{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:22:33Z","timestamp":1768267353959,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2018YFC1604000"],"award-info":[{"award-number":["2018YFC1604000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00521-023-08271-z","type":"journal-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T07:20:25Z","timestamp":1675149625000},"page":"10861-10874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Fine-grained deepfake detection based on cross-modality attention"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7949-0548","authenticated-orcid":false,"given":"Lei","family":"Zhao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mingcheng","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongwei","family":"Ding","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0851-1994","authenticated-orcid":false,"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"8271_CR1","doi-asserted-by":"crossref","unstructured":"Liu H, Li X, Zhou W, Chen Y, He Y, Xue H, Zhang W, Yu N (2021) Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 772\u2013781","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"8271_CR2","doi-asserted-by":"crossref","unstructured":"Qian Y, Yin G, Sheng L, Chen Z, Shao J (2020) Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: European conference on computer vision. Springer, pp. 86\u2013103","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"8271_CR3","doi-asserted-by":"crossref","unstructured":"Zhao H, Zhou W, Chen D, Wei T, Zhang W, Yu N (2021) Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2185\u20132194","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"8271_CR4","doi-asserted-by":"crossref","unstructured":"Liu Z, Qi X, Torr PHS (2020) Global texture enhancement for fake face detection in the wild. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8060\u20138069","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"8271_CR5","unstructured":"Joel F, Thorsten E, Lea S, Asja F, Dorothea K, Thorsten H (2020) Leveraging frequency analysis for deep fake image recognition. In: International conference on machine learning. PMLR, pp. 3247\u20133258"},{"key":"8271_CR6","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang Y, Yan J, Liu W (2021) Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 16317\u201316326","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"8271_CR7","doi-asserted-by":"crossref","unstructured":"Gu Z, Chen Y, Yao T, Ding S, Li J, Huang F, Ma L (2021) Spatiotemporal inconsistency learning for deepfake video detection. In: Proceedings of the 29th ACM international conference on multimedia, pp. 3473\u20133481","DOI":"10.1145\/3474085.3475508"},{"key":"8271_CR8","doi-asserted-by":"crossref","unstructured":"Li J, Xie H, Li J, Wang Z, Zhang Y (2021) Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 6458\u20136467","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"8271_CR9","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114"},{"key":"8271_CR10","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434"},{"key":"8271_CR11","unstructured":"Karras T, Aila T, Laine S, Lehtinen J (2017) Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196"},{"key":"8271_CR12","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR), June","DOI":"10.1109\/CVPR.2019.00453"},{"key":"8271_CR13","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8110\u20138119","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"8271_CR14","doi-asserted-by":"crossref","unstructured":"Or-El R, Luo X, Shan M, Shechtman E, Park JJ, Kemelmacher-Shlizerman I (2021) Stylesdf: High-resolution 3d-consistent image and geometry generation. arXiv e-prints, pp. arXiv\u20132112","DOI":"10.1109\/CVPR52688.2022.01314"},{"key":"8271_CR15","doi-asserted-by":"crossref","unstructured":"Wang SY, Wang O, Zhang R, Owens A, Efros AA (2020) Cnn-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8695\u20138704","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"8271_CR16","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu S (2019) Exposing deep fakes using inconsistent head poses. In: ICASSP 2019 - 2019 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"8271_CR17","doi-asserted-by":"crossref","unstructured":"Zhu X, Wang H, Fei H, Lei Z, Li SZ (2021) Face forgery detection by 3d decomposition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2929\u20132939","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"8271_CR18","doi-asserted-by":"crossref","unstructured":"Ge S, Lin F, Li C, Zhang D, Tan J, Wang W, Zeng D (2021) Latent pattern sensing: Deepfake video detection via predictive representation learning. In: ACM Multimedia Asia, pp. 1\u20137","DOI":"10.1145\/3469877.3490586"},{"key":"8271_CR19","doi-asserted-by":"crossref","unstructured":"Mittal T, Bhattacharya U, Chandra R, Bera A, Manocha D (2020) Emotions don\u2019t lie: An audio-visual deepfake detection method using affective cues. In: Proceedings of the 28th ACM international conference on multimedia, pp. 2823\u20132832","DOI":"10.1145\/3394171.3413570"},{"key":"8271_CR20","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"issue":"2","key":"8271_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"Jan Lukas","year":"2006","unstructured":"Lukas Jan, Fridrich Jessica, Goljan Miroslav (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8271_CR22","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"Davide Cozzolino","year":"2019","unstructured":"Cozzolino Davide, Verdoliva Luisa (2019) Noiseprint: a cnn-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15:144\u2013159","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8271_CR23","doi-asserted-by":"crossref","unstructured":"Ciftciua D, Fakecatcher YINL (2020) Detection ofsyntheticportraitvideosusingbiologicalsignals. In: IEEE transactionson pattern analysis and machineintelligence","DOI":"10.1109\/TPAMI.2020.3009287"},{"issue":"2","key":"8271_CR24","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1364\/BOE.9.000873","volume":"9","author":"Prakash Sakthi Kumar Arul","year":"2018","unstructured":"Arul Prakash Sakthi Kumar, Tucker Conrad S (2018) Bounded kalman filter method for motion-robust, non-contact heart rate estimation. Biomed Opt Express 9(2):873\u2013897","journal-title":"Biomed Opt Express"},{"issue":"5","key":"8271_CR25","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TCSVT.2014.2364415","volume":"25","author":"Litong Feng","year":"2014","unstructured":"Feng Litong, Po Lai-Man, Xuyuan Xu, Li Yuming, Ma Ruiyi (2014) Motion-resistant remote imaging photoplethysmography based on the optical properties of skin. IEEE Trans Circ Syst Video Technol 25(5):879\u2013891","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"10","key":"8271_CR26","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00003","volume":"1","author":"Augustus Odena","year":"2016","unstructured":"Odena Augustus, Dumoulin Vincent, Olah Chris (2016) Deconvolution and checkerboard artifacts. Distill 1(10):e3","journal-title":"Distill"},{"issue":"12","key":"8271_CR27","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.3390\/e23121692","volume":"23","author":"Lei Zhao","year":"2021","unstructured":"Zhao Lei, Zhang Mingcheng, Ding Hongwei, Cui Xiaohui (2021) Mff-net: deepfake detection network based on multi-feature fusion. Entropy 23(12):1692","journal-title":"Entropy"},{"key":"8271_CR28","doi-asserted-by":"crossref","unstructured":"Chai L, Bau D, Lim SN, Isola P (2020) What makes fake images detectable? understanding properties that generalize. In: European conference on computer vision. Springer, pp. 103\u2013120","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"8271_CR29","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"8271_CR30","doi-asserted-by":"crossref","unstructured":"Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 3207\u20133216","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"8271_CR31","unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer CC (2020) The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397"},{"key":"8271_CR32","doi-asserted-by":"crossref","unstructured":"Jiang L, Li R, Wu W, Qian C, Loy CC (2020) Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2889\u20132898","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"8271_CR33","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2face: Real-time face capture and re-enactment of rgb videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"8271_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"Justus Thies","year":"2019","unstructured":"Thies Justus, Zollh\u00f6fer Michael, Nie\u00dfner Matthias (2019) Deferred neural rendering: image synthesis using neural textures. ACM Trans Graphics (TOG) 38(4):1\u201312","journal-title":"ACM Trans Graphics (TOG)"},{"key":"8271_CR35","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. In: ICLR (Poster)"},{"key":"8271_CR36","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"issue":"3","key":"8271_CR37","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"Jessica Fridrich","year":"2012","unstructured":"Fridrich Jessica, Kodovsky Jan (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8271_CR38","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2017) Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp. 159\u2013164","DOI":"10.1145\/3082031.3083247"},{"key":"8271_CR39","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"8271_CR40","doi-asserted-by":"crossref","unstructured":"Masi I, Killekar A, Mascarenhas RM, Gurudatt SP, AbdAlmageed W (2020) Two-branch recurrent network for isolating deepfakes in videos. In: European conference on computer vision. Springer, pp. 667\u2013684","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"8271_CR41","unstructured":"Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neural networks. In: International conference on machine learning. PMLR, pp. 6105\u20136114"},{"key":"8271_CR42","doi-asserted-by":"crossref","unstructured":"Zhang J, Ni J, Xie H (2021) Deepfake videos detection using self-supervised decoupling network. In: 2021 IEEE International conference on multimedia and expo (ICME). IEEE, pp. 1\u20136","DOI":"10.1109\/ICME51207.2021.9428368"},{"key":"8271_CR43","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Yamagishi J, Echizen I (2019) Capsule-forensics: Using capsule networks to detect forged images and videos. In: ICASSP 2019-2019 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp. 2307\u20132311","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"8271_CR44","unstructured":"Li Y, Lyu S (2018) Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656"},{"key":"8271_CR45","doi-asserted-by":"crossref","unstructured":"G\u00fcera D, Delp EJ (2018) Deepfake video detection using recurrent neural networks. In: 15th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 1\u20136","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"8271_CR46","doi-asserted-by":"crossref","unstructured":"Hu J, Liao X, Liang J, Zhou W, Qin Z (2022) Finfer: Frame inference-based deepfake detection for high-visual-quality videos. In: Proceedings of the AAAI conference on artificial intelligence, pp 951\u2013959","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"8271_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109114","author":"Wang Gaojian","year":"2022","unstructured":"Gaojian Wang, Qian Jiang, Xin Jin, Wei Li, Xiaohui Cui (2022) Mc-lcr: multimodal contrastive classification by locally correlated representations for effective face forgery detection. Knowl Based Syst. https:\/\/doi.org\/10.1016\/j.knosys.2022.109114","journal-title":"Knowl Based Syst"},{"key":"8271_CR48","unstructured":"Durall R, Keuper M, Pfreundt FJ, Keuper J (2019) Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686"},{"key":"8271_CR49","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee JY, Kweon IS (2018) Cbam: Convolutional block attention module. In: European conference on computer vision","DOI":"10.1007\/978-3-030-01234-2_1"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08271-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08271-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08271-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T17:30:22Z","timestamp":1682357422000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08271-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":49,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["8271"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08271-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,31]]},"assertion":[{"value":"18 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}