{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:09:50Z","timestamp":1773180590992,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research Center of Security Video and Image Processing Engineering Technology of Guizhou (China) under Grant SRC-Open Project","award":["[2020]001]"],"award-info":[{"award-number":["[2020]001]"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00530-023-01214-7","type":"journal-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T02:02:13Z","timestamp":1705629733000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detecting facial manipulated images via one-class domain generalization"],"prefix":"10.1007","volume":"30","author":[{"given":"Pengxiang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zhiyuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Mei","sequence":"additional","affiliation":[]},{"given":"jie","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,19]]},"reference":[{"key":"1214_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2807385","journal-title":"IEEE Access"},{"key":"1214_CR2","unstructured":"Aneja, S., Nie\u00dfner, M.: Generalized zero and few-shot transfer for facial forgery detection, (2020).  arXiv preprint arXiv:2006.11863. Accessed 30 Nov 2021"},{"key":"1214_CR3","doi-asserted-by":"publisher","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1800\u20131807 (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"1214_CR4","unstructured":"Chu, X., Jin, Y., Zhu, W., Wang, Y., Wang, X., Zhang, S., Mei, H.: DNA: domain generalization with diversified neural averaging. In: Proceedings of the 39th International Conference on Machine Learning, vol. 162, pp. 4010\u20134034 (2022)"},{"key":"1214_CR5","doi-asserted-by":"publisher","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: On the detection of digital face manipulation. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5780\u20135789 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00582","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"1214_CR6","unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., Ferrer, C.C.: The deepfake detection challenge (dfdc) preview dataset (2019). arXiv preprint arXiv:1910.08854. Accessed 30 Nov 2021"},{"key":"1214_CR7","doi-asserted-by":"publisher","unstructured":"Durall, R., Keuper, M., Keuper, J.: Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7887\u20137896 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00791","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"1214_CR8","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6nherr, L., Fischer, A., Kolossa, D., Holz, T.: Leveraging frequency analysis for deep fake image recognition. In: Proceedings of the 37th International Conference on Machine Learning, vol. 119, pp. 3247\u20133258 (2020)"},{"key":"1214_CR9","unstructured":"Ganin, Y., Lempitsky, V.: Unsupervised domain adaptation by backpropagation. In: Proceedings of the 32nd International Conference on Machine Learning, vol. 37, pp. 1180\u20131189 (2015)"},{"issue":"1","key":"1214_CR10","first-page":"2096","volume":"17","author":"Y Ganin","year":"2016","unstructured":"Ganin, Y., Ustinova, E., Ajakan, H., Germain, P., Larochelle, H., Laviolette, F., Marchand, M., Lempitsky, V.: Domain-adversarial training of neural networks. J. Mach. Learn. Res. 17(1), 2096\u20132130 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"1214_CR11","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: Imagenet-trained cnns are biased towards texture; increasing shape bias improves accuracy and robustness, (2018). arXiv preprint arXiv:1811.12231. Accessed 15 Sept 2022"},{"key":"1214_CR12","first-page":"1","volume":"27","author":"I Goodfellow","year":"2014","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Advances in Neural Information Processing Systems. 27, 1\u20139 (2014)","journal-title":"Advances in Neural Information Processing Systems."},{"key":"1214_CR13","doi-asserted-by":"crossref","unstructured":"Huang, Y., Juefei-Xu, F., Wang, R., Xie, X., Ma, L., Li, J., Miao, W., Liu, Y., Pu, G.: Fakelocator: robust localization of gan-based face manipulations via semantic segmentation networks with bells and whistles, (2020). arXiv preprint arXiv:2001.09598. Accessed 15 Sept 2022","DOI":"10.1109\/TIFS.2022.3141262"},{"key":"1214_CR14","doi-asserted-by":"publisher","first-page":"83144","DOI":"10.1109\/ACCESS.2020.2988660","volume":"8","author":"T Jung","year":"2020","unstructured":"Jung, T., Kim, S., Kim, K.: Deepvision: deepfakes detection using human eye blinking pattern. IEEE Access 8, 83144\u201383154 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988660","journal-title":"IEEE Access"},{"key":"1214_CR15","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation, (2017). arXiv preprint arXiv:1710.10196. Accessed 20 Oct 2022"},{"issue":"12","key":"1214_CR16","doi-asserted-by":"publisher","first-page":"4217","DOI":"10.1109\/TPAMI.2020.2970919","volume":"43","author":"T Karras","year":"2021","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. IEEE Trans. Pattern Anal. Mach. Intell. 43(12), 4217\u20134228 (2021). https:\/\/doi.org\/10.1109\/TPAMI.2020.2970919","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1214_CR17","doi-asserted-by":"publisher","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of stylegan. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8107\u20138116 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00813","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"1214_CR18","unstructured":"Kim, D.-K., Kim, D., Kim, K.: Facial manipulation detection based on the color distribution analysis in edge region, (2021). arXiv preprint arXiv:2102.01381. Accessed 20 Oct 2022"},{"key":"1214_CR19","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"1214_CR20","unstructured":"Kowalski, M.: Faceswap, (2018). https:\/\/github.com\/marekkowalski\/faceswap"},{"key":"1214_CR21","doi-asserted-by":"publisher","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: a large-scale challenging dataset for deepfake forensics. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3204\u20133213 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00327","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"1214_CR22","unstructured":"Liu, D., Dang, Z., Peng, C., Zheng, Y., Li, S., Wang, N., Gao, X.: Fedforgery: generalized face forgery detection with residual federated learning, (2022). arXiv preprint arXiv:2210.09563. Accessed 20 Oct 2022"},{"key":"1214_CR23","doi-asserted-by":"publisher","unstructured":"Liu, Z., Qi, X., Torr, P.H.S.: Global texture enhancement for fake face detection in the wild. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8057\u20138066 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00808","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"1214_CR24","doi-asserted-by":"publisher","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), pp. 83\u201392 (2019). https:\/\/doi.org\/10.1109\/WACVW.2019.00020","DOI":"10.1109\/WACVW.2019.00020"},{"key":"1214_CR25","first-page":"1","volume":"29","author":"Y Pu","year":"2016","unstructured":"Pu, Y., Gan, Z., Henao, R., Yuan, X., Li, C., Stevens, A., Carin, L.: Variational autoencoder for deep learning of images, labels and captions. Advances in Neural Information Processing Systems. 29, 1\u20139 (2016)","journal-title":"Advances in Neural Information Processing Systems."},{"key":"1214_CR26","unstructured":"Rangwani, H., Aithal, S.K., Mishra, M., Jain, A., Radhakrishnan, V.B.: A closer look at smoothness in domain adversarial training. In: Proceedings of the 39th International Conference on Machine Learning, vol. 162, pp. 18378\u201318399, (2022)"},{"key":"1214_CR27","doi-asserted-by":"publisher","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Niessner, M.: Faceforensics++: learning to detect manipulated facial images. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311 (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00009","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1214_CR28","doi-asserted-by":"publisher","unstructured":"Sun, K., Liu, H., Ye, Q., Gao, Y., Liu, J., Shao, L., Ji, R.: Domain general face forgery detection by learning to weight. In: Proceedings of the AAAI conference on artificial intelligence, vol. 35, pp. 2638\u20132646 (2021). https:\/\/doi.org\/10.1609\/aaai.v35i3.16367","DOI":"10.1609\/aaai.v35i3.16367"},{"key":"1214_CR29","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073640","author":"S Suwajanakorn","year":"2017","unstructured":"Suwajanakorn, S., Seitz, S.M., Kemelmacher-Shlizerman, I.: Synthesizing obama: learning lip sync from audio. ACM Trans. Graph. (2017). https:\/\/doi.org\/10.1145\/3072959.3073640","journal-title":"ACM Trans. Graph."},{"issue":"1145\/3306346","key":"1214_CR30","first-page":"3323035","volume":"10","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. 10(1145\/3306346), 3323035 (2019)","journal-title":"ACM Trans. Graph."},{"key":"1214_CR31","doi-asserted-by":"publisher","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of rgb videos. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2387\u20132395 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.262","DOI":"10.1109\/CVPR.2016.262"},{"key":"1214_CR32","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: a survey of face manipulation and fake detection. Inf. Fusion 64, 131\u2013148 (2020). https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Inf. Fusion"},{"key":"1214_CR33","unstructured":"Tora, M.: Deepfakes, (2018). https:\/\/github.com\/deepfakes\/faceswap\/tree\/v2.0.0"},{"key":"1214_CR34","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/ACCESS.2022.3232290","volume":"11","author":"V-N Tran","year":"2023","unstructured":"Tran, V.-N., Kwon, S.-G., Lee, S.-H., Le, H.-S., Kwon, K.-R.: Generalization of forgery detection with meta deepfake detection model. IEEE Access 11, 535\u2013546 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2022.3232290","journal-title":"IEEE Access"},{"key":"1214_CR35","unstructured":"Van Der Maaten, L.: Barnes-hut-sne, (2013). arXiv preprint arXiv:1710.10196. Accessed 15 Apr 2021"},{"key":"1214_CR36","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TIFS.2022.3146781","volume":"17","author":"P Yu","year":"2022","unstructured":"Yu, P., Fei, J., Xia, Z., Zhou, Z., Weng, J.: Improving generalization by commonality learning in face forgery detection. IEEE Trans. Inf. Forensics Secur. 17, 547\u2013558 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3146781","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1214_CR37","doi-asserted-by":"publisher","unstructured":"Zhang, X., Karaman, S., Chang, S.-F.: Detecting and simulating artifacts in gan fake images. In: 2019 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136, (2019). https:\/\/doi.org\/10.1109\/WIFS47025.2019.9035107","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"1214_CR38","doi-asserted-by":"publisher","unstructured":"Zhang, X., Wang, S., Liu, C., Zhang, M., Liu, X., Xie, H.: Thinking in patch: towards generalizable forgery detection with patch transformation. In: Duc Nghia Pham, Thanaruk Theeramunkong, Guido Governatori, and Fenrong Liu, editors, PRICAI 2021: Trends in Artificial Intelligence, pp. 337\u2013352, (2021). https:\/\/doi.org\/10.1007\/978-3-030-89370-5_25","DOI":"10.1007\/978-3-030-89370-5_25"},{"key":"1214_CR39","doi-asserted-by":"publisher","unstructured":"Zhao, H., Wei, T., Zhou, W., Zhang, W., Chen, D., Yu, N.: Multi-attentional deepfake detection. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2185\u20132194, (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00222","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1214_CR40","doi-asserted-by":"publisher","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1831\u20131839, (2017). https:\/\/doi.org\/10.1109\/CVPRW.2017.229","DOI":"10.1109\/CVPRW.2017.229"},{"key":"1214_CR41","doi-asserted-by":"publisher","unstructured":"Zhu, J.-Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: 2017 IEEE International Conference on Computer Vision (ICCV), pp. 2242\u20132251, (2017). https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244"},{"key":"1214_CR42","doi-asserted-by":"publisher","unstructured":"Zhuang, W., Chu, Q., Tan, Z., Liu, Q., Yuan, H., Miao, C., Luo, Z., Yu, N.: Uia-vit: unsupervised inconsistency-aware method based on vision transformer for face forgery detection. In: S. Avidan, G. Brostow, M. Ciss\u00e9, G. Maria Farinella, T. Hassner, editors, Computer Vision \u2013 ECCV 2022, pp. 391\u2013407, (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_23","DOI":"10.1007\/978-3-031-20065-6_23"},{"key":"1214_CR43","doi-asserted-by":"publisher","unstructured":"Zhuang, W., Chu, Q., Yuan, H., Miao, C., Liu, B., Yu, N.: Towards intrinsic common discriminative features learning for face forgery detection using adversarial learning. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136, (2022). https:\/\/doi.org\/10.1109\/ICME52920.2022.9859586","DOI":"10.1109\/ICME52920.2022.9859586"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01214-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T06:15:04Z","timestamp":1707891304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01214-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1214"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01214-7","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,19]]},"assertion":[{"value":"8 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"33"}}