{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:08:13Z","timestamp":1773702493375,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Punjab Higher Education Commission of Pakistan","award":["PHEC\/ARA\/PIRCA\/20527\/21"],"award-info":[{"award-number":["PHEC\/ARA\/PIRCA\/20527\/21"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1815724"],"award-info":[{"award-number":["1815724"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Michigan Translational Research and Commercialization (MTRAC) Advanced Computing Technologies","award":["292883"],"award-info":[{"award-number":["292883"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s00530-023-01092-z","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T19:02:10Z","timestamp":1682535730000},"page":"2165-2180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["E-Cap Net: an efficient-capsule network for shallow and deepfakes forgery detection"],"prefix":"10.1007","volume":"29","author":[{"given":"Hafsa","family":"Ilyas","sequence":"first","affiliation":[]},{"given":"Ali","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Khalid Mahmood","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Aun","family":"Irtaza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"1092_CR1","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Lee, W.: The creation and detection of deepfakes: A survey. ACM Computing Surveys (CSUR), 54(1), 1\u201341 (2021)","DOI":"10.1145\/3425780"},{"key":"1092_CR2","doi-asserted-by":"crossref","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131\u2013148 (2020)","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"1092_CR3","doi-asserted-by":"crossref","unstructured":"Masood, M., Nawaz, M., Malik, K.M., Javed, A., Irtaza, A., Malik, H.: Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Applied Intelligence, 53, 3974\u20134026 (2022)","DOI":"10.1007\/s10489-022-03766-z"},{"key":"1092_CR4","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Advances in neural information processing systems (NIPS), 27, 2672\u20132680 (2014)"},{"key":"1092_CR5","unstructured":"Imagined by a GAN (generative adversarial network) StyleGAN2 (Dec 2019). \"https:\/\/thispersondoesnotexist.com\/\", Accessed on July 10, 2022"},{"key":"1092_CR6","unstructured":"FaceSwap. \"https:\/\/github.com\/MarekKowalski\/FaceSwap\/\", Accessed on June 20, 2022"},{"key":"1092_CR7","unstructured":"DeepFakes. \"https:\/\/github.com\/deepfakes\/faceswap\/\", Accessed on June 20, 2022"},{"key":"1092_CR8","unstructured":"Li, L., Bao, J., Yang, H., Chen, D., Wen, F.: Faceshifter: Towards high fidelity and occlusion aware face swapping. arXiv preprint arXiv:1912.13457,  (2019)"},{"key":"1092_CR9","doi-asserted-by":"crossref","unstructured":"Wang, X., Li, Y., Zhang, H., Shan, Y.: Towards real-world blind face restoration with generative facial prior. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 9168\u20139178","DOI":"10.1109\/CVPR46437.2021.00905"},{"key":"1092_CR10","doi-asserted-by":"crossref","unstructured":"Marra, F., Saltori, C., Boato, G., Verdoliva, L.: Incremental learning for the detection and classification of gan-generated images. In: 2019 IEEE international workshop on information forensics and security (WIFS), 2019: IEEE, pp. 1\u20136","DOI":"10.1109\/WIFS47025.2019.9035099"},{"key":"1092_CR11","doi-asserted-by":"crossref","unstructured":"Khalid, H., Woo, S.S.: Oc-fakedect: Classifying deepfakes using one-class variational autoencoder. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, 2020, pp. 656\u2013657","DOI":"10.1109\/CVPRW50498.2020.00336"},{"key":"1092_CR12","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: Computer Vision\u2014ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XII, 2020, pp. 86\u2013103. Springer","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"1092_CR13","doi-asserted-by":"crossref","unstructured":"Kim, W., Suh, S., Han, J.J.: Face liveness detection from a single image via diffusion speed model. IEEE transactions on Image processing, 24(8), 2456\u20132465 (2015)","DOI":"10.1109\/TIP.2015.2422574"},{"key":"1092_CR14","doi-asserted-by":"crossref","unstructured":"Qiu, X., Li, H., Luo, W., Huang, J.: A universal image forensic strategy based on steganalytic model. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, 2014, pp. 165\u2013170","DOI":"10.1145\/2600918.2600941"},{"key":"1092_CR15","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 5\u201310","DOI":"10.1145\/2909827.2930786"},{"key":"1092_CR16","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., Echizen, I.: Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE workshop on information forensics and security (WIFS), 2017: IEEE, pp. 1\u20136","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"1092_CR17","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"1092_CR18","unstructured":"Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J., Aila, T.: Training generative adversarial networks with limited data.  Advances in neural information processing systems, 33, 12104\u201312114 (2020)"},{"key":"1092_CR19","doi-asserted-by":"crossref","unstructured":"Mo, H., Chen, B., Luo, W.: Fake faces identification via convolutional neural network. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018, pp. 43\u201347","DOI":"10.1145\/3206004.3206009"},{"key":"1092_CR20","doi-asserted-by":"crossref","unstructured":"Tariq, S., Lee, S., Kim, H., Shin, Y., Woo, S.S.: Detecting both machine and human created fake face images in the wild. In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018, pp. 81\u201387","DOI":"10.1145\/3267357.3267367"},{"key":"1092_CR21","doi-asserted-by":"crossref","unstructured":"Nataraj, L., Mohammed, T.M., Manjunath, B.S., Chandrasekaran, S., Flenner, A., Bappy, J.H., Roy-Chowdhury, A.K.: Detecting GAN generated fake images using co-occurrence matrices. Electronic Imaging, 5, 5321\u20135327 (2019)","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"key":"1092_CR22","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.G.: Wilddeepfake: A challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM International Conference on Multimedia, 2020, pp. 2382\u20132390","DOI":"10.1145\/3394171.3413769"},{"key":"1092_CR23","doi-asserted-by":"crossref","unstructured":"Guo, Z., Yang, G., Chen, J., Sun, X.: Fake face detection via adaptive manipulation traces extraction network. Computer Vision and Image Understanding, 204, 103170 (2021)","DOI":"10.1016\/j.cviu.2021.103170"},{"key":"1092_CR24","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"1092_CR25","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018: IEEE, pp. 1\u20136","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"1092_CR26","unstructured":"Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., Natarajan, P.: Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI), 3(1), 80\u201387 (2019)"},{"key":"1092_CR27","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019: IEEE, pp. 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"1092_CR28","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), 2019: IEEE, pp. 83\u201392","DOI":"10.1109\/WACVW.2019.00020"},{"key":"1092_CR29","doi-asserted-by":"crossref","unstructured":"Pawan, S., Rajan, J.: Capsule networks for image classification: A review. Neurocomputing, 509, 102\u2013120 (2022)","DOI":"10.1016\/j.neucom.2022.08.073"},{"key":"1092_CR30","doi-asserted-by":"crossref","unstructured":"Hinton, G.E., Krizhevsky, A., Wang, S.D.: Transforming auto-encoders. In: Artificial Neural Networks and Machine Learning\u2014ICANN 2011: 21st International Conference on Artificial Neural Networks, Espoo, Finland, June 14\u201317, 2011, Proceedings, Part I 21, 2011, pp. 44\u201351. Springer","DOI":"10.1007\/978-3-642-21735-7_6"},{"key":"1092_CR31","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, (2014)"},{"key":"1092_CR32","doi-asserted-by":"crossref","unstructured":"Wu, X., He, R., Sun, Z., Tan, T.: A light CNN for deep face representation with noisy labels. IEEE Transactions on Information Forensics and Security, 13(11), 2884\u20132896 (2018)","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"1092_CR33","unstructured":"Sabour, S., Frosst, N., Hinton, G.E.: Dynamic routing between capsules. Advances in neural information processing systems, 30, 3859\u20133869 (2017)"},{"key":"1092_CR34","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: CVPR Workshops, 2019, vol. 1, p. 38"},{"key":"1092_CR35","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2019, pp. 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1092_CR36","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: On the detection of digital face manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern recognition, 2020, pp. 5781\u20135790","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"1092_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Processing Letters, 23(10), 1499\u20131503 (2016)","DOI":"10.1109\/LSP.2016.2603342"},{"key":"1092_CR38","doi-asserted-by":"crossref","unstructured":"Ilyas, H., Irtaza, A., Javed, A., Malik, K.M.: Deepfakes examiner: An end-to-end deep learning model for deepfakes videos detection. In: 2022 16th International Conference on Open Source Systems and Technologies (ICOSST), 2022: IEEE, pp. 1\u20136","DOI":"10.1109\/ICOSST57195.2022.10016871"},{"key":"1092_CR39","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 14923\u201314932","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"1092_CR40","doi-asserted-by":"crossref","unstructured":"Kohli, A., Gupta, A.: Detecting DeepFake, FaceSwap and Face2Face facial forgeries using frequency CNN. Multimedia Tools and Applications, 80(12), 18461\u201318478 (2021)","DOI":"10.1007\/s11042-020-10420-8"},{"key":"1092_CR41","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 3207\u20133216","DOI":"10.1109\/CVPR42600.2020.00327"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01092-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01092-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01092-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T10:27:54Z","timestamp":1689330474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01092-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1092"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01092-z","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,26]]},"assertion":[{"value":"4 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}