{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:42:30Z","timestamp":1742956950817,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819982950"},{"type":"electronic","value":"9789819982967"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-8296-7_17","type":"book-chapter","created":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:04:14Z","timestamp":1700179454000},"page":"240-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Detection of\u00a0Daily-Used Face Swap Applications by\u00a0Using Focused Landmark Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9521-0527","authenticated-orcid":false,"given":"Minh-Khoi","family":"Nguyen-Nhat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5153-8157","authenticated-orcid":false,"given":"Trung-Truc","family":"Huynh-Ngo","sequence":"additional","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Trong-Le","family":"Do","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,17]]},"reference":[{"key":"17_CR1","unstructured":"Deepfacelab. https:\/\/github.com\/iperov\/DeepFaceLab"},{"key":"17_CR2","unstructured":"DeepFaker app on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=app.deepfaker.face_swap.ai_video_editor.gender_magic_face_merge_morph"},{"key":"17_CR3","unstructured":"Dfaker. https:\/\/github.com\/dfaker\/df"},{"key":"17_CR4","unstructured":"Roop. https:\/\/github.com\/s0md3v\/roop"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: MesoNet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Bonettini, N., Cannas, E.D., Mandelli, S., Bondi, L., Bestagini, P., Tubaro, S.: Video face manipulation detection through ensemble of CNNs. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 5012\u20135019. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2020","unstructured":"Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N.M., Li, S.Z.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2922241","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Coccomini, D., Messina, N., Gennaro, C., Falchi, F.: Combining efficientnet and vision transformers for video deepfake detection. arXiv preprint arXiv:2107.02612 (2021)","DOI":"10.1007\/978-3-031-06433-3_19"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"PT De Boer","year":"2005","unstructured":"De Boer, P.T., Kroese, D.P., Mannor, S., Rubinstein, R.Y.: A tutorial on the cross-entropy method. Ann. Oper. Res. 134, 19\u201367 (2005)","journal-title":"Ann. Oper. Res."},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"17_CR11","unstructured":"Dosovitskiy, A., et al.: An image is worth $$16 \\times 16$$ words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Howard, A., et al.: Searching for MobileNetV3 (2019). https:\/\/doi.org\/10.48550\/arXiv.1905.02244","DOI":"10.48550\/arXiv.1905.02244"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Jobson, D.J., Rahman, Z., Woodell, G.A.: A multiscale retinex for bridging the gap between color images and the human observation of scenes. IEEE Trans. Image Process. 6(7), 965\u2013976 (1997)","DOI":"10.1109\/83.597272"},{"key":"17_CR14","unstructured":"Korshunov, P., Marcel, S.: DeepFakes: a new threat to face recognition? Assessment and detection. arXiv preprint arXiv:1812.08685 (2018)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","volume":"54","author":"Y Mirsky","year":"2022","unstructured":"Mirsky, Y., Lee, W.: The creation and detection of deepfakes: a survey. ACM Comput. Surv. 54(1), 1\u201341 (2022). https:\/\/doi.org\/10.1145\/3425780","journal-title":"ACM Comput. Surv."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen-Nhat, M.K., Huynh-Ngo, T.T., Tran, M.T., Do, T.L.: Unmasking illusion of daily-used deepfake applications through landmark focused image. In: Proceedings of the 6th International Conference on Multimedia Analysis and Pattern Recognition (MAPR 2023) (2023)","DOI":"10.1109\/MAPR59823.2023.10288758"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"RR Selvaraju","year":"2019","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-CAM: visual explanations from deep networks via gradient-based localization. Int. J. Comput. Vis. 128(2), 336\u2013359 (2019). https:\/\/doi.org\/10.1007\/s11263-019-01228-7","journal-title":"Int. J. Comput. Vis."},{"key":"17_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-030-25128-4_31","volume-title":"International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019","author":"W Shi","year":"2020","unstructured":"Shi, W., Li, J., Yang, Y.: Face fatigue detection method based on MTCNN and machine vision. In: Abawajy, J.H., Choo, K.-K.R., Islam, R., Xu, Z., Atiquzzaman, M. (eds.) ATCI 2019. AISC, vol. 1017, pp. 233\u2013240. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-25128-4_31"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Singh, M., Pati, D.: Replay attack detection using excitation source and system features, Chapter 2. In: Neustein, A. (ed.) Advances in Ubiquitous Computing, pp. 17\u201344. Advances in Ubiquitous Sensing Applications for Healthcare, Academic Press (2020). https:\/\/doi.org\/10.1016\/B978-0-12-816801-1.00002-5. https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780128168011000025","DOI":"10.1016\/B978-0-12-816801-1.00002-5"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection (2020)","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"17_CR23","unstructured":"Wachter, J.M.: Schwellwertanalyse bez\u00fcglich der Limitierung von MediaPipe Face Mesh anhand von informationsreduziertem Ausgangsmaterial. Ph.D. thesis (2022)"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Wightman, R.: Pytorch image models (2019). https:\/\/github.com\/rwightman\/pytorch-image-models. https:\/\/doi.org\/10.5281\/zenodo.4414861","DOI":"10.5281\/zenodo.4414861"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8296-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:09:48Z","timestamp":1700179788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8296-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819982950","9789819982967"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8296-7_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EquinOCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"135","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}