{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:23:25Z","timestamp":1743125005086,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819610679"},{"type":"electronic","value":"9789819610686"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1068-6_18","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:31Z","timestamp":1738901131000},"page":"187-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deepfake Video Detection Guided by\u00a0Identity and\u00a0Temporal Inconsistency"],"prefix":"10.1007","author":[{"given":"Yufei","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Peng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Dong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weike","family":"You","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"issue":"4","key":"18_CR1","first-page":"90","volume":"35","author":"F Dong","year":"2023","unstructured":"Dong, F., Zou, X., Wang, J., Liu, X.: Contrastive learning-based general deepfake detection with multi-scale RGB frequency clues. J. King Saud Univ.-Comput. Inf. Sci. 35(4), 90\u201399 (2023)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Z., Xie, L., Pang, S., He, Y., Zhang, B.: MagDR: mask-guided detection and reconstruction for defending deepfakes. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9014\u20139023 (2021)","DOI":"10.1109\/CVPR46437.2021.00890"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18720\u201318729 (2022)","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"104078","DOI":"10.1016\/j.cviu.2024.104078","volume":"247","author":"Z Meng","year":"2024","unstructured":"Meng, Z., Peng, B., Dong, J., Tan, T., Cheng, H.: Artifact feature purification for cross-domain detection of AI-generated images. Comput. Vis. Image Underst. 247, 104078 (2024)","journal-title":"Comput. Vis. Image Underst."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Dong, X., et al.: Protecting celebrities from deepfake with identity consistency transformer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9468\u20139478 (2022)","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Huang, B., et al.: Implicit identity driven deepfake face swapping detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4490\u20134499 (2023)","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., R\u00f6ssler, A., Thies, J., Nie\u00dfner, M., Verdoliva, L.: ID-Reveal: identity-aware deepfake video detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15108\u201315117 (2021)","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"18_CR8","unstructured":"Tran, D., Bourdev, L.D., Fergus, R., Torresani, L., Paluri, M.: C3D: generic features for video analysis. arXiv preprint arXiv:1412.0767 (2014)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo Vadis, action recognition? A new model and the kinetics dataset. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with DepthWise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"18_CR11","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114. PMLR (2019)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: It wasn\u2019t me: irregular identity in deepfake videos. In: 2023 IEEE International Conference on Image Processing (ICIP), pp. 2770\u20132774. IEEE (2023)","DOI":"10.1109\/ICIP49359.2023.10222654"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Lin, J., Gan, C., Han, S.: TSM: temporal shift module for efficient video understanding. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7083\u20137093 (2019)","DOI":"10.1109\/ICCV.2019.00718"},{"key":"18_CR14","first-page":"11669","volume":"34","author":"Z Liu","year":"2020","unstructured":"Liu, Z., et al.: TEINet: towards an efficient architecture for video recognition. Proc. AAAI Conf. Artif. Intell. 34, 11669\u201311676 (2020)","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Wang, L., Tong, Z., Ji, B., Wu, G.: TDN: temporal difference networks for efficient action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1895\u20131904 (2021)","DOI":"10.1109\/CVPR46437.2021.00193"},{"issue":"1","key":"18_CR16","first-page":"80","volume":"3","author":"E Sabir","year":"2019","unstructured":"Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., Natarajan, P.: Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI) 3(1), 80\u201387 (2019)","journal-title":"Interfaces (GUI)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Sharp multiple instance learning for deepfake video detection. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 1864\u20131872 (2020)","DOI":"10.1145\/3394171.3414034"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Gu, Z., et al.: Spatiotemporal inconsistency learning for deepfake video detection. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 3473\u20133481 (2021)","DOI":"10.1145\/3474085.3475508"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Duta, I.C., Liu, L., Zhu, F., Shao, L.: Improved residual networks for image and video recognition. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 9415\u20139422. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412193"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Face X-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001\u20135010 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Luo, C., Yuille, A.L.: Grouped spatial-temporal aggregation for efficient action recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5512\u20135521 (2019)","DOI":"10.1109\/ICCV.2019.00561"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., Echizen, I.: Distinguishing computer graphics from natural images using convolution neural networks. In: IEEE Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 772\u2013781 (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., Echizen, I.: Multi-task learning for detecting and segmenting manipulated facial images and videos. In: IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2307\u20132311. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, pp. 667\u2013684. Springer (2020)","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: European Conference on Computer Vision, pp. 86\u2013103. Springer (2020)","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: M2TR: multi-modal multi-scale transformers for deepfake detection. In: Proceedings of the 2022 International Conference on Multimedia Retrieval, pp. 615\u2013623 (2022)","DOI":"10.1145\/3512527.3531415"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3207\u20133216 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"issue":"10","key":"18_CR33","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Sig. Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Sig. Process. Lett."},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Feichtenhofer, C., Pinz, A., Zisserman, A.: Convolutional two-stream network fusion for video action recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1933\u20131941 (2016)","DOI":"10.1109\/CVPR.2016.213"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-CAM: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1068-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:55Z","timestamp":1738901155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1068-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610679","9789819610686"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1068-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}