{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T01:30:05Z","timestamp":1764811805873,"version":"3.37.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Postgraduate Research Innovation Project of Yunnan University","award":["2222962"],"award-info":[{"award-number":["2222962"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62101481"],"award-info":[{"award-number":["62101481"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Yunnan Fundamental Research Projects","award":["202301AW070007"],"award-info":[{"award-number":["202301AW070007"]}]},{"name":"Major Scientific and Technological Project of Yunnan Province","award":["202202AD080002"],"award-info":[{"award-number":["202202AD080002"]}]},{"name":"Yunnan Province Expert Workstations","award":["202305AF150078"],"award-info":[{"award-number":["202305AF150078"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09500-w","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T04:34:26Z","timestamp":1739162066000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust manipulated media localization and detection based on high frequency and texture features"],"prefix":"10.1007","volume":"28","author":[{"given":"Qian","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shengfa","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Huasong","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yuru","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Hanxian","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"9500_CR1","unstructured":"Thomas D. Deepfakes: a threat to democracy or just a bit of fun. BBC News 2020."},{"key":"9500_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J. Deepfakes and beyond: a survey of face manipulation and fake detection. Inform Fusion. 2020;64:131\u201348.","journal-title":"Inform Fusion"},{"key":"9500_CR3","unstructured":"Pu Y, Gan Z, Henao R, Yuan X, Li C, Stevens A, Carin L. Variational autoencoder for deep learning of images, labels and captions. Adv Neural Inform Process Syst. 2016;29."},{"issue":"11","key":"9500_CR4","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial networks. Commun ACM. 2020;63(11):139\u201344.","journal-title":"Commun ACM"},{"key":"9500_CR5","unstructured":"Faceapp. http:\/\/faceapp.com\/app.1"},{"key":"9500_CR6","unstructured":"deepfakesweb. https:\/\/deepfakesweb.com\/"},{"key":"9500_CR7","unstructured":"DeepFakes. https:\/\/github.com\/deepfakes\/faceswap"},{"key":"9500_CR8","unstructured":"DeepFaceLab. https:\/\/github.com\/iperov\/DeepFaceLab"},{"issue":"13","key":"9500_CR9","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1080\/13683500.2020.1738357","volume":"24","author":"AO Kwok","year":"2021","unstructured":"Kwok AO, Koh SG. Deepfake: a social construction of technology perspective. Curr Issues Tour. 2021;24(13):1798\u2013802.","journal-title":"Curr Issues Tour"},{"key":"9500_CR10","doi-asserted-by":"crossref","unstructured":"Chollet F. Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2017;1251\u20131258.","DOI":"10.1109\/CVPR.2017.195"},{"key":"9500_CR11","unstructured":"Tan M, Le Q. Efficientnet: Rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning.\u00a0PMLR. 2019;6105\u20136114."},{"key":"9500_CR12","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I. Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE. 2018;1\u20137.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"9500_CR13","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1803.09179","author":"A R\u00f6ssler","year":"2018","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M. Faceforensics: a large-scale video dataset for forgery detection in human faces. arXiv. 2018. https:\/\/doi.org\/10.48550\/arXiv.1803.09179.","journal-title":"arXiv"},{"key":"9500_CR14","doi-asserted-by":"crossref","unstructured":"Zhao H, Zhou W, Chen D, Wei T, Zhang W, Yu N. Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2021;2185\u20132194","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"9500_CR15","doi-asserted-by":"crossref","unstructured":"Chai L, Bau D, Lim S-N, Isola P. What makes fake images detectable? understanding properties that generalize. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXVI 16. Springer.\u00a02020;103\u2013120.","DOI":"10.1007\/978-3-030-58574-7_7"},{"key":"9500_CR16","doi-asserted-by":"crossref","unstructured":"Qian Y, Yin G, Sheng L, Chen Z, Shao J. Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: European Conference on Computer Vision. Springer, Berlin.\u00a02020;86\u2013103.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"9500_CR17","doi-asserted-by":"crossref","unstructured":"Masi I, Killekar A, Mascarenhas RM, Gurudatt SP, AbdAlmageed W. Two-branch recurrent network for isolating deepfakes in videos. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII. Springer.\u00a02020;16:667\u2013684.","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"9500_CR18","doi-asserted-by":"crossref","unstructured":"Liu H, Li X, Zhou W, Chen Y, He Y, Xue H, Zhang W, Yu N. Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2021;772\u2013781.","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"9500_CR19","doi-asserted-by":"crossref","unstructured":"Wang J, Wu Z, Ouyang W, Han X, Chen J, Jiang Y-G, Li S-N. M2tr: Multi-modal multi-scale transformers for deepfake detection. In: Proceedings of the 2022 International Conference on Multimedia Retrieval. 2022;615\u2013623.","DOI":"10.1145\/3512527.3531415"},{"key":"9500_CR20","doi-asserted-by":"publisher","first-page":"109114","DOI":"10.1016\/j.knosys.2022.109114","volume":"250","author":"G Wang","year":"2022","unstructured":"Wang G, Jiang Q, Jin X, Li W, Cui X. Mc-lcr: multimodal contrastive classification by locally correlated representations for effective face forgery detection. Knowl Based Syst. 2022;250:109114.","journal-title":"Knowl Based Syst"},{"key":"9500_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3213832","author":"S Xiao","year":"2022","unstructured":"Xiao S, Lan G, Yang J, Li Y, Wen J. Securing the socio-cyber world: multiorder attribute node association classification for manipulated media. IEEE Trans Comput Soc Syst. 2022. https:\/\/doi.org\/10.1109\/TCSS.2022.3213832.","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"9500_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M. Deferred neural rendering: image synthesis using neural textures. Acm Trans Graph (TOG). 2019;38(4):1\u201312.","journal-title":"Acm Trans Graph (TOG)"},{"key":"9500_CR23","doi-asserted-by":"crossref","unstructured":"Li Y, Yang X, Sun P, Qi H, Lyu S. Celeb-df: A large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020;3207\u20133216.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"9500_CR24","doi-asserted-by":"crossref","unstructured":"Durall R, Keuper M, Keuper J. Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020;7890\u20137899.","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"9500_CR25","unstructured":"Frank J, Eisenhofer T, Sch\u00f6nherr L, Fischer A, Kolossa D, Holz T. Leveraging frequency analysis for deep fake image recognition. In: International Conference on Machine Learning.\u00a0PMLR. 2020;3247\u20133258."},{"key":"9500_CR26","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1911.00686","author":"R Durall","year":"2019","unstructured":"Durall R, Keuper M, Pfreundt F-J, Keuper J. Unmasking deepfakes with simple features. arXiv. 2019. https:\/\/doi.org\/10.48550\/arXiv.1911.00686.","journal-title":"arXiv"},{"key":"9500_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107","author":"X Zhang","year":"2019","unstructured":"Zhang X, Karaman S, Chang S-F. Detecting and simulating artifacts in gan fake images. IEEE Int Workshop Inform Forens Secur (WIFS). 2019. https:\/\/doi.org\/10.1109\/WIFS47025.2019.9035107.","journal-title":"IEEE Int Workshop Inform Forens Secur (WIFS)"},{"key":"9500_CR28","first-page":"103541","volume":"76","author":"J Hemalatha","year":"2023","unstructured":"Hemalatha J, Sekar M, Kumar C, et al. Towards improving the performance of blind image steganalyzer using third-order spam features and ensemble classifier. J Inform Secur Appl. 2023;76:103541.","journal-title":"J Inform Secur Appl"},{"issue":"8","key":"9500_CR29","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1007\/s12652-021-03365-9","volume":"13","author":"AK Sahu","year":"2022","unstructured":"Sahu AK. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Human Comput. 2022;13(8):3869\u201381.","journal-title":"J Ambient Intell Human Comput"},{"issue":"2","key":"9500_CR30","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2023","unstructured":"Sahu AK, Sahu M, Patro P, et al. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl. 2023;26(2):571\u201390.","journal-title":"Pattern Anal Appl"},{"issue":"3","key":"9500_CR31","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/s42979-022-01657-1","volume":"4","author":"AK Sahu","year":"2023","unstructured":"Sahu AK, Umachandran K, Biradar VD, et al. A study on content tampering in multimedia watermarking. SN Comput Sci. 2023;4(3):222.","journal-title":"SN Comput Sci"},{"key":"9500_CR32","doi-asserted-by":"crossref","unstructured":"Dang H, Liu F, Stehouwer J, Liu X, Jain AK. On the detection of digital face manipulation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020;5781\u20135790.","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"9500_CR33","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B. Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020;5001\u20135010.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"9500_CR34","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1109\/TIFS.2022.3141262","volume":"17","author":"Y Huang","year":"2022","unstructured":"Huang Y, Juefei-Xu F, Guo Q, Liu Y, Pu G. Fakelocator: robust localization of GAN-based face manipulations. IEEE Trans Inform Forens Secur. 2022;17:2657\u201372.","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"3","key":"9500_CR35","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J. Rich models for steganalysis of digital images. IEEE Trans inform Forens Secur. 2012;7(3):868\u201382.","journal-title":"IEEE Trans inform Forens Secur"},{"key":"9500_CR36","doi-asserted-by":"crossref","unstructured":"Chen L-C, Zhu Y, Papandreou G, Schroff F, Adam H. Encoder-decoder with atrous separable convolution for semantic image segmentation. In: Proceedings of the European Conference on Computer Vision (ECCV). 2018;801\u2013818.","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"9500_CR37","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1706.05587","author":"L-C Chen","year":"2017","unstructured":"Chen L-C, Papandreou G, Schroff F, Adam H. Rethinking atrous convolution for semantic image segmentation. arXiv. 2017. https:\/\/doi.org\/10.48550\/arXiv.1706.05587.","journal-title":"arXiv"},{"key":"9500_CR38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1910.08854","author":"B Dolhansky","year":"2019","unstructured":"Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC. The deepfake detection challenge (DFDC) preview dataset. arXiv. 2019. https:\/\/doi.org\/10.48550\/arXiv.1910.08854.","journal-title":"arXiv"},{"key":"9500_CR39","doi-asserted-by":"crossref","unstructured":"Zhu J-Y, Park T, Isola P, Efros AA. Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE International Conference on Computer Vision. 2017;2223\u20132232.","DOI":"10.1109\/ICCV.2017.244"},{"key":"9500_CR40","doi-asserted-by":"crossref","unstructured":"Wu X, Xie Z, Gao Y, Xiao Y. Sstnet: Detecting manipulated faces through spatial, steganalysis and temporal features. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE. 2020;2952\u20132956.","DOI":"10.1109\/ICASSP40776.2020.9053969"},{"key":"9500_CR41","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS. Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018;1053\u20131061.","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"7","key":"9500_CR42","doi-asserted-by":"publisher","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","volume":"28","author":"JH Bappy","year":"2019","unstructured":"Bappy JH, Simons C, Nataraj L, Manjunath B, Roy-Chowdhury AK. Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process. 2019;28(7):3286\u2013300.","journal-title":"IEEE Trans Image Process"},{"key":"9500_CR43","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1511.06434","author":"A Radford","year":"2015","unstructured":"Radford A, Metz L, Chintala S. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv. 2015. https:\/\/doi.org\/10.48550\/arXiv.1511.06434.","journal-title":"arXiv"},{"key":"9500_CR44","unstructured":"Adler J, Lunz S. Banach wasserstein GAN. Adv Neural Inform Process Syst. 2018;31."},{"key":"9500_CR45","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1710.10196","author":"T Karras","year":"2017","unstructured":"Karras T, Aila T, Laine S, Lehtinen J. Progressive growing of GANS for improved quality, stability, and variation. rXiv. 2017. https:\/\/doi.org\/10.48550\/arXiv.1710.10196.","journal-title":"rXiv"},{"key":"9500_CR46","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T. A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019;4401\u20134410.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"9500_CR47","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T. A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019;4401\u20134410.","DOI":"10.1109\/CVPR.2019.00453"},{"issue":"11","key":"9500_CR48","doi-asserted-by":"publisher","first-page":"5464","DOI":"10.1109\/TIP.2019.2916751","volume":"28","author":"Z He","year":"2019","unstructured":"He Z, Zuo W, Kan M, Shan S, Chen X. Attgan: facial attribute editing by only changing what you want. IEEE Trans Image Process. 2019;28(11):5464\u201378.","journal-title":"IEEE Trans Image Process"},{"key":"9500_CR49","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M, Theobalt C, Nie\u00dfner M. Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016;2387\u20132395.","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"9500_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3072959.3073640","volume":"36","author":"S Suwajanakorn","year":"2017","unstructured":"Suwajanakorn S, Seitz SM, Kemelmacher-Shlizerman I. Synthesizing obama: learning lip sync from audio. ACM Trans Graph (ToG). 2017;36(4):1\u201313.","journal-title":"ACM Trans Graph (ToG)"},{"key":"9500_CR51","unstructured":"FaceSwap. https:\/\/github.com\/deepfakes\/faceswap"},{"key":"9500_CR52","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu S. Exposing deep fakes using inconsistent head poses. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2019;8261\u20138265. IEEE.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"9500_CR53","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1811.00656","author":"Y Li","year":"2018","unstructured":"Li Y, Lyu S. Exposing deepfake videos by detecting face warping artifacts. arXiv. 2018. https:\/\/doi.org\/10.48550\/arXiv.1811.00656.","journal-title":"arXiv"},{"issue":"10","key":"9500_CR54","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff K, Srivastava RK, Koutn\u00edk J, Steunebrink BR, Schmidhuber J. LSTM: a search space odyssey. IEEE Trans Neural Networks Learn Syst. 2016;28(10):2222\u201332.","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"9500_CR55","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King DE. Dlib-ml: a machine learning toolkit. J Mach Learn Res. 2009;10:1755\u20138.","journal-title":"J Mach Learn Res"},{"key":"9500_CR56","unstructured":"Krizhevsky A, Sutskever I, Hinton GE. Imagenet classification with deep convolutional neural networks. Adv Neural Inform Process Syst. 2012;25."},{"key":"9500_CR57","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L. Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. 2017;159\u2013164.","DOI":"10.1145\/3082031.3083247"},{"key":"9500_CR58","doi-asserted-by":"crossref","unstructured":"Rahmouni N, Nozick V, Yamagishi J, Echizen I. Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS). IEEE. 2017;1\u20136.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"9500_CR59","doi-asserted-by":"crossref","unstructured":"Ciamarra A, Caldelli R, Becattini F, Seidenari L, Del\u00a0Bimbo A. Deepfake detection by exploiting surface anomalies: The surfake approach. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV) Workshops. 2024;1024\u20131033","DOI":"10.1109\/WACVW60836.2024.00112"},{"key":"9500_CR60","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2401.06506","author":"CT Doloriel","year":"2024","unstructured":"Doloriel CT, Cheung N-M. Frequency masking for universal deepfake detection. arXiv. 2024. https:\/\/doi.org\/10.48550\/arXiv.2401.06506.","journal-title":"arXiv"},{"issue":"4","key":"9500_CR61","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1109\/TAI.2023.3299894","volume":"5","author":"S Chhabra","year":"2023","unstructured":"Chhabra S, Thakral K, Mittal S, Vatsa M, Singh R. Low-quality deepfake detection via unseen artifacts. IEEE Trans Artif Intell. 2023;5(4):1573\u201385.","journal-title":"IEEE Trans Artif Intell"},{"key":"9500_CR62","doi-asserted-by":"publisher","first-page":"104072","DOI":"10.1016\/j.cviu.2024.104072","volume":"247","author":"Y Wang","year":"2024","unstructured":"Wang Y, et al. Multi-domain awareness for compressed deepfake videos detection over social networks guided by common mechanisms between artifacts. Comput Vision Image Understand. 2024;247:104072.","journal-title":"Comput Vision Image Understand"},{"key":"9500_CR63","unstructured":"Tan M, Le Q. Efficientnet: Rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning. PMLR. 20196105\u20136114."},{"key":"9500_CR64","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang Y, Yan J, Liu W. Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2021;16317\u201316326.","DOI":"10.1109\/CVPR46437.2021.01605"},{"issue":"1","key":"9500_CR65","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s40747-023-01160-x","volume":"10","author":"Y Zou","year":"2023","unstructured":"Zou Y, Luo C, Zhang J. DIFLD: domain invariant feature learning to detect low-quality compressed face forgery images. Complex Intell Syst. 2023;10(1):357\u201368.","journal-title":"Complex Intell Syst"},{"key":"9500_CR66","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS. Two-stream neural networks for tampered face detection. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE. 2017;1831\u20131839.","DOI":"10.1109\/CVPRW.2017.229"},{"key":"9500_CR67","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1811.00656","author":"Y Li","year":"2018","unstructured":"Li Y, Lyu S. Exposing deepfake videos by detecting face warping artifacts. arXiv. 2018. https:\/\/doi.org\/10.48550\/arXiv.1811.00656.","journal-title":"arXiv"},{"key":"9500_CR68","doi-asserted-by":"crossref","unstructured":"Zhu X, Fei H, Zhang B, Zhang T, Zhang X, Li SZ, Lei Z. Face forgery detection by 3d decomposition and composition search. IEEE Trans Pattern Anal Mach Intell. 2023.","DOI":"10.1109\/TPAMI.2022.3233586"},{"issue":"16","key":"9500_CR69","doi-asserted-by":"publisher","first-page":"19007","DOI":"10.1007\/s10489-023-04462-2","volume":"53","author":"Y Zhao","year":"2023","unstructured":"Zhao Y, Jin X, Gao S, Wu L, Yao S, Jiang Q. Tan-gfd: generalizing face forgery detection based on texture information and adaptive noise mining. Appl Intell. 2023;53(16):19007\u201327.","journal-title":"Appl Intell"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09500-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09500-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09500-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T04:34:59Z","timestamp":1739162099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09500-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":69,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9500"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09500-w","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"14 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"10"}}