{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:06:57Z","timestamp":1771564017139,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819990047","type":"print"},{"value":"9789819990054","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9005-4_70","type":"book-chapter","created":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T16:02:03Z","timestamp":1711814523000},"page":"553-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Face Image Authentication Scheme Based on Cohen\u2013Daubechies\u2013Feauveau Wavelets"],"prefix":"10.1007","author":[{"given":"Muntadher H.","family":"Al-Hadaad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4141-5723","authenticated-orcid":false,"given":"Rasha","family":"Thabit","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3739-7270","authenticated-orcid":false,"given":"Khamis A.","family":"Zidan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3492-2551","authenticated-orcid":false,"given":"Bee Ee","family":"Khoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,31]]},"reference":[{"key":"70_CR1","doi-asserted-by":"publisher","unstructured":"Hodeish ME, Bukauskas L, Humbe VT (2022) A new efficient TKHC-based image sharing scheme over unsecured channel. J King Saud Univ Comput Inf Sci 34(4):1246\u20131262. https:\/\/doi.org\/10.1016\/j.jksuci.2019.08.004","DOI":"10.1016\/j.jksuci.2019.08.004"},{"issue":"1","key":"70_CR2","first-page":"92","volume":"22","author":"M Devipriya","year":"2022","unstructured":"Devipriya M, Brindha M (2022) Secure image cloud storage using homomorphic password authentication with ECC based cryptosystem. Adv Syst Sci Appl 22(1):92\u2013116","journal-title":"Adv Syst Sci Appl"},{"key":"70_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148. https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Inf Fusion"},{"key":"70_CR4","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Sel Top Signal Process 14:910\u2013932","journal-title":"IEEE J Sel Top Signal Process"},{"key":"70_CR5","doi-asserted-by":"publisher","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2022) An introduction to digital face manipulation. In: Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (eds) Handbook of digital face manipulation and detection: from deepfakes to morphing attacks. Springer International Publishing, Cham, pp 3\u201326. https:\/\/doi.org\/10.1007\/978-3-030-87664-7_1","DOI":"10.1007\/978-3-030-87664-7_1"},{"key":"70_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2022.04.017","author":"VVVNS Vamsi","year":"2022","unstructured":"Vamsi VVVNS et al (2022) Deepfake detection in digital media forensics. Glob Transit Proc. https:\/\/doi.org\/10.1016\/j.gltp.2022.04.017","journal-title":"Glob Transit Proc"},{"key":"70_CR7","unstructured":"Korshunov P, Marcel S (2018) Deepfakes: a new threat to face recognition? Assessment and detection. arXiv:1812.08685"},{"key":"70_CR8","doi-asserted-by":"publisher","unstructured":"Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE winter applications of computer vision workshops (WACVW), pp 83\u201392. https:\/\/doi.org\/10.1109\/WACVW.2019.00020","DOI":"10.1109\/WACVW.2019.00020"},{"key":"70_CR9","doi-asserted-by":"publisher","unstructured":"Hu S, Li Y, Lyu S (2021) Exposing GAN-generated faces using inconsistent corneal specular highlights. In: ICASSP 2021\u20142021 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 2500\u20132504. https:\/\/doi.org\/10.1109\/ICASSP39728.2021.9414582","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"70_CR10","doi-asserted-by":"publisher","unstructured":"Han X, Ji Z, Wang W (2020) Low resolution facial manipulation detection. In: 2020 IEEE international conference on visual communications and image processing (VCIP), pp 431\u2013434. https:\/\/doi.org\/10.1109\/VCIP49819.2020.9301796","DOI":"10.1109\/VCIP49819.2020.9301796"},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Qi H, Lyu S (2019) Exposing GAN-synthesized faces using landmark locations. In: Proceedings of the ACM workshop on information hiding and multimedia security","DOI":"10.1145\/3335203.3335724"},{"key":"70_CR12","doi-asserted-by":"publisher","unstructured":"McCloskey S, Albright M (2019) Detecting GAN-generated imagery using saturation cues. In: 2019 IEEE international conference on image processing (ICIP), pp 4584\u20134588. https:\/\/doi.org\/10.1109\/ICIP.2019.8803661","DOI":"10.1109\/ICIP.2019.8803661"},{"key":"70_CR13","unstructured":"Li H, Li B, Tan S, Huang J (2018) Detection of deep network generated images using disparities in color components. arXiv:1808.07276"},{"key":"70_CR14","doi-asserted-by":"publisher","unstructured":"Vaccari C, Chadwick A (2020) Deepfakes and disinformation: exploring the impact of synthetic political video on deception, uncertainty, and trust in news. Soc Media Soc 6(1):2056305120903408. https:\/\/doi.org\/10.1177\/2056305120903408","DOI":"10.1177\/2056305120903408"},{"key":"70_CR15","doi-asserted-by":"publisher","unstructured":"Salih ZA, Thabit R, Zidan KA, Khoo BE (2022) Challenges of face image authentication and suggested solutions. In: 2022 international conference on information technology systems and innovation (ICITSI), pp 189\u2013193. https:\/\/doi.org\/10.1109\/ICITSI56531.2022.9970797","DOI":"10.1109\/ICITSI56531.2022.9970797"},{"key":"70_CR16","unstructured":"Pashine S, Mandiya S, Gupta P, Sheikh R (2021) Deep fake detection: survey of facial manipulation detection solutions. Int Res J Eng Technol 8(8):4441\u20134449. [Online]. Available: http:\/\/arxiv.org\/abs\/2106.12605"},{"key":"70_CR17","doi-asserted-by":"publisher","unstructured":"Salih ZA, Thabit R, Zidan KA, Khoo BE (2022) A new face image manipulation reveal scheme based on face detection and image watermarking. In: 2022 IEEE international conference on artificial intelligence in engineering and technology (IICAIET), no 1001, pp 1\u20136. https:\/\/doi.org\/10.1109\/iicaiet55139.2022.9936838","DOI":"10.1109\/iicaiet55139.2022.9936838"},{"issue":"1","key":"70_CR18","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309\u2013332. https:\/\/doi.org\/10.1007\/s11042-015-3055-x","journal-title":"Multimed Tools Appl"},{"key":"70_CR19","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) A new robust reversible watermarking method in the transform domain. In: Lecture notes in electrical engineering LNEE, vol 291. https:\/\/doi.org\/10.1007\/978-981-4585-42-2_19","DOI":"10.1007\/978-981-4585-42-2_19"},{"key":"70_CR20","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process 38. https:\/\/doi.org\/10.1016\/j.dsp.2014.12.005","DOI":"10.1016\/j.dsp.2014.12.005"},{"issue":"10","key":"70_CR21","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9005-4_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T16:07:24Z","timestamp":1711814844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9005-4_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819990047","9789819990054"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9005-4_70","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RoViSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Robotics, Vision, Signal Processing and Power Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rovisp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}