{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T07:00:25Z","timestamp":1766127625304,"version":"3.48.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key R&D Program Guidance Projects of Heilongjiang Province","award":["No. GZ20210065"],"award-info":[{"award-number":["No. GZ20210065"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00530-025-01996-y","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T09:37:22Z","timestamp":1760002642000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A multi-label classification method combined with texture enhancement for deepfake face detection"],"prefix":"10.1007","volume":"31","author":[{"given":"Liwei","family":"Deng","sequence":"first","affiliation":[]},{"given":"Boda","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jiandong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"issue":"11","key":"1996_CR1","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020). https:\/\/doi.org\/10.1145\/3422622","journal-title":"Commun. ACM"},{"key":"1996_CR2","doi-asserted-by":"publisher","unstructured":"Hao, H., Baireddy, S., Reibman, A.R., Delp, E.J.: Far-gan for one-shot face reenactment, 2005\u201306402 (2020) https:\/\/doi.org\/10.48550\/arXiv.2005.06402","DOI":"10.48550\/arXiv.2005.06402"},{"key":"1996_CR3","doi-asserted-by":"publisher","unstructured":"Kim, H., Choi, Y., Kim, J., Yoo, S., Uh, Y.: Exploiting spatial dimensions of latent in gan for real-time image editing, 2104\u201314754 (2021) https:\/\/doi.org\/10.48550\/arXiv.2104.14754","DOI":"10.48550\/arXiv.2104.14754"},{"key":"1996_CR4","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: Fsgan: Subject agnostic face swapping and reenactment. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7184\u20137193"},{"key":"1996_CR5","unstructured":"Pumarola, A., Agudo, A., Martinez, A.M., Sanfeliu, A., Moreno-Noguer, F.: Ganimation: Anatomically-aware facial animation from a single image. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 818\u2013833"},{"issue":"3","key":"1996_CR6","doi-asserted-by":"publisher","first-page":"42273","DOI":"10.1016\/j.heliyon.2025.e42273","volume":"11","author":"R Sunil","year":"2025","unstructured":"Sunil, R., Mer, P., Diwan, A., Mahadeva, R., Sharma, A.: Exploring autonomous methods for deepfake detection: a detailed survey on techniques and evaluation. Heliyon 11(3), 42273 (2025). https:\/\/doi.org\/10.1016\/j.heliyon.2025.e42273","journal-title":"Heliyon"},{"key":"1996_CR7","doi-asserted-by":"publisher","unstructured":"Sunil, R., Mer, P., Diwan, A.: Autonomous detection and evaluation of deepfakes: A comprehensive study. In: 2023 Seventh International Conference on Image Information Processing (ICIIP), pp. 35\u201340. https:\/\/doi.org\/10.1109\/ICIIP61524.2023.10537789","DOI":"10.1109\/ICIIP61524.2023.10537789"},{"key":"1996_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2021.103170","volume":"204","author":"Z Guo","year":"2021","unstructured":"Guo, Z., Yang, G., Chen, J., Sun, X.: Fake face detection via adaptive manipulation traces extraction network. Comput. Vis. Image Underst. 204, 103170 (2021)","journal-title":"Comput. Vis. Image Underst."},{"key":"1996_CR9","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., Pantic, M.: Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5039\u20135049"},{"key":"1996_CR10","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5001\u20135010"},{"key":"1996_CR11","doi-asserted-by":"crossref","unstructured":"Tarasiou, M., Zafeiriou, S.: Extracting deep local features to detect manipulated images of human faces. In: 2020 IEEE International Conference on Image Processing (ICIP), pp. 1821\u20131825. IEEE","DOI":"10.1109\/ICIP40778.2020.9190714"},{"key":"1996_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, G., Li, Q., Gao, M., Guo, S., Jeon, G., Abdelmoniem, A.M.: Space\u2013frequency and global\u2013local attentive networks for sequential deepfake detection. IEEE Transactions on Computational Social Systems, 1\u20139 (2025) https:\/\/doi.org\/10.1109\/TCSS.2025.3541346","DOI":"10.1109\/TCSS.2025.3541346"},{"key":"1996_CR13","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., Ferrer, C.C.: The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397 (2020)"},{"key":"1996_CR14","unstructured":"Jiang, L., Li, R., Wu, W., Qian, C., Loy, C.C.: Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2889\u20132898"},{"key":"1996_CR15","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3207\u20133216"},{"key":"1996_CR16","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., Nie\u00dfner, M.: Faceforensics++: Learning to detect manipulated facial images. Proceedings of the IEEE\/CVF international conference on computer vision, 1\u201311 (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1996_CR17","doi-asserted-by":"crossref","unstructured":"Shao, R., Wu, T., Liu, Z.: Detecting and recovering sequential deepfake manipulation. In: European Conference on Computer Vision, pp. 712\u2013728. Springer","DOI":"10.1007\/978-3-031-19778-9_41"},{"key":"1996_CR18","unstructured":"Jiang, Y., Huang, Z., Pan, X., Loy, C.C., Liu, Z.: Talk-to-edit: Fine-grained facial editing via dialog. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13799\u201313808"},{"key":"1996_CR19","unstructured":"Liu, S., Zhang, L., Yang, X., Su, H., Zhu, J.: Query2label: A simple transformer way to multi-label classification. arXiv preprint arXiv:2107.10834 (2021)"},{"key":"1996_CR20","doi-asserted-by":"crossref","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: European Conference on Computer Vision, pp. 213\u2013229. Springer","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"1996_CR21","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S.: An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"1996_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., Yu, N.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2185\u20132194","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1996_CR23","doi-asserted-by":"crossref","unstructured":"Huang, Y., Qi, J., Wang, X., Lin, Z.: Asymmetric polynomial loss for multi-label classification. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1\u20135. IEEE","DOI":"10.1109\/ICASSP49357.2023.10095437"},{"key":"1996_CR24","unstructured":"Das, S., Seferbekov, S., Datta, A., Islam, M.S., Amin, M.R.: Towards solving the deepfake problem: An analysis on improving deepfake detection using dynamic face augmentation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 3776\u20133785"},{"issue":"1","key":"1996_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., Bharath, A.A.: Generative adversarial networks: An overview. IEEE Signal Process. Mag. 35(1), 53\u201365 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"1996_CR26","unstructured":"Zhu, P., Abdal, R., Qin, Y., Wonka, P.: Sean: Image synthesis with semantic region-adaptive normalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5104\u20135113"},{"key":"1996_CR27","unstructured":"Lee, C.-H., Liu, Z., Wu, L., Luo, P.: Maskgan: Towards diverse and interactive facial image manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5549\u20135558"},{"key":"1996_CR28","unstructured":"Shen, Y., Zhou, B.: Closed-form factorization of latent semantics in gans. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1532\u20131540"},{"key":"1996_CR29","unstructured":"Zhuang, P., Koyejo, O., Schwing, A.G.: Enjoy your editing: Controllable gans for image editing via latent space navigation. arXiv preprint arXiv:2102.01187 (2021)"},{"issue":"4","key":"1996_CR30","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TPAMI.2020.3034267","volume":"44","author":"Y Shen","year":"2020","unstructured":"Shen, Y., Yang, C., Tang, X., Zhou, B.: Interfacegan: Interpreting the disentangled face representation learned by gans. IEEE Trans. Pattern Anal. Mach. Intell. 44(4), 2004\u20132018 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1996_CR31","unstructured":"Durall, R., Keuper, M., Pfreundt, F.-J., Keuper, J.: Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686 (2019)"},{"key":"1996_CR32","doi-asserted-by":"crossref","unstructured":"Masi, I., Killekar, A., Mascarenhas, R.M., Gurudatt, S.P., AbdAlmageed, W.: Two-branch recurrent network for isolating deepfakes in videos. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, Proceedings, Part VII 16, pp. 667\u2013684. Springer (2020)","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"1996_CR33","doi-asserted-by":"crossref","unstructured":"Deng, L., Wang, J., Liu, Z.: Cascaded network based on efficientnet and transformer for deepfake video detection. Neural Processing Letters, 1\u201320 (2023)","DOI":"10.1007\/s11063-023-11249-6"},{"key":"1996_CR34","doi-asserted-by":"crossref","unstructured":"Dong, S., Wang, J., Ji, R., Liang, J., Fan, H., Ge, Z.: Implicit identity leakage: The stumbling block to improving deepfake detection generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3994\u20134004","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"1996_CR35","doi-asserted-by":"crossref","unstructured":"Liang, Y., Wang, M., Jin, Y., Pan, S., Liu, Y.: Hierarchical supervisions with two-stream network for deepfake detection. Pattern Recognition Letters (2023)","DOI":"10.1016\/j.patrec.2023.05.029"},{"key":"1996_CR36","volume":"42","author":"T Wang","year":"2022","unstructured":"Wang, T., Liu, M., Cao, W., Chow, K.P.: Deepfake noise investigation and detection. Forensic Sci. Int. 42, 301395 (2022)","journal-title":"Forensic Sci. Int."},{"key":"1996_CR37","unstructured":"Shao, R., Wu, T., Liu, Z.: Detecting and grounding multi-modal media manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6904\u20136913"},{"key":"1996_CR38","doi-asserted-by":"crossref","unstructured":"Saha, S., Perera, R., Seneviratne, S., Malepathirana, T., Rasnayaka, S., Geethika, D., Sim, T., Halgamuge, S.: Undercover deepfakes: Detecting fake segments in videos. arXiv preprint arXiv:2305.06564 (2023)","DOI":"10.1109\/ICCVW60793.2023.00048"},{"key":"1996_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730\u20133738","DOI":"10.1109\/ICCV.2015.425"},{"key":"1996_CR40","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)"},{"issue":"16","key":"1996_CR41","doi-asserted-by":"publisher","first-page":"7678","DOI":"10.3390\/app11167678","volume":"11","author":"V-N Tran","year":"2021","unstructured":"Tran, V.-N., Lee, S.-H., Le, H.-S., Kwon, K.-R.: High performance deepfake video detection on cnn-based with attention target-specific regions and manual distillation extraction. Appl. Sci. 11(16), 7678 (2021)","journal-title":"Appl. Sci."},{"issue":"10","key":"1996_CR42","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"1996_CR43","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1996_CR44","doi-asserted-by":"crossref","unstructured":"Ridnik, T., Ben-Baruch, E., Zamir, N., Noy, A., Friedman, I., Protter, M., Zelnik-Manor, L.: Asymmetric loss for multi-label classification. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 82\u201391","DOI":"10.1109\/ICCV48922.2021.00015"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01996-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-025-01996-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01996-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T06:58:14Z","timestamp":1766127494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-025-01996-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1996"],"URL":"https:\/\/doi.org\/10.1007\/s00530-025-01996-y","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"13 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"410"}}