{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:28:52Z","timestamp":1772886532484,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736120"],"award-info":[{"award-number":["U1736120"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936214"],"award-info":[{"award-number":["U1936214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["20ZR1419700"],"award-info":[{"award-number":["20ZR1419700"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00530-021-00756-y","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T02:02:41Z","timestamp":1614218561000},"page":"353-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Low-complexity fake face detection based on forensic similarity"],"prefix":"10.1007","volume":"27","author":[{"given":"Zhaoguang","family":"Pan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4510-7883","authenticated-orcid":false,"given":"Yanli","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"756_CR1","unstructured":"Deepfakes github. http:\/\/github.com\/deepfakes\/faceswap (2018). Accessed 29 Oct 2018"},{"key":"756_CR2","unstructured":"Faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap\/ (2018). Accessed 29 Oct 2018"},{"key":"756_CR3","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhfer, M., Stamminger, M., Theobalt, C., Niener, M.: Face2face: real-time face capture and reenactment of rgb videos. In: IEEE conference on computer vision pattern recognition (2016)","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"756_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollhfer, M., Niener, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. 38(4), 1\u201312 (2019)","journal-title":"ACM Trans. Graph."},{"key":"756_CR5","unstructured":"Zao. https:\/\/apps.apple.com\/cn\/app\/zao\/id1465199127 (2018). Accessed 16 Sept 2019"},{"key":"756_CR6","unstructured":"Fakeapp. https:\/\/www.fakeapp.com\/ (2018). Accessed 1 Sept 2018"},{"key":"756_CR7","unstructured":"Feng, G., Zhang, X., Ren, Y., Qian, Z., Li, S.: Diversity-based cascade filters for jpeg steganalysis. In: IEEE transactions on circuits and systems for video technology, p. 1 (2019)"},{"key":"756_CR8","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.C., Lyu, S.: In ictu oculi: exposing ai generated fake face videos by detecting eye blinking. arXiv preprint arXiv:1806.02877 (2018)","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"756_CR9","unstructured":"Li, Y., Lyu, S.: Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656 (2018)"},{"key":"756_CR10","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE winter applications of computer vision workshops (WACVW) (2019)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"756_CR11","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. Computer. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"756_CR12","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, F.F.: Imagenet: a large-scale hierarchical image database. In: IEEE conference on computer vision pattern recognition (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"756_CR13","doi-asserted-by":"crossref","unstructured":"Rssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niener, M.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"756_CR14","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: a new dataset for deepfake forensics. arXiv preprint arXiv:1909.12962 (2019)"},{"key":"756_CR15","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision anchollet 2017 xceptiond pattern recognition, pp. 1251\u20131258 (2016)","DOI":"10.1109\/CVPR.2017.195"},{"key":"756_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. Inf. Fusion 64, 131\u2013148 (2020)","journal-title":"Inf. Fusion"},{"issue":"3","key":"756_CR17","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1111\/j.1467-8659.2004.00799.x","volume":"23","author":"V Blanz","year":"2010","unstructured":"Blanz, V., Scherbaum, K., Vetter, T., Seidel, H.P.: Exchanging faces in images. Comput. Graph. Forum 23(3), 669\u2013676 (2010)","journal-title":"Comput. Graph. Forum"},{"key":"756_CR18","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: Fsgan: subject agnostic face swapping and reenactment. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 7184\u20137193 (2019)","DOI":"10.1109\/ICCV.2019.00728"},{"key":"756_CR19","doi-asserted-by":"crossref","unstructured":"Dale, K., Sunkavalli, K., Johnson, M.K., Vlasic, D., Matusik, W., Pfister, H.: Video face replacement. In: Proceedings of the 2011 SIGGRAPH Asia conference, pp. 1\u201310 (2011)","DOI":"10.1145\/2070781.2024164"},{"issue":"4","key":"756_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3263919","volume":"36","author":"I Kemelmacher-Shlizerman","year":"2017","unstructured":"Kemelmacher-Shlizerman, I., Kemelmacher-Shlizerman, I., Kemelmacher-Shlizerman, I.: Synthesizing Obama: learning lip sync from audio. ACM Trans. Graph. 36(4), 1\u201313 (2017)","journal-title":"ACM Trans. Graph."},{"issue":"6","key":"756_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3130800.3130818","volume":"36","author":"H Averbuch-Elor","year":"2017","unstructured":"Averbuch-Elor, H., Cohen-Or, D., Kopf, J., Cohen, M.F.: Bringing portraits to life. ACM Trans. Graph. 36(6), 1\u201313 (2017)","journal-title":"ACM Trans. Graph."},{"key":"756_CR22","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 8261\u20138265. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"756_CR23","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: CVPR workshops, pp. 38\u201345 (2019)"},{"key":"756_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW) (2017)","DOI":"10.1109\/CVPRW.2017.229"},{"key":"756_CR25","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS) (2019)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"756_CR26","doi-asserted-by":"crossref","unstructured":"Jeon, H., Bang, Y., Woo, S.S.: Fdftnet: facing off fake images using fake detection fine-tuning network. arXiv preprint arXiv:2001.01265 (2020)","DOI":"10.1007\/978-3-030-58201-2_28"},{"key":"756_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Use of a capsule network to detect fake images and videos. arXiv (2019)","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"756_CR28","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 31 (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"756_CR29","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Guo, B.: Face x-ray for more general face forgery detection. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"756_CR30","doi-asserted-by":"crossref","unstructured":"Guera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS) (2018)","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"756_CR31","doi-asserted-by":"crossref","unstructured":"Chen, P., Liu, J., Liang, T., Zhou, G., Gao, H., Dai, J., Han, J.: Fsspotter: spotting face-swapped video by spatial and temporal clues. In: 2020 IEEE international conference on multimedia and expo (ICME), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICME46284.2020.9102914"},{"key":"756_CR32","unstructured":"Durall, R., Keuper, M., Pfreundt, F.J., Keuper, J.: Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686 (2019)"},{"key":"756_CR33","unstructured":"Chen, Z., Yang, H.: Manipulated face detector: joint spatial and frequency domain attention network. arXiv preprint arXiv:2005.02958 (2020)"},{"key":"756_CR34","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"756_CR35","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp. 448\u2013456. PMLR (2015)"},{"key":"756_CR36","doi-asserted-by":"crossref","unstructured":"Xu, L., Choy, C.S., Li, Y.W.: Deep sparse rectifier neural networks for speech denoising. In: IEEE international workshop on acoustic signal enhancement (2016)","DOI":"10.1109\/IWAENC.2016.7602891"},{"key":"756_CR37","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TIFS.2019.2924552","volume":"15","author":"O Mayer","year":"2019","unstructured":"Mayer, O., Stamm, M.C.: Forensic similarity for digital images. IEEE Trans. Inf. Forensics Secur. 15, 1331\u20131346 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"756_CR38","doi-asserted-by":"crossref","unstructured":"Lee, H.S., Tso, Y., Chang, Y.F., Wang, H.M., Jeng, S.K.: Speaker verification using kernel-based binary classifiers with binary operation derived features. In: IEEE international conference on acoustics (2014)","DOI":"10.1109\/ICASSP.2014.6853880"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00756-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00756-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00756-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,18]],"date-time":"2022-12-18T22:42:01Z","timestamp":1671403321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00756-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["756"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00756-y","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}