{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T11:42:27Z","timestamp":1772710947377,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62267007"],"award-info":[{"award-number":["62267007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Gansu Provincial Department of Education Industrial Support Plan Project","award":["2022CYZC-16"],"award-info":[{"award-number":["2022CYZC-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00530-024-01357-1","type":"journal-article","created":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T00:02:21Z","timestamp":1716595341000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Face forgery detection by progressively enhancing spatial and frequency-aware features"],"prefix":"10.1007","volume":"30","author":[{"given":"Yongfeng","family":"Qi","sequence":"first","affiliation":[]},{"given":"Shengcong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hengrui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Anye","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Huili","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Panpan","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"key":"1357_CR1","doi-asserted-by":"crossref","unstructured":"Lee, C.-H., Liu, Z., Wu, L., Luo, P.: Maskgan: towards diverse and interactive facial image manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5549\u20135558 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00559"},{"key":"1357_CR2","doi-asserted-by":"crossref","unstructured":"Shen, Y., Gu, J., Tang, X., Zhou, B.: Interpreting the latent space of gans for semantic face editing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9243\u20139252 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00926"},{"key":"1357_CR3","doi-asserted-by":"crossref","unstructured":"Wu, R., Zhang, G., Lu, S., Chen, T.: Cascade ef-gan: progressive facial expression editing with local focuses. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5021\u20135030 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00507"},{"key":"1357_CR4","unstructured":"Tora, M.: Deepfakes (2018). https:\/\/github.com\/deepfakes\/faceswap\/tree\/v2.0.0. Accessed 29 Nov 2023"},{"key":"1357_CR5","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., Nie\u00dfner, M.: Face2face: real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2387\u20132395 (2016). IEEE","DOI":"10.1109\/CVPR.2016.262"},{"key":"1357_CR6","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1251\u20131258 (2017). IEEE","DOI":"10.1109\/CVPR.2017.195"},{"key":"1357_CR7","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5001\u20135010 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"1357_CR8","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., Shao, J.: Thinking in frequency: face forgery detection by mining frequency-aware clues. In: European Conference on Computer Vision, pp. 86\u2013103 (2020). Springer","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"1357_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2185\u20132194 (2021). IEEE","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1357_CR10","doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yamasaki, T.: Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 18720\u201318729 (2022). IEEE","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"1357_CR11","doi-asserted-by":"crossref","unstructured":"Dong, S., Wang, J., Ji, R., Liang, J., Fan, H., Ge, Z.: Implicit identity leakage: the stumbling block to improving deepfake detection generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3994\u20134004 (2023). IEEE","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"1357_CR12","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., Lyu, S.: Exposing deep fakes using inconsistent head poses. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8261\u20138265 (2019). IEEE","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"1357_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.-C., Lyu, S.: In ictu oculi: exposing ai created fake videos by detecting eye blinking. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20137 (2018). IEEE","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"1357_CR14","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., Li, H.: Protecting world leaders against deep fakes. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 38\u201345 (2019). IEEE"},{"key":"1357_CR15","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20137 (2018). IEEE","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"1357_CR16","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., Echizen, I.: Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2017). IEEE","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"1357_CR17","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., Jain, A.K.: On the detection of digital face manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5781\u20135790 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"1357_CR18","doi-asserted-by":"crossref","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, pp. 667\u2013684 (2020). Springer","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"1357_CR19","doi-asserted-by":"crossref","unstructured":"Qi, H., Guo, Q., Juefei-Xu, F., Xie, X., Ma, L., Feng, W., Liu, Y., Zhao, J.: Deeprhythm: exposing deepfakes with attentional visual heartbeat rhythms. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 4318\u20134327 (2020)","DOI":"10.1145\/3394171.3413707"},{"key":"1357_CR20","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., Yu, N.: Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 772\u2013781 (2021). IEEE","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"1357_CR21","doi-asserted-by":"crossref","unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., Yi, R.: Exploiting fine-grained face forgery clues via progressive enhancement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), vol. 36, pp. 735\u2013743 (2022). AAAI","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"1357_CR22","doi-asserted-by":"crossref","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., Ji, R.: Local relation learning for face forgery detection. In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), vol. 35, pp. 1081\u20131088 (2021). AAAI","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"1357_CR23","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., Liu, W.: Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16317\u201316326 (2021). IEEE","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"1357_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2023.104686","volume":"135","author":"Z Fu","year":"2023","unstructured":"Fu, Z., Chen, X., Liu, D., Qu, X., Dong, J., Zhang, X., Ji, S.: Multi-level feature disentanglement network for cross-dataset face forgery detection. Image Vis Comput 135, 104686 (2023)","journal-title":"Image Vis Comput"},{"key":"1357_CR25","unstructured":"Chen, Z., Yang, H.: Manipulated face detector: Joint spatial and frequency domain attention network, 1(2), 4. arXiv preprint arXiv:2005.02958 (2020)"},{"key":"1357_CR26","doi-asserted-by":"publisher","first-page":"5410","DOI":"10.1109\/TMM.2023.3333206","volume":"26","author":"Y Hu","year":"2023","unstructured":"Hu, Y., Gao, J., Dong, J., Fan, B., Liu, H.: Exploring rich semantics for open-set action recognition. IEEE Trans. Multimed. 26, 5410\u20135421 (2023)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"1357_CR27","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/TCSVT.2021.3075470","volume":"32","author":"J Gao","year":"2021","unstructured":"Gao, J., Xu, C.: Learning video moment retrieval without a single annotated video. IEEE Trans. Circuits Syst. Video Technol. 32(3), 1646\u20131657 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"10","key":"1357_CR28","doi-asserted-by":"publisher","first-page":"3476","DOI":"10.1109\/TPAMI.2020.2985708","volume":"43","author":"J Gao","year":"2020","unstructured":"Gao, J., Zhang, T., Xu, C.: Learning to model relationships for zero-shot video classification. IEEE Trans. Pattern Anal. Mach. Intell. 43(10), 3476\u20133491 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"1357_CR29","doi-asserted-by":"publisher","first-page":"15949","DOI":"10.1109\/TPAMI.2023.3311447","volume":"45","author":"J Gao","year":"2023","unstructured":"Gao, J., Chen, M., Xu, C.: Vectorized evidential learning for weakly-supervised temporal action localization. IEEE Trans. Pattern Anal. Mach. Intell. 45(12), 15949\u201315963 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1357_CR30","unstructured":"Tan, M., Le, Q.: Efficientnet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114 (2019). PMLR"},{"key":"1357_CR31","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). IEEE","DOI":"10.1109\/CVPR.2016.90"},{"key":"1357_CR32","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., Echizen, I.: Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2307\u20132311 (2019). IEEE","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"1357_CR33","doi-asserted-by":"crossref","unstructured":"Huang, B., Wang, Z., Yang, J., Ai, J., Zou, Q., Wang, Q., Ye, D.: Implicit identity driven deepfake face swapping detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4490\u20134499 (2023). IEEE","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"1357_CR34","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., Echizen, I.: Multi-task learning for detecting and segmenting manipulated facial images and videos. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20138 (2019). IEEE","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"1357_CR35","doi-asserted-by":"crossref","unstructured":"Fei, J., Dai, Y., Yu, P., Shen, T., Xia, Z., Weng, J.: Learning second order local anomaly for general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20270\u201320280 (2022). IEEE","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"1357_CR36","unstructured":"Dong, X., Bao, J., Chen, D., Zhang, W., Yu, N., Chen, D., Wen, F., Guo, B.: Identity-driven deepfake detection. arXiv preprint arXiv:2012.03930 (2020)"},{"key":"1357_CR37","doi-asserted-by":"crossref","unstructured":"Sun, K., Yao, T., Chen, S., Ding, S., Li, J., Ji, R.: Dual contrastive learning for general face forgery detection. In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), vol. 36, pp. 2316\u20132324 (2022). AAAI","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"1357_CR38","doi-asserted-by":"crossref","unstructured":"Zhao, T., Xu, X., Xu, M., Ding, H., Xiong, Y., Xia, W.: Learning self-consistency for deepfake detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 15023\u201315033 (2021). IEEE","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"1357_CR39","doi-asserted-by":"crossref","unstructured":"Bai, W., Liu, Y., Zhang, Z., Li, B., Hu, W.: Aunet: learning relations between action units for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24709\u201324719 (2023). IEEE","DOI":"10.1109\/CVPR52729.2023.02367"},{"issue":"4","key":"1357_CR40","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TCSVT.2022.3217950","volume":"33","author":"X Li","year":"2022","unstructured":"Li, X., Ni, R., Yang, P., Fu, Z., Zhao, Y.: Artifacts-disentangled adversarial learning for deepfake detection. IEEE Trans. Circuits Syst. Video Technol. 33(4), 1658\u20131670 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1357_CR41","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1109\/TIFS.2023.3235579","volume":"18","author":"G Li","year":"2023","unstructured":"Li, G., Zhao, X., Cao, Y.: Forensic symmetry for deepfakes. IEEE Trans. Inf. Forensics Secur. 18, 1095\u20131110 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"1357_CR42","doi-asserted-by":"publisher","first-page":"4854","DOI":"10.1109\/TCSVT.2021.3133859","volume":"32","author":"J Yang","year":"2021","unstructured":"Yang, J., Xiao, S., Li, A., Lu, W., Gao, X., Li, Y.: Msta-net: forgery detection by generating manipulation trace based on multi-scale self-texture attention. IEEE Trans. Circuits Syst. Video Technol. 32(7), 4854\u20134866 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1357_CR43","doi-asserted-by":"crossref","unstructured":"Miao, C., Chu, Q., Li, W., Gong, T., Zhuang, W., Yu, N.: Towards generalizable and robust face manipulation detection via bag-of-local-feature. arXiv preprint arXiv:2103.07915 (2021)","DOI":"10.1109\/VCIP53242.2021.9675331"},{"key":"1357_CR44","unstructured":"Wodajo, D., Atnafu, S.: Deepfake video detection using convolutional vision transformer. arXiv preprint arXiv:2102.11126 (2021)"},{"key":"1357_CR45","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., et al.: An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"1357_CR46","doi-asserted-by":"crossref","unstructured":"Wang, J., Wu, Z., Ouyang, W., Han, X., Chen, J., Jiang, Y.-G., Li, S.-N.: M2tr: Multi-modal multi-scale transformers for deepfake detection. In: Proceedings of the 2022 International Conference on Multimedia Retrieval (ICMR), pp. 615\u2013623 (2022). ACM","DOI":"10.1145\/3512527.3531415"},{"key":"1357_CR47","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1109\/TIFS.2022.3186803","volume":"17","author":"J Wang","year":"2022","unstructured":"Wang, J., Sun, Y., Tang, J.: Lisiam: localization invariance siamese network for deepfake detection. IEEE Trans. Inf. Forensics Secur. 17, 2425\u20132436 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1357_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-023-04462-2","volume":"53","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Jin, X., Gao, S., Wu, L., Yao, S., Jiang, Q.: Tan-gfd: generalizing face forgery detection based on texture information and adaptive noise mining. Appl. Intell. 53, 1\u201321 (2023)","journal-title":"Appl. Intell."},{"key":"1357_CR49","doi-asserted-by":"publisher","first-page":"8458","DOI":"10.1109\/TMM.2023.3237169","volume":"25","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Yang, G., Chen, J., Sun, X.: Exposing deepfake face forgeries with guided residuals. IEEE Trans. Multimed. 25, 8458\u20138470 (2023)","journal-title":"IEEE Trans. Multimed."},{"key":"1357_CR50","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIFS.2023.3324739","volume":"19","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Jia, Z., Wang, L., Wang, D., Yang, G., Kasabov, N.: Constructing new backbone networks via space-frequency interactive convolution for deepfake detection. IEEE Trans. Inf. Forensics Secur. 19, 401\u2013413 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1357_CR51","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., Wang, Z., Zhang, Y.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6458\u20136467 (2021). IEEE","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"1357_CR52","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","volume":"18","author":"C Miao","year":"2023","unstructured":"Miao, C., Tan, Z., Chu, Q., Liu, H., Hu, H., Yu, N.: F 2 trans: high-frequency fine-grained transformer for face forgery detection. IEEE Trans. Inf. Forensics Secur. 18, 1039\u20131051 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1357_CR53","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1053\u20131061 (2018). IEEE","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"7","key":"1357_CR54","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/LSP.2018.2822810","volume":"25","author":"F Wang","year":"2018","unstructured":"Wang, F., Cheng, J., Liu, W., Liu, H.: Additive margin softmax for face verification. IEEE Signal Process. Lett. 25(7), 926\u2013930 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"1357_CR55","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., Li, Z., Liu, W.: Cosface: large margin cosine loss for deep face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5265\u20135274 (2018). IEEE","DOI":"10.1109\/CVPR.2018.00552"},{"key":"1357_CR56","doi-asserted-by":"crossref","unstructured":"Song, L., Gong, D., Li, Z., Liu, C., Liu, W.: Occlusion robust face recognition based on mask learning with pairwise differential siamese network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 773\u2013782 (2019). IEEE","DOI":"10.1109\/ICCV.2019.00086"},{"key":"1357_CR57","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311 (2019). IEEE","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1357_CR58","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3207\u20133216 (2020). IEEE","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"1357_CR59","unstructured":"Dufour, N., Gully, A.: Contributing data to deepfake detection research. https:\/\/blog.research.google\/2019\/09\/contributing-data-to-deepfake-detection.html (2019). Accessed 29 Nov 2023"},{"key":"1357_CR60","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., Ferrer, C.C.: The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397 (2020)"},{"key":"1357_CR61","unstructured":"Kowalski, M.: Faceswap. https:\/\/github.com\/marekkowalski\/faceswap (2019). Accessed 29 Nov 2023"},{"issue":"4","key":"1357_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. Acm Trans. Graph. (TOG) 38(4), 1\u201312 (2019)","journal-title":"Acm Trans. Graph. (TOG)"},{"key":"1357_CR63","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.imavis.2016.01.002","volume":"47","author":"C Sagonas","year":"2016","unstructured":"Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S., Pantic, M.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3\u201318 (2016)","journal-title":"Image Vis. Comput."},{"key":"1357_CR64","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"1357_CR65","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"1357_CR66","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310 (2016). ACM","DOI":"10.1145\/2909827.2930786"},{"key":"1357_CR67","doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., Jiang, Y.-G.: Wilddeepfake: a challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 2382\u20132390 (2020). ACM","DOI":"10.1145\/3394171.3413769"},{"key":"1357_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2021.103170","volume":"204","author":"Z Guo","year":"2021","unstructured":"Guo, Z., Yang, G., Chen, J., Sun, X.: Fake face detection via adaptive manipulation traces extraction network. Comput. Vis. Image Underst. 204, 103170 (2021)","journal-title":"Comput. Vis. Image Underst."},{"key":"1357_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119361","volume":"215","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Yang, G., Zhang, D., Xia, M.: Rethinking gradient operator for exposing ai-enabled face forgeries. Expert Syst. Appl. 215, 119361 (2023)","journal-title":"Expert Syst. Appl."},{"key":"1357_CR70","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Agarwal, A., Sinha, S., Vatsa, M., Singh, R.: Md-csdnetwork: multi-domain cross stitched network for deepfake detection. In: 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021), pp. 1\u20138 (2021). IEEE","DOI":"10.1109\/FG52635.2021.9666937"},{"key":"1357_CR71","doi-asserted-by":"publisher","first-page":"4234","DOI":"10.1109\/TIFS.2021.3102487","volume":"16","author":"J Yang","year":"2021","unstructured":"Yang, J., Li, A., Xiao, S., Lu, W., Gao, X.: Mtd-net: learning to detect deepfakes images by multi-scale texture difference. IEEE Trans. Inf. Forensics Secur. 16, 4234\u20134245 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1357_CR72","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.ins.2022.03.026","volume":"596","author":"G Wang","year":"2022","unstructured":"Wang, G., Jiang, Q., Jin, X., Cui, X.: Ffr_fd: effective and fast detection of deepfakes via feature point defects. Inf. Sci. 596, 472\u2013488 (2022)","journal-title":"Inf. Sci."},{"key":"1357_CR73","doi-asserted-by":"crossref","unstructured":"Lu, W., Liu, L., Zhang, B., Luo, J., Zhao, X., Zhou, Y., Huang, J.: Detection of deepfake videos using long-distance attention. IEEE Trans. Neural Netw. Learn. Syst. 1\u201314 (2023)","DOI":"10.1109\/TNNLS.2022.3233063"},{"key":"1357_CR74","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 618\u2013626 (2017). IEEE","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01357-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01357-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01357-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:20:55Z","timestamp":1720200055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01357-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":74,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1357"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01357-1","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,24]]},"assertion":[{"value":"12 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"156"}}