{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:57:22Z","timestamp":1743062242703,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819784899"},{"type":"electronic","value":"9789819784905"}],"license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8490-5_10","type":"book-chapter","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:09:07Z","timestamp":1730884147000},"page":"132-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dual-Task Cascaded for Proactive Deepfake Detection Using QPCET Watermarking"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5790-7621","authenticated-orcid":false,"given":"Chunpeng","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5579-8212","authenticated-orcid":false,"given":"Chaoyi","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7344-8645","authenticated-orcid":false,"given":"Yunan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9166-697X","authenticated-orcid":false,"given":"Zhiqiu","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5182-2798","authenticated-orcid":false,"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1921-049X","authenticated-orcid":false,"given":"Yongjin","family":"Xian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9030-7393","authenticated-orcid":false,"given":"Bin","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Aneja, S., Markhasin, L., Nie\u00dfner, M.: TAFIM: targeted adversarial attacks against facial image manipulations. In: ECCV, pp. 58\u201375 (2022)","DOI":"10.1007\/978-3-031-19781-9_4"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Beuve, N., Hamidouche, W., D\u00e9forges, O.: WaterLo: protect images from deepfakes using localized semi-fragile watermark. In: ICCV, pp. 393\u2013402 (2023)","DOI":"10.1109\/ICCVW60793.2023.00046"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bonettini, N., Cannas, E.D., Mandelli, S., Bondi, L., Bestagini, P., Tubaro, S.: Video face manipulation detection through ensemble of CNNs. In: ICPR, pp. 5012\u20135019 (2020)","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chai, L., Bau, D., Lim, S., Isola, P.: What makes fake images detectable? Understanding properties that generalize. In: ECCV, vol. 12371, pp. 103\u2013120 (2020)","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"10_CR5","unstructured":"Chen, L., Zhang, Y., Song, Y., Wang, J., Liu, L.: OST: improving generalization of deepfake detection via one-shot test-time training. In: NeurIPS (2022)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, X., Ni, B., Ge, Y.: SimSwap: an efficient framework for high fidelity face swapping. In: ACM MM, pp. 2003\u20132011 (2020)","DOI":"10.1145\/3394171.3413630"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Dong, S., Wang, J., Liang, J., Fan, H., Ji, R.: Explaining deepfake detection by analysing image matching. In: ECCV, pp. 18\u201335 (2022)","DOI":"10.1007\/978-3-031-19781-9_2"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"3480","DOI":"10.1109\/TMM.2021.3099900","volume":"24","author":"SE Eskimez","year":"2022","unstructured":"Eskimez, S.E., Zhang, Y., Duan, Z.: Speech driven talking face generation from a single image and an emotion condition. IEEE Trans. Multimed. 24, 3480\u20133490 (2022)","journal-title":"IEEE Trans. Multimed."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Gu, Z., Yao, T., Chen, Y., Yi, R., Ding, S., Ma, L.: Region-aware temporal inconsistency learning for deepfake video detection. In: IJCAI, pp. 920\u2013926 (2022)","DOI":"10.24963\/ijcai.2022\/129"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., Pantic, M.: Lips don\u2019t lie: a generalisable and robust approach to face forgery detection. In: CVPR, pp. 5039\u20135049 (2021)","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"He, Y., Yu, N., Keuper, M., Fritz, M.: Beyond the spectrum: detecting deepfakes via re-synthesis. In: IJCAI, pp. 2534\u20132541 (2021)","DOI":"10.24963\/ijcai.2021\/349"},{"issue":"11","key":"10_CR12","doi-asserted-by":"publisher","first-page":"5464","DOI":"10.1109\/TIP.2019.2916751","volume":"28","author":"Z He","year":"2019","unstructured":"He, Z., Zuo, W., Kan, M., Shan, S., Chen, X.: AttGAN: facial attribute editing by only changing what you want. IEEE Trans. Image Process. 28(11), 5464\u20135478 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: CVPR, pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Huang, H., et al.: CMUA-watermark: a cross-model universal adversarial watermark for combating deepfakes. In: AAAI, pp. 989\u2013997 (2022)","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization. In: ISVC, vol. 11844, pp. 565\u2013578 (2019)","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Jia, Z., Fang, H., Zhang, W.: MBRS: enhancing robustness of DNN-based watermarking by mini-batch of real and simulated JPEG compression. In: ACM MM, pp. 41\u201349 (2021)","DOI":"10.1145\/3474085.3475324"},{"key":"10_CR17","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of GANs for improved quality, stability, and variation. In: ICLR (2018)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Yu, L., Zhang, Y.: Wavelet-enhanced weakly supervised local feature learning for face forgery detection. In: ACM MM, pp. 1299\u20131308 (2022)","DOI":"10.1145\/3503161.3547832"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: Face x-ray for more general face forgery detection. In: CVPR, pp. 5000\u20135009 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Image-to-image translation via hierarchical style disentanglement. In: CVPR, pp. 8639\u20138648 (2021)","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: CVPR, pp. 3204\u20133213 (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Liu, H., et al.: BifPro: a bidirectional facial-data protection framework against deepfake. In: ACM MM, pp. 7075\u20137084 (2023)","DOI":"10.1145\/3581783.3613752"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: ICCV, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Ma, R., et al.: Towards blind watermarking: combining invertible and non-invertible mechanisms. In: ACM MM, pp. 1532\u20131542 (2022)","DOI":"10.1145\/3503161.3547950"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Neekhara, P., Hussain, S., Zhang, X., Huang, K., McAuley, J., Koushanfar, F.: Facesigns: semi-fragile watermarks for media authentication. ACM Trans. Multimed. Comput. Commun. Appl. (2024). https:\/\/doi.org\/10.1145\/3640466","DOI":"10.1145\/3640466"},{"issue":"1","key":"10_CR26","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TPAMI.2022.3155571","volume":"45","author":"Y Nirkin","year":"2023","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: FsGANv2: improved subject agnostic face swapping and reenactment. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 560\u2013575 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Pan, K., et al.: DFIL: deepfake incremental learning by exploiting domain-invariant forgery clues. In: ACM MM, pp. 8035\u20138046 (2023)","DOI":"10.1145\/3581783.3612377"},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"5337","DOI":"10.1109\/TPAMI.2022.3204971","volume":"45","author":"S Qi","year":"2023","unstructured":"Qi, S., Zhang, Y., Wang, C., Zhou, J., Cao, X.: A principled design of image representation: towards forensic tasks. IEEE Trans. Pattern Anal. Mach. Intell. 45(5), 5337\u20135354 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: FaceForensics++: learning to detect manipulated facial images. In: ICCV, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: CVPR, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: CVPR, pp. 18699\u201318708 (2022)","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Tang, Y., Li, K., Wang, C., Bian, S., Huang, Q.: A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity. Inf. Sci. 654, 119786 (2024)","DOI":"10.1016\/j.ins.2023.119786"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: CVPR, pp. 14923\u201314932 (2021)","DOI":"10.1109\/CVPR46437.2021.01468"},{"issue":"12","key":"10_CR34","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","volume":"30","author":"C Wang","year":"2020","unstructured":"Wang, C., Wang, X., Xia, Z., Ma, B., Shi, Y.: Image description with polar harmonic Fourier moments. IEEE Trans. Circuits Syst. Video Technol. 30(12), 4440\u20134452 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Wang, R., Huang, Z., Chen, Z., Liu, L., Chen, J., Wang, L.: Anti-forgery: towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations. In: IJCAI, pp. 761\u2013767 (2022)","DOI":"10.24963\/ijcai.2022\/107"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, O., Zhang, R., Owens, A., Efros, A.A.: CNN-generated images are surprisingly easy to spot... for now. In: CVPR, pp. 8692\u20138701 (2020)","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Wu, X., Liao, X., Ou, B.: Sepmark: deep separable watermarking for unified source tracing and deepfake detection. In: ACM MM, pp. 1190\u20131201 (2023)","DOI":"10.1145\/3581783.3612471"},{"key":"10_CR38","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia, Z., Wang, X., Zhou, W., Li, R., Wang, C., Zhang, C.: Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process. 157, 108\u2013118 (2019)","journal-title":"Signal Process."},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Younsi, M., Diaf, M., Siarry, P.: Comparative study of orthogonal moments for human postures recognition. Eng. Appl. Artif. Intell. 120, 105855 (2023)","DOI":"10.1016\/j.engappai.2023.105855"},{"key":"10_CR40","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TIFS.2022.3146781","volume":"17","author":"P Yu","year":"2022","unstructured":"Yu, P., Fei, J., Xia, Z., Zhou, Z., Weng, J.: Improving generalization by commonality learning in face forgery detection. IEEE Trans. Inf. Forensics Secur. 17, 547\u2013558 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, R., Yu, J., Xu, Y., Li, W., Zhang, J.: EditGuard: versatile image watermarking for tamper localization and copyright protection. In: CVPR (2024)","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Liu, B., Ding, M., Liu, B., Zhu, T., Yu, X.: Proactive deepfake defence via identity watermarking. In: WACV, pp. 4591\u20134600 (2023)","DOI":"10.1109\/WACV56688.2023.00458"},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2023.3262156","volume":"18","author":"Y Zhu","year":"2023","unstructured":"Zhu, Y., Chen, Y., Li, X., Zhang, R., Tian, X., Zheng, B., Chen, Y.: Information-containing adversarial perturbation for combating facial manipulation systems. IEEE Trans. Inf. Forensics Secur. 18, 2046\u20132059 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8490-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:12:27Z","timestamp":1730884347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8490-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"ISBN":["9789819784899","9789819784905"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8490-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"7 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}