{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:01:16Z","timestamp":1754154076789,"version":"3.41.2"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819697939"},{"type":"electronic","value":"9789819697946"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9794-6_28","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T06:11:52Z","timestamp":1752473512000},"page":"333-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IDD: An Identity Disentanglement Framework for Deepfake Detection"],"prefix":"10.1007","author":[{"given":"Haoran","family":"Li","sequence":"first","affiliation":[]},{"given":"Pengyao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hongkuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,15]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: a compact facial video forgery detection network. In: WIFS, pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Bulat, A., Tzimiropoulos, G.: How far are we from solving the 2D & 3D face alignment problem? (and a dataset of 230,000 3D facial landmarks). In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.116"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X.: End-to-end reconstruction classification learning for face forgery detection. In: CVPR, pp. 4113\u20134122 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., Ge, Y.: SimSwap: an efficient framework for high fidelity face swapping. In: ACM MM, pp. 2003\u20132011 (2020)","DOI":"10.1145\/3394171.3413630"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: CVPR, pp. 1251\u20131258 (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., R\u00a8ossler, A., Thies, J., Nie\u00dfner, M., Verdoliva, L.: ID-Reveal: Identity aware deepfake video detection. In: CVPR, pp. 15108\u201315117 (2021)","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: on the detection of digital face manipulation. In: CVPR, pp. 5781\u20135790 (2020)","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: CVPR, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"28_CR9","unstructured":"Dolhansky, B., et al.: The deepfake detection challenge (DFDC) dataset. arXiv preprint arXiv:2006.07397 (2020)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Dong, X., et al.: Protecting celebrities from deepfake with identity consistency transformer. In: CVPR, pp. 9468\u20139478 (2022)","DOI":"10.1109\/CVPR52688.2022.00925"},{"key":"28_CR11","unstructured":"Dufour, N., Gully, A.: Contributing data to deepfake detection research (2019). https:\/\/ai.googleblog.com\/2019\/09\/contributing-data-to-deepfake-detection.html"},{"key":"28_CR12","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: NeurIPS, vol. 27 (2014)"},{"key":"28_CR13","doi-asserted-by":"publisher","unstructured":"Guo, Y., Zhang, L., Hu, Y., He, X., Gao, J.: Ms-celeb-1m: A dataset and benchmark for large-scale face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV, pp. 87\u2013102. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_6","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Huang, B., et al.: Implicit identity driven deepfake face swapping detection. In: CVPR, pp. 4490\u20134499 (2023)","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Huang, X., Belongie, S.: Arbitrary style transfer in real-time with adaptive instance normalization. In: ICCV, pp. 1501\u20131510 (2017)","DOI":"10.1109\/ICCV.2017.167"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., Wen, F.: Advancing high fidelity identity swapping for forgery detection. In: CVPR, pp. 5074\u20135083 (2020)","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Face x-ray for more general face forgery detection. In: CVPR, pp. 5001\u20135010 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: CVPR, pp. 3207\u20133216 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: CVPR, pp. 772\u2013781 (2021)","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W.: Generalizing face forgery detection with high-frequency features. In: CVPR, pp. 16317\u201316326 (2021)","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"28_CR22","doi-asserted-by":"publisher","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, JM. (eds.) ECCV, pp. 667\u2013684. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-58571-6_39","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP, pp. 2307\u20132311. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"28_CR24","doi-asserted-by":"publisher","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, JM. (eds.) ECCV, pp. 86\u2013103. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: FaceForensics++: learning to detect manipulated facial images. In: ICCV, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: CVPR, pp. 18720\u201318729 (2022)","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"28_CR27","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: ICML, pp. 6105\u20136114. PMLR (2019)"},{"key":"28_CR28","unstructured":"Wang, T., Cheng, H., Zhang, X.: NullSwap: proactive identity cloaking against deepfake face swapping (2025)"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Wang, T., Cheng, H., Chow, K.P., Nie, L.: Deep convolutional pooling transformer for deepfake detection. ACM Trans. Multimedia Comput. Commun. Appl. 19(6), 179 (2023)","DOI":"10.1145\/3588574"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Wang, T., Chow, K.P.: Noise based deepfake detection via multi-head relative interaction. In: AAAI, pp. 14548\u201314556 (2023)","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"28_CR31","unstructured":"Wang, T., Huang, M., Cheng, H., Ma, B., Wang, Y.: Robust identity perceptual watermark against deepfake face swapping (2024)"},{"key":"28_CR32","doi-asserted-by":"crossref","unstructured":"Wang, T., Li, Z., Liu, R., Wang, Y., Nie, L.: An efficient attribute-preserving framework for face swapping. TMM (2024)","DOI":"10.1109\/TMM.2024.3354573"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Wang, T., Liao, X., Chow, K.P., Lin, X., Wang, Y.: Deepfake detection: a comprehensive survey from the reliability perspective. ACM Comput. Surv. 57(3), 1\u201335 (2024)","DOI":"10.1145\/3699710"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhang, Y., Fan, Y., Wu, B.: UCF: uncovering common features for generalizable Deepfake detection. In: ICCV, pp. 22412\u201322423 (2023)","DOI":"10.1109\/ICCV51070.2023.02048"},{"key":"28_CR35","unstructured":"Yan, Z., Zhang, Y., Yuan, X., Lyu, S., Wu, B.: DeepFakeBench: a comprehensive benchmark of Deepfake detection. In: NeurIPS, vol. 36, pp. 4534\u20134565 (2023)"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional Deepfake detection. In: CVPR, pp. 2185\u20132194 (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, T., Xu, X., Xu, M., Ding, H., Xiong, Y., Xia, W.: Learning self-consistency for Deepfake detection. In: ICCV, pp. 15023\u201315033 (2021)","DOI":"10.1109\/ICCV48922.2021.01475"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9794-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T22:05:40Z","timestamp":1753308340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9794-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819697939","9789819697946"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9794-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}