher","first-page":"4659","DOI":"10.1109\/TIP.2019.2909652","volume":"28","author":"Z Wei","year":"2019","unstructured":"Wei, Z., Liu, S., Sun, Y., Ling, H.: Accurate facial image parsing at real-time speed. IEEE Trans. Image Process. 28(9), 4659\u20134670 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Xiao, S., Lan, G., Yang, J., Lu, W., Meng, Q., Gao, X.: MCS-GAN: a different understanding for generalization of deep forgery detection. IEEE Trans. Multimedia (2023)","DOI":"10.1109\/TMM.2023.3279993"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, Z., et al.: Improving transferability of adversarial patches on face recognition with generative models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11845\u201311854 (2021)","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z., Yuille, A.: Improving transferability of adversarial examples with input diversity (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"26_CR31","unstructured":"Yan, Z., et al.: Df40: toward next-generation deepfake detection (2024)"},{"key":"26_CR32","first-page":"4534","volume":"36","author":"Z Yan","year":"2023","unstructured":"Yan, Z., Zhang, Y., Yuan, X., Lyu, S., Wu, B.: Deepfakebench: a comprehensive benchmark of deepfake detection. Adv. Neural. Inf. Process. Syst. 36, 4534\u20134565 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Towards face encryption by generating adversarial identity masks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3897\u20133907 (2021)","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z., Larson, M.: Towards large yet imperceptible adversarial image perturbations with perceptual color distance (2020)","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Deng, J., Zhu, Z., Li, Y., Zafeiriou, S.: Decoupled multi-task learning with cyclical self-regulation for face parsing. In: Computer Vision and Pattern Recognition (2022)","DOI":"10.1109\/CVPR52688.2022.00412"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, D., et al.: Removing adversarial noise in class activation feature space. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7878\u20137887 (2021)","DOI":"10.1109\/ICCV48922.2021.00778"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5676-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T20:32:24Z","timestamp":1768249944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5676-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556755","9789819556762"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5676-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"13 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}