{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T13:38:55Z","timestamp":1778852335557,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271344"],"award-info":[{"award-number":["62271344"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s00371-024-03613-x","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T15:02:18Z","timestamp":1726671738000},"page":"3473-3486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Advanced deepfake detection with enhanced Resnet-18 and multilayer CNN max pooling"],"prefix":"10.1007","volume":"41","author":[{"given":"Muhammad","family":"Fahad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yasir","family":"Iqbal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Azaz","family":"Ikram","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fazeela","family":"Siddiqui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bin Younas","family":"Abdullah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Malik","family":"Muhammad Nauman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xin","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanzhang","family":"Geng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,9,18]]},"reference":[{"issue":"1","key":"3613_CR1","doi-asserted-by":"publisher","first-page":"7422","DOI":"10.1038\/s41598-023-34629-3","volume":"13","author":"R Rafique","year":"2023","unstructured":"Rafique, R., et al.: Deep fake detection and classification using error-level analysis and deep learning. Sci. Rep. 13(1), 7422 (2023)","journal-title":"Sci. Rep."},{"key":"3613_CR2","first-page":"1753","volume":"107","author":"B Chesney","year":"2019","unstructured":"Chesney, B., Citron, D.: Deep fakes: a looming challenge for privacy, democracy, and national security. Calif. L. Rev. 107, 1753 (2019)","journal-title":"Calif. L. Rev."},{"key":"3613_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jvcir.2018.12.022","volume":"58","author":"L Zheng","year":"2019","unstructured":"Zheng, L., et al.: A survey on image tampering and its detection in real-world photos. J. V. Commun. Image Represent. 58, 380\u2013399 (2019)","journal-title":"J. V. Commun. Image Represent."},{"issue":"8","key":"3613_CR4","doi-asserted-by":"publisher","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","volume":"48","author":"S Suratkar","year":"2023","unstructured":"Suratkar, S., Kazi, F.: Deep fake video detection using transfer learning approach. Arab. J. Sci. Eng. 48(8), 9727\u20139737 (2023)","journal-title":"Arab. J. Sci. Eng."},{"issue":"10","key":"3613_CR5","doi-asserted-by":"publisher","first-page":"e7990","DOI":"10.1002\/cpe.7990","volume":"36","author":"JA Khan","year":"2024","unstructured":"Khan, J.A., et al.: Can end-user feedback in social media be trusted for software evolution: exploring and analyzing fake reviews. Concurr. Comput. Pract. Exp. 36(10), e7990 (2024)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"3613_CR6","doi-asserted-by":"crossref","unstructured":"Ahmed, S.R., et al. Analysis survey on deepfake detection and recognition with convolutional neural networks. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). 2022. IEEE.","DOI":"10.1109\/HORA55278.2022.9799858"},{"key":"3613_CR7","doi-asserted-by":"publisher","first-page":"e881","DOI":"10.7717\/peerj-cs.881","volume":"8","author":"S Suganthi","year":"2022","unstructured":"Suganthi, S., et al.: Deep learning model for deep fake face recognition and detection. Peer. J. Comput. Sci. 8, e881 (2022)","journal-title":"Peer. J. Comput. Sci."},{"key":"3613_CR8","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Y. Keller, and T. Hassner. Fsgan: Subject agnostic face swapping and reenactment. In: Proceedings of the IEEE\/CVF international conference on computer vision. 2019.","DOI":"10.1109\/ICCV.2019.00728"},{"issue":"1","key":"3613_CR9","first-page":"560","volume":"45","author":"Y Nirkin","year":"2022","unstructured":"Nirkin, Y., et al.: FSGANv2: improved subject agnostic face swapping and reenactment. arXiv Preprint arXiv 45(1), 560\u2013575 (2022)","journal-title":"arXiv Preprint arXiv"},{"key":"3613_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TMM.2021.3120873","volume":"25","author":"X Lin","year":"2021","unstructured":"Lin, X., et al.: EAPT: efficient attention pyramid transformer for image processing. IEEE Trans. Multimed. 25, 50\u201361 (2021)","journal-title":"IEEE Trans. Multimed."},{"issue":"7","key":"3613_CR11","doi-asserted-by":"publisher","first-page":"6662","DOI":"10.1109\/TCYB.2021.3079311","volume":"52","author":"B Sheng","year":"2021","unstructured":"Sheng, B., et al.: Improving video temporal consistency via broad learning system. IEEE Trans. Cybern. 52(7), 6662\u20136675 (2021)","journal-title":"IEEE Trans. Cybern."},{"issue":"5","key":"3613_CR12","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TCYB.2019.2934823","volume":"51","author":"H Guo","year":"2019","unstructured":"Guo, H., et al.: Multiview high dynamic range image synthesis using fuzzy broad learning system. IEEE Trans. Cybern. 51(5), 2735\u20132747 (2019)","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"3613_CR13","first-page":"830","volume":"16","author":"MI Marwat","year":"2022","unstructured":"Marwat, M.I., et al.: Sentiment analysis of product reviews to identify deceptive rating information in social media: a SentiDeceptive approach. KSII Trans. Internet Inf. Sys. (TIIS) 16(3), 830\u2013860 (2022)","journal-title":"KSII Trans. Internet Inf. Sys. (TIIS)"},{"issue":"2","key":"3613_CR14","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1109\/TVCG.2018.2869326","volume":"26","author":"B Sheng","year":"2018","unstructured":"Sheng, B., et al.: Intrinsic image decomposition with step and drift shading separation. IEEE Trans. V. Comput. Gr. 26(2), 1332\u20131346 (2018)","journal-title":"IEEE Trans. V. Comput. Gr."},{"issue":"3","key":"3613_CR15","first-page":"3813","volume":"45","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Liu, X.: Spoof trace disentanglement for generic face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell.Intell. 45(3), 3813\u20133830 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell.Intell."},{"key":"3613_CR16","first-page":"12","volume":"31","author":"DJWP Harwell","year":"2018","unstructured":"Harwell, D.J.W.P.: Scarlett Johansson on fake AI-generated sex videos:\u2018Nothing can stop someone from cutting and pasting my image.\u2019 Wash. Post 31, 12 (2018)","journal-title":"Wash. Post"},{"issue":"9","key":"3613_CR17","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCSVT.2014.2308639","volume":"24","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., et al.: Multiview facial landmark localization in RGB-D images via hierarchical regression with binary patterns. IEEE Trans. Circuits Sys Video Technol 24(9), 1475\u20131485 (2014)","journal-title":"IEEE Trans. Circuits Sys Video Technol"},{"issue":"3\u20134","key":"3613_CR18","first-page":"216","volume":"8","author":"E Vezzetti","year":"2016","unstructured":"Vezzetti, E., et al.: Application of geometry to rgb images for facial landmark localisation-a preliminary approach. Int. J. Biom. 8(3\u20134), 216\u2013236 (2016)","journal-title":"Int. J. Biom."},{"key":"3613_CR19","unstructured":"Viola, P. Jones, M. Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition. CVPR 2001. 2001. IEEE."},{"key":"3613_CR20","first-page":"05047","volume":"1907","author":"V Bazarevsky","year":"2019","unstructured":"Bazarevsky, V., et al.: Blazeface: Sub-millisecond neural face detection on mobile gpus. arXiv Preprint arXiv 1907, 05047 (2019)","journal-title":"arXiv Preprint arXiv"},{"issue":"16","key":"3613_CR21","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.3390\/s21165413","volume":"21","author":"A Ismail","year":"2021","unstructured":"Ismail, A., et al.: A new deep learning-based methodology for video deepfake detection using XGBoost. Sensors 21(16), 5413 (2021)","journal-title":"Sensors"},{"key":"3613_CR22","doi-asserted-by":"crossref","unstructured":"Akhtar, Z., D. Dasgupta, and B. Banerjee. Face authenticity: an overview of face manipulation generation, detection and recognition. In: Proceedings of international conference on communication and information processing (ICCIP). 2019.","DOI":"10.2139\/ssrn.3419272"},{"issue":"8","key":"3613_CR23","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TVCG.2019.2894627","volume":"26","author":"B Zhang","year":"2019","unstructured":"Zhang, B., et al.: Depth of field rendering using multilayer-neighborhood optimization. IEEE Trans. V. Comput. Gr. 26(8), 2546\u20132559 (2019)","journal-title":"IEEE Trans. V. Comput. Gr."},{"key":"3613_CR24","first-page":"1126","volume":"2102","author":"D Wodajo","year":"2021","unstructured":"Wodajo, D., Atnafu, S.: Deepfake video detection using convolutional vision transformer. arXiv Preprint arXiv. 2102, 1126 (2021)","journal-title":"arXiv Preprint arXiv."},{"key":"3613_CR25","doi-asserted-by":"crossref","unstructured":"Mehra, A.: Deepfake detection using capsule networks with long short-term memory networks. University of Twente (2020)","DOI":"10.5220\/0010289004070414"},{"key":"3613_CR26","first-page":"09179","volume":"1803","author":"A R\u00f6ssler","year":"2018","unstructured":"R\u00f6ssler, A., et al.: Faceforensics: A large-scale video dataset for forgery detection in human faces. arXiv Preprint arXiv 1803, 09179 (2018)","journal-title":"arXiv Preprint arXiv"},{"key":"3613_CR27","doi-asserted-by":"crossref","unstructured":"Jiang, L., et al. Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. (2020)","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"3613_CR28","doi-asserted-by":"crossref","unstructured":"Zi, B., et al. Wilddeepfake: a challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM international conference on multimedia. (2020)","DOI":"10.1145\/3394171.3413769"},{"key":"3613_CR29","doi-asserted-by":"crossref","unstructured":"Li, Y., et al. Celeb-df: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"issue":"3","key":"3613_CR30","doi-asserted-by":"publisher","first-page":"292","DOI":"10.3390\/electronics8030292","volume":"8","author":"MZ Alom","year":"2019","unstructured":"Alom, M.Z., et al.: A state-of-the-art survey on deep learning theory and architectures. Electronics 8(3), 292 (2019)","journal-title":"Electronics"},{"issue":"3","key":"3613_CR31","doi-asserted-by":"publisher","first-page":"780","DOI":"10.37622\/IJAER\/14.3.2019.780-789","volume":"14","author":"R Haridas","year":"2019","unstructured":"Haridas, R., Jyothi, R.: Convolutional neural networks: a comprehensive survey. Int. J. Appl. Eng. Res. 14(3), 780\u2013789 (2019)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"3613_CR32","unstructured":"Goodfellow, I. et al. Generative adversarial nets. Advan. Neural Inf. Process. Sys. 27 (2014)"},{"issue":"1","key":"3613_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301282","volume":"52","author":"Y Hong","year":"2019","unstructured":"Hong, Y., et al.: How generative adversarial networks and their variants work: An overview. ACM Comput. Surv. (CSUR). 52(1), 1\u201343 (2019)","journal-title":"ACM Comput. Surv. (CSUR)."},{"key":"3613_CR34","doi-asserted-by":"crossref","unstructured":"Ledig, C., et al. Photo-realistic single image super-resolution using a generative adversarial network. In: Proceedings of the IEEE conference on computer vision and pattern recognition. (2017)","DOI":"10.1109\/CVPR.2017.19"},{"key":"3613_CR35","doi-asserted-by":"crossref","unstructured":"Zakharov, E., et al. Few-shot adversarial learning of realistic neural talking head models. In: Proceedings of the IEEE\/CVF international conference on computer vision. 2019.","DOI":"10.1109\/ICCV.2019.00955"},{"issue":"4","key":"3613_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3072959.3073640","volume":"36","author":"S Suwajanakorn","year":"2017","unstructured":"Suwajanakorn, S., Seitz, S.M., Kemelmacher-Shlizerman, I.: Synthesizing obama: learning lip sync from audio. ACM Trans. Gr. (ToG) 36(4), 1\u201313 (2017)","journal-title":"ACM Trans. Gr. (ToG)"},{"key":"3613_CR37","first-page":"04208","volume":"1802","author":"C Donahue","year":"2018","unstructured":"Donahue, C., McAuley, J., Puckette, M.: Adversarial audio synthesis. arXiv Preprint arXiv 1802, 04208 (2018)","journal-title":"arXiv Preprint arXiv"},{"issue":"1","key":"3613_CR38","doi-asserted-by":"publisher","first-page":"3111676","DOI":"10.1155\/2021\/3111676","volume":"2021","author":"HS Shad","year":"2021","unstructured":"Shad, H.S., et al.: Comparative analysis of deepfake image detection method using convolutional neural network. Comput. Intell. Neurosci.Intell. Neurosci. 2021(1), 3111676 (2021)","journal-title":"Comput. Intell. Neurosci.Intell. Neurosci."},{"issue":"1","key":"3613_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13735-020-00196-w","volume":"10","author":"MR Pavan Kumar","year":"2021","unstructured":"Pavan Kumar, M.R., Jayagopal, P.: Generative adversarial networks: a survey on applications and challenges. Int. J. Multimed. Inf. Retr. 10(1), 1\u2013244 (2021)","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"3613_CR40","doi-asserted-by":"crossref","unstructured":"Afchar, D., et al. Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"3613_CR41","first-page":"08685","volume":"1812","author":"P Korshunov","year":"2018","unstructured":"Korshunov, P., Marcel, S.: Deepfakes: a new threat to face recognition? assessment and detection. arXiv Preprint arXiv 1812, 08685 (2018)","journal-title":"arXiv Preprint arXiv"},{"key":"3613_CR42","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Delp, E. J. Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS). (2018)","DOI":"10.1109\/AVSS.2018.8639163"},{"issue":"3","key":"3613_CR43","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1007\/s11760-023-02895-3","volume":"18","author":"A Koteswaramma","year":"2024","unstructured":"Koteswaramma, A., Rao, M.B., Suma, G.J.: An intelligent adaptive learning framework for fake video detection using spatiotemporal features. Signal, Image Video Process. 18(3), 2231\u20132241 (2024)","journal-title":"Signal, Image Video Process."},{"key":"3613_CR44","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M. Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW). (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"3613_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., J. Yamagishi, and I. Echizen. Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). (2019)","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"3613_CR46","doi-asserted-by":"crossref","unstructured":"Nguyen, H. H., et al. Multi-task learning for detecting and segmenting manipulated facial images and videos. In: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS). (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"3613_CR47","doi-asserted-by":"publisher","first-page":"101293","DOI":"10.1109\/ACCESS.2020.2998330","volume":"8","author":"MF Hashmi","year":"2020","unstructured":"Hashmi, M.F., et al.: An exploratory analysis on visual counterfeits using conv-lstm hybrid architecture. IEEE Access. 8, 101293\u2013101308 (2020)","journal-title":"IEEE Access."},{"key":"3613_CR48","doi-asserted-by":"crossref","unstructured":"Javed Mehedi Shamrat, F., et al. Human face recognition applying haar cascade classifier. In: Pervasive Computing and Social Networking: Proceedings of ICPCSN 2021. (2022). Springer.","DOI":"10.1007\/978-981-16-5640-8_12"},{"key":"3613_CR49","doi-asserted-by":"publisher","first-page":"103649","DOI":"10.1016\/j.cviu.2023.103649","volume":"229","author":"H Zhou","year":"2023","unstructured":"Zhou, H., et al.: SSDA-YOLO: semi-supervised domain adaptive YOLO for cross-domain object detection. Comput. V. Image Underst 229, 103649 (2023)","journal-title":"Comput. V. Image Underst"},{"issue":"2","key":"3613_CR50","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1080\/23307706.2022.2033644","volume":"10","author":"S Suratkar","year":"2023","unstructured":"Suratkar, S., et al.: Deep-fake video detection approaches using convolutional\u2013recurrent neural networks. J. Control Decis. 10(2), 198\u2013214 (2023)","journal-title":"J. Control Decis."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03613-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-024-03613-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03613-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T09:08:42Z","timestamp":1741597722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-024-03613-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["3613"],"URL":"https:\/\/doi.org\/10.1007\/s00371-024-03613-x","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,18]]},"assertion":[{"value":"15 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}