{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T08:39:08Z","timestamp":1758357548189,"version":"3.44.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772342","62203304"],"award-info":[{"award-number":["61772342","62203304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10489-025-06677-x","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:50:09Z","timestamp":1750323009000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FTA-DFI: a framework for generalizable deepfake detection based on distinctive features from various manipulations compared to genuine images"],"prefix":"10.1007","volume":"55","author":[{"given":"Zheng","family":"Zou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0223-5447","authenticated-orcid":false,"given":"Dunlu","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zekun","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"issue":"4","key":"6677_CR1","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","volume":"53","author":"M Masood","year":"2023","unstructured":"Masood M, Nawaz M, Malik KM, Javed A, Irtaza A, Malik H (2023) Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Appl Intell 53(4):3974\u20134026","journal-title":"Appl Intell"},{"issue":"3","key":"6677_CR2","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6677_CR3","doi-asserted-by":"crossref","unstructured":"De\u00a0Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de\u00a0Rezende\u00a0Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inform Forensic Sec 8(7):1182\u20131194","DOI":"10.1109\/TIFS.2013.2265677"},{"key":"6677_CR4","doi-asserted-by":"crossref","unstructured":"Li H, Chen H, Li B, Tan S (2018) Can forensic detectors identify gan generated images? In: (2018) Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE 2018:722\u2013727","DOI":"10.23919\/APSIPA.2018.8659461"},{"key":"6677_CR5","doi-asserted-by":"crossref","unstructured":"Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: (2019) IEEE Winter Applications of Computer Vision Workshops (WACVW). IEEE 2019:83\u201392","DOI":"10.1109\/WACVW.2019.00020"},{"key":"6677_CR6","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019)Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"6677_CR7","unstructured":"Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neural networks. In: International conference on machine learning, PMLR, pp 6105\u20136114"},{"key":"6677_CR8","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: (2018) IEEE international workshop on information forensics and security (WIFS). IEEE 2018:1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"6677_CR9","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face x-ray for more general face forgery detection, in: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"6677_CR10","unstructured":"Mao M, Yang J (2021) Exposing deepfake with pixel-wise ar and ppg correlation from faint signals. arXiv preprint arXiv:2110.15561"},{"key":"6677_CR11","doi-asserted-by":"crossref","unstructured":"Dong S, Wang J, Ji R, Liang J, Fan H, Ge Z (2023) Implicit identity leakage: The stumbling block to improving deepfake detection generalization. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3994\u20134004","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"6677_CR12","doi-asserted-by":"crossref","unstructured":"Ojha U, Li Y, Lee YJ (2023) Towards universal fake image detectors that generalize across generative models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 24480\u201324489","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"6677_CR13","doi-asserted-by":"crossref","unstructured":"Liang J, Shi H, Deng W (2022) Exploring disentangled content information for face forgery detection. In: European conference on computer vision, Springer, pp 128\u2013145","DOI":"10.1007\/978-3-031-19781-9_8"},{"key":"6677_CR14","doi-asserted-by":"crossref","unstructured":"Yan Z, Zhang Y, Fan Y, Wu B (2023) Ucf: Uncovering common features for generalizable deepfake detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 22412\u201322423","DOI":"10.1109\/ICCV51070.2023.02048"},{"key":"6677_CR15","unstructured":"Ye W, He X, Ding F (2024) Decoupling forgery semantics for generalizable deepfake detection. arXiv preprint arXiv:2406.09739"},{"key":"6677_CR16","unstructured":"Durall R, Keuper M, Pfreundt F-J, Keuper J (2019) Unmasking deepfakes with simple features. arXiv preprint arXiv:1911.00686"},{"key":"6677_CR17","doi-asserted-by":"crossref","unstructured":"Liu H, Li X, Zhou W, Chen Y, He Y, Xue H, Zhang W, Yu N (2021) Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 772\u2013781","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"6677_CR18","doi-asserted-by":"crossref","unstructured":"Baru LB, Boddeda R, Patel SA, Gajapaka SM (2025) Wavelet-driven generalizable framework for deepfake face forgery detection. In: Proceedings of the winter conference on applications of computer vision, pp 1661\u20131669","DOI":"10.1109\/WACVW65960.2025.00180"},{"key":"6677_CR19","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zheng L, Thing VL (2017) Automated face swapping and its detection. In: (2017) IEEE 2nd International conference on signal and image processing (ICSIP). IEEE 2017:15\u201319","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"6677_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Yamagishi J, Echizen I (2019) Capsule-forensics: Using capsule networks to detect forged images and videos. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2307\u20132311","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"6677_CR21","unstructured":"Li Y, Lyu S (2018) Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656"},{"key":"6677_CR22","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/TIFS.2023.3262148","volume":"18","author":"W Yang","year":"2023","unstructured":"Yang W, Zhou X, Chen Z, Guo B, Ba Z, Xia Z, Cao X, Ren K (2023) Avoid-df: Audio-visual joint learning for detecting deepfake. IEEE Trans Inf Forensics Secur 18:2015\u20132029","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6677_CR23","unstructured":"Peng C, Guo H, Liu D, Wang N, Hu R, Gao X (2023) Deepfidelity: Perceptual forgery fidelity assessment for deepfake detection. arXiv preprint arXiv:2312.04961"},{"key":"6677_CR24","doi-asserted-by":"crossref","unstructured":"Shiohara K, Yamasaki T (2022) Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 18720\u201318729","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"6677_CR25","doi-asserted-by":"crossref","unstructured":"Qian Y, Yin G, Sheng L, Chen Z, Shao J (2020) Thinking in frequency: Face forgery detection by mining frequency-aware clues, in: European conference on computer vision. Springer, pp 86\u2013103","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"6677_CR26","doi-asserted-by":"crossref","unstructured":"Masi I, Killekar A, Mascarenhas RM, Gurudatt SP, AbdAlmageed W (2020) Two-branch recurrent network for isolating deepfakes in videos. In: Computer vision\u2013ECCV 2020: 16th European conference, glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, Springer, pp 667\u2013684","DOI":"10.1007\/978-3-030-58571-6_39"},{"issue":"10","key":"6677_CR27","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"},{"key":"6677_CR28","doi-asserted-by":"crossref","unstructured":"Tan C, Zhao Y, Wei S, Gu G, Liu P, Wei Y (2023) Rethinking the up-sampling operations in cnn-based generative network for generalizable deepfake detection. arXiv preprint arXiv:2312.10461","DOI":"10.1109\/CVPR52733.2024.02657"},{"key":"6677_CR29","doi-asserted-by":"crossref","unstructured":"Chen S, Yao T, Chen Y, Ding S, Li J, Ji R (2021) Local relation learning for face forgery detection. In: Proceedings of the AAAI conference on artificial intelligence, vol\u00a035, pp 1081\u20131088","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"6677_CR30","unstructured":"Ganin Y, Lempitsky V (2015) Unsupervised domain adaptation by backpropagation. In: International conference on machine learning, PMLR, pp 1180\u20131189"},{"issue":"7","key":"6677_CR31","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/LSP.2018.2822810","volume":"25","author":"F Wang","year":"2018","unstructured":"Wang F, Cheng J, Liu W, Liu H (2018) Additive margin softmax for face verification. IEEE Signal Process Lett 25(7):926\u2013930","journal-title":"IEEE Signal Process Lett"},{"key":"6677_CR32","doi-asserted-by":"crossref","unstructured":"Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3207\u20133216","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"6677_CR33","unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer CC (2020) The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397"},{"key":"6677_CR34","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M,Theobalt C, Nie\u00dfner M (2016) Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2387\u20132395","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"6677_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M (2019) Deferred neural rendering: Image synthesis using neural textures. Acm Trans Grap(TOG) 38(4):1\u201312","journal-title":"Acm Trans Grap(TOG)"},{"key":"6677_CR36","unstructured":"Yan Z, Zhang Y, Yuan X, Lyu S, Wu B (2023) Deepfakebench: A comprehensive benchmark of deepfake detection. arXiv preprint arXiv:2307.01426"},{"key":"6677_CR37","doi-asserted-by":"crossref","unstructured":"Chen L, Zhang Y, Song Y, Liu L, Wang J (2022) Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 18710\u201318719","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"6677_CR38","first-page":"24597","volume":"35","author":"L Chen","year":"2022","unstructured":"Chen L, Zhang Y, Song Y, Wang J, Liu L (2022) Ost: Improving generalization of deepfake detection via one-shot test-time training. Adv Neural Inf Process Syst 35:24597\u201324610","journal-title":"Adv Neural Inf Process Syst"},{"key":"6677_CR39","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.imavis.2016.01.002","volume":"47","author":"C Sagonas","year":"2016","unstructured":"Sagonas C, Antonakos E, Tzimiropoulos G, Zafeiriou S, Pantic M (2016) 300 faces in-the-wild challenge: Database and results. Image Vis Comput 47:3\u201318","journal-title":"Image Vis Comput"},{"key":"6677_CR40","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization, arXiv preprint arXiv:1412.6980"},{"key":"6677_CR41","doi-asserted-by":"crossref","unstructured":"Wang S-Y, Wang O, Zhang R, Owens A, Efros AA (2020) Cnn-generated images are surprisingly easy to spot... for now. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8695\u20138704","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"6677_CR42","doi-asserted-by":"crossref","unstructured":"Dang H, Liu F, Stehouwer J, Liu X, Jain AK (2020) On the detection of digital face manipulation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5781\u20135790","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"6677_CR43","doi-asserted-by":"crossref","unstructured":"Ni Y, Meng D, Yu C, Quan C, Ren D, Zhao Y (2022) Core: Consistent representation learning for face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 12\u201321","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"6677_CR44","doi-asserted-by":"crossref","unstructured":"Cao J, Ma C, Yao T, Chen S, Ding S, Yang X (2022) End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4113\u20134122","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"6677_CR45","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang Y, Yan J, Liu W (2021) Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16317\u201316326","DOI":"10.1109\/CVPR46437.2021.01605"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06677-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06677-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06677-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T13:37:29Z","timestamp":1758289049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06677-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":45,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["6677"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06677-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2025,6,19]]},"assertion":[{"value":"25 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work is supported by the National Natural Science Foundation of China under Grant No. 61772342 and 62203304.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"769"}}