{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:48:22Z","timestamp":1773661702353,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00500-026-11218-w","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:39:12Z","timestamp":1770435552000},"page":"1795-1812","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An optimal deep learning-based face forgery detection system using DCXCN-BLSTM"],"prefix":"10.1007","volume":"30","author":[{"given":"R. Raja","family":"Sekar","sequence":"first","affiliation":[]},{"given":"T. Dhiliphan","family":"Rajkumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"11218_CR1","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.inffus.2021.04.015","volume":"75","author":"F Abdullakutty","year":"2021","unstructured":"Abdullakutty F, Elyan E, Johnston P (2021) A review of state-of-the-art in face presentation attack detection: from early development to advanced deep learning and multi-modal fusion methods. Inf Fusion 75:55\u201369","journal-title":"Inf Fusion"},{"issue":"14","key":"11218_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/s22145196","volume":"22","author":"F Abdullakutty","year":"2022","unstructured":"Abdullakutty F, Johnston P, Elyan E (2022a) Fusion methods for face presentation attack detection. Sensors 22(14):5196","journal-title":"Sensors"},{"issue":"6","key":"11218_CR3","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s12559-022-10037-z","volume":"14","author":"F Abdullakutty","year":"2022","unstructured":"Abdullakutty F, Elyan E, Johnston P, Ali-Gombe A (2022b) Deep transfer learning on the aggregated dataset for face presentation attack detection. Cogn Comput 14(6):2223\u20132233","journal-title":"Cogn Comput"},{"key":"11218_CR4","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2022.836749","volume":"5","author":"A Agarwal","year":"2022","unstructured":"Agarwal A, Singh R, Vatsa M, Noore A (2022) Boosting face presentation attack detection in multi-spectral videos through score fusion of wavelet partition images. Front Big Data 5:836749","journal-title":"Front Big Data"},{"key":"11218_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04620-2","author":"G Chen","year":"2024","unstructured":"Chen G, Sun H (2024) Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-024-04620-2","journal-title":"Cluster Comput"},{"key":"11218_CR6","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.neucom.2021.05.068","volume":"458","author":"H Chen","year":"2021","unstructured":"Chen H, Qian F, Chen J, Zhao S, Zhang Y (2021) FG-RS: capture user fine-grained preferences through attribute information for recommender systems. Neurocomputing 458:195\u2013203","journal-title":"Neurocomputing"},{"issue":"14","key":"11218_CR7","doi-asserted-by":"publisher","first-page":"41597","DOI":"10.1007\/s11042-023-15494-8","volume":"83","author":"G Chen","year":"2024","unstructured":"Chen G, Zhu D, Chen X (2024) Similarity detection method of science fiction painting based on multi-strategy improved sparrow search algorithm and Gaussian pyramid. Multimedia Tools Appl 83(14):41597\u201341636","journal-title":"Multimedia Tools Appl"},{"key":"11218_CR8","doi-asserted-by":"crossref","unstructured":"Deb D, Xiaoming L, and Anil K.J. Unified detection of digital and physical face attacks. In 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), pp. 1\u20138. IEEE, 2023","DOI":"10.1109\/FG57933.2023.10042500"},{"key":"11218_CR9","doi-asserted-by":"crossref","unstructured":"Deng L, Hongfei S, and Dongjie L. Deepfake video detection based on EfficientNet-V2 network. Comp Intell Neurosci 2022 (2022)","DOI":"10.1155\/2022\/3441549"},{"key":"11218_CR10","first-page":"1","volume":"2021","author":"Y Du","year":"2021","unstructured":"Du Y, Qiao T, Ming Xu, Zheng N (2021) Towards face presentation attack detection based on residual color texture representation. Sec Commun Netw 2021:1\u201316","journal-title":"Sec Commun Netw"},{"issue":"30","key":"11218_CR11","doi-asserted-by":"publisher","first-page":"10163","DOI":"10.1039\/D3TC01636F","volume":"11","author":"L Fan","year":"2023","unstructured":"Fan L, Yang X, Sun H (2023) A novel flexible sensor for double-parameter decoupling measurement of temperature and pressure with high sensitivity and wide range. J Mater Chem C 11(30):10163\u201310177","journal-title":"J Mater Chem C"},{"key":"11218_CR12","doi-asserted-by":"crossref","unstructured":"Fang M, Fadi B, Arjan K, and Naser D. Partial attack supervision and regional weighted inference for masked face presentation attack detection. In 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021), pp. 1\u20138. IEEE, 2021","DOI":"10.1109\/FG52635.2021.9667051"},{"key":"11218_CR13","doi-asserted-by":"crossref","unstructured":"Fang M, Naser D, Florian K, and Arjan K. Learnable multi-level frequency decomposition and hierarchical attention mechanism for generalized face presentation attack detection. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3722\u20133731. 2022","DOI":"10.1109\/WACV51458.2022.00120"},{"key":"11218_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107696","volume":"112","author":"S Fatemifar","year":"2021","unstructured":"Fatemifar S, Arashloo SR, Awais M, Kittler J (2021) Client-specific anomaly detection for face presentation attack detection. Pattern Recognit 112:107696","journal-title":"Pattern Recognit"},{"key":"11218_CR15","doi-asserted-by":"crossref","unstructured":"George A, and S\u00e9bastien M. On the effectiveness of vision transformers for zero-shot face anti-spoofing. In 2021 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u20138. IEEE, 2021","DOI":"10.1109\/IJCB52358.2021.9484333"},{"issue":"5","key":"11218_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/s22052017","volume":"22","author":"C Gupta","year":"2022","unstructured":"Gupta C, Johri I, Srinivasan K, Hu Y-C, Qaisar SM, Huang K-Y (2022) A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors 22(5):2017","journal-title":"Sensors"},{"key":"11218_CR17","doi-asserted-by":"crossref","unstructured":"Hernandez-Ortega J, Julian Fierrez AM, and Javier G. Introduction to presentation attack detection in face biometrics and recent advances. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment (2023): 203\u2013230","DOI":"10.1007\/978-981-19-5288-3_9"},{"key":"11218_CR18","unstructured":"http:\/\/cvlab.cse.msu.edu\/dffd-dataset.html"},{"key":"11218_CR19","unstructured":"http:\/\/cvlab.cse.msu.edu\/siw-spoof-in-the-wild-database.html"},{"key":"11218_CR20","unstructured":"https:\/\/paperswithcode.com\/dataset\/casia-fasd"},{"key":"11218_CR21","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1109\/TIFS.2022.3141262","volume":"17","author":"Y Huang","year":"2022","unstructured":"Huang Y, Juefei-Xu F, Guo Q, Liu Y, Pu G (2022) FakeLocator: robust localization of GAN-based face manipulations. IEEE Trans Inf Forensics Secur 17:2657\u20132672","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11218_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-023-01092-z","author":"H Ilyas","year":"2023","unstructured":"Ilyas H, Javed A, Malik KM, Irtaza A (2023) E-Cap net: an efficient-capsule network for shallow and deepfakes forgery detection. Multimedia Syst. https:\/\/doi.org\/10.1007\/s00530-023-01092-z","journal-title":"Multimedia Syst"},{"key":"11218_CR23","doi-asserted-by":"crossref","unstructured":"Komulainen J, Zinelabidine B, and Zahid A. Review of face presentation attack detection competitions. Handbook Biomet Anti-Spoof Present Attack Detect (2019): 291\u2013317","DOI":"10.1007\/978-3-319-92627-8_14"},{"key":"11218_CR24","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2022.3178240","volume":"17","author":"Z Li","year":"2022","unstructured":"Li Z, Cai R, Li H, Lam K-Y, Hu Y, Kot AC (2022a) One-class knowledge distillation for face presentation attack detection. IEEE Trans Inf Forensics Secur 17:2137\u20132150","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11218_CR25","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2022.980063","volume":"16","author":"Z Li","year":"2022","unstructured":"Li Z, Song J, Qiao K, Li C, Zhang Y, Li Z (2022b) Research on efficient feature extraction: improving YOLOv5 backbone for facial expression detection in live streaming scenes. Front Comput Neurosci 16:980063","journal-title":"Front Comput Neurosci"},{"key":"11218_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102317","volume":"110","author":"P Maheshwari","year":"2021","unstructured":"Maheshwari P, Sharma AK, Verma K (2021) Energy efficient cluster-based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Netw 110:102317","journal-title":"Ad Hoc Netw"},{"key":"11218_CR27","doi-asserted-by":"crossref","unstructured":"Mary A, and Anitha E. Deep fake Detection using deep learning techniques: A Literature Review. In 2023 International Conference on Control, Communication and Computing (ICCC), pp. 1\u20136. IEEE, 2023","DOI":"10.1109\/ICCC57789.2023.10164881"},{"key":"11218_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.patrec.2022.03.001","volume":"156","author":"U Muhammad","year":"2022","unstructured":"Muhammad U, Yu Z, Komulainen J (2022) Self-supervised 2D face presentation attack detection via temporal sequence sampling. Pattern Recognit Lett 156:15\u201322","journal-title":"Pattern Recognit Lett"},{"issue":"10","key":"11218_CR29","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","volume":"44","author":"Y Nirkin","year":"2021","unstructured":"Nirkin Y, Wolf L, Keller Y, Hassner T (2021) DeepFake detection based on discrepancies between faces and their context. IEEE Trans Pattern Anal Mach Intell 44(10):6111\u20136121","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"11218_CR30","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Ruben T, Ruben V-R, and Christoph B. Handbook of digital face manipulation and detection: from DeepFakes to morphing attacks. Springer Nature, 2022","DOI":"10.1007\/978-3-030-87664-7"},{"key":"11218_CR31","doi-asserted-by":"crossref","unstructured":"Ren H, Teng H, and Hongyang Y. Adversarial examples: attacks and defenses in the physical world. Int J Mach Learn Cybernet (2021): 1\u201312","DOI":"10.1007\/s13042-020-01242-z"},{"issue":"7","key":"11218_CR32","doi-asserted-by":"publisher","DOI":"10.1088\/1361-665X\/ac726f","volume":"31","author":"W Shao","year":"2022","unstructured":"Shao W, Sun H, Wang Y, Qing X (2022) A multi-level damage classification technique of aircraft plate structures using Lamb wave-based deep transfer learning network. Smart Mater Struct 31(7):075019","journal-title":"Smart Mater Struct"},{"issue":"1","key":"11218_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.gltp.2021.01.004","volume":"2","author":"N Sharma","year":"2021","unstructured":"Sharma N, Sharma R, Jindal N (2021) Machine learning and deep learning applications-a vision. Glob Transit Proc 2(1):24\u201328","journal-title":"Glob Transit Proc"},{"key":"11218_CR34","doi-asserted-by":"publisher","first-page":"4063","DOI":"10.1109\/TIFS.2021.3102492","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen M, Yu H, Zhu L, Xu Ke, Li Qi, Hu J (2021) Effective and robust physical-world attacks on deep learning face recognition systems. IEEE Trans Inf Forensics Secur 16:4063\u20134077","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"11218_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12102199","volume":"12","author":"E Solomon","year":"2023","unstructured":"Solomon E, Cios KJ (2023) FASS: face anti-spoofing system using image quality features and deep learning. Electronics 12(10):2199","journal-title":"Electronics"},{"key":"11218_CR36","doi-asserted-by":"crossref","unstructured":"Sun K, Hong L, Taiping Y, Xiaoshuai S, Shen C, Shouhong D, and Rongrong J. An information theoretic approach for attention-driven face forgery detection. In European Conference on Computer Vision, pp. 111\u2013127. Cham: Springer Nature Switzerland, 2022","DOI":"10.1007\/978-3-031-19781-9_7"},{"key":"11218_CR37","doi-asserted-by":"publisher","first-page":"92735","DOI":"10.1109\/ACCESS.2021.3092646","volume":"9","author":"F Vakhshiteh","year":"2021","unstructured":"Vakhshiteh F, Nickabadi A, Ramachandra R (2021) Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9:92735\u201392756","journal-title":"IEEE Access"},{"issue":"3","key":"11218_CR38","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TTS.2021.3066254","volume":"2","author":"S Venkatesh","year":"2021","unstructured":"Venkatesh S, Ramachandra R, Raja K, Busch C (2021) Face morphing attack generation and detection: a comprehensive survey. IEEE Trans Technol Soc 2(3):128\u2013145","journal-title":"IEEE Trans Technol Soc"},{"issue":"5","key":"11218_CR39","first-page":"5609","volume":"45","author":"Z Yu","year":"2022","unstructured":"Yu Z, Qin Y, Li X, Zhao C, Lei Z, Zhao G (2022) Deep learning for face anti-spoofing: a survey. IEEE Trans Pattern Anal Mach Intell 45(5):5609\u20135631","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"11218_CR40","doi-asserted-by":"crossref","unstructured":"Zhuang W, Qi C, Zhentao T, Qiankun L, Haojie Y, Changtao M, Zixiang L, and Nenghai Y. UIA-ViT: Unsupervised inconsistency-aware method based on vision transformer for face forgery detection. In European Conference on Computer Vision, pp. 391\u2013407. Cham: Springer Nature Switzerland, 2022","DOI":"10.1007\/978-3-031-20065-6_23"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-026-11218-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-026-11218-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-026-11218-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:47:50Z","timestamp":1773658070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-026-11218-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,7]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["11218"],"URL":"https:\/\/doi.org\/10.1007\/s00500-026-11218-w","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,7]]},"assertion":[{"value":"5 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}