{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T17:21:32Z","timestamp":1769275292095,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072251"],"award-info":[{"award-number":["62072251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11042-021-11539-y","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:04Z","timestamp":1657609504000},"page":"42591-42606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A dual-branch neural network for DeepFake video detection by detecting spatial and temporal inconsistencies"],"prefix":"10.1007","volume":"81","author":[{"given":"Liang","family":"Kuang","sequence":"first","affiliation":[]},{"given":"Yiting","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Hang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2506-0427","authenticated-orcid":false,"given":"Beijing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guoying","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"11539_CR1","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, et al. (2018) Mesonet: a compact facial video forgery detection network. In: Proceedings of the 2018 IEEE international workshop on information forensics and security (WIFS2018), pp 1\u20137","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"11539_CR2","unstructured":"Agarwal S, Farid H, Gu Y, et al. (2019) Protecting world leaders against Deep Fakes. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 38\u201345"},{"key":"11539_CR3","doi-asserted-by":"crossref","unstructured":"Amerini I, Galteri L, Caldelli R, et al. (2019) Deepfake video detection through optical flow based CNN. In: Proceedings of the 2019 IEEE\/CVF international conference on computer vision workshops, pp 1205\u20131207","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"11539_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF01420984","volume":"12","author":"JL Barron","year":"1992","unstructured":"Barron JL, Fleet DJ, Beauchemin SS et al (1992) Performance of optical flow techniques. Int J Comput Vis 12:43\u201377","journal-title":"Int J Comput Vis"},{"key":"11539_CR5","doi-asserted-by":"crossref","unstructured":"Chen P, Liu J, Liang T, et al. (2020) FSSPOTTER: spotting face-swapped video by spatial and temporal clues. In: Proceedings of the 2020 IEEE international conference on multimedia and expo (ICME2020), pp 1\u20136","DOI":"10.1109\/ICME46284.2020.9102914"},{"key":"11539_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3026868","author":"B Chen","year":"2020","unstructured":"Chen B, Tan W, Coatrieux G et al (2020) A serial image copy-move forgery localization scheme with source\/target distinguishment. IEEE Trans Multimedia. https:\/\/doi.org\/10.1109\/TMM.2020.3026868","journal-title":"IEEE Trans Multimedia"},{"key":"11539_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2021.05.006","volume":"572","author":"B Chen","year":"2021","unstructured":"Chen B, Ju X, Xiao B et al (2021) Locally GAN-generated face detection based on an improved Xception. Inf Sci 572:16\u201328","journal-title":"Inf Sci"},{"key":"11539_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287","author":"UA Ciftci","year":"2020","unstructured":"Ciftci UA, Demir I, Yin L (2020) FakeCatcher: detection of synthetic portrait videos using biological signals. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2020.3009287","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"11539_CR9","unstructured":"DeepFake Detection Challenge (DFDC). https:\/\/ai.facebook.com\/datasets\/dfdc\/"},{"key":"11539_CR10","doi-asserted-by":"crossref","unstructured":"Donahue J, Hendricks LA, Guadarrama S, et al. (2015) Long-term recurrent convolutional networks for visual recognition and description. In: Proceedings of the 2015 IEEE conference on computer vision and pattern recognition (CVPR2015), pp 2625\u20132634","DOI":"10.1109\/CVPR.2015.7298878"},{"key":"11539_CR11","unstructured":"Ganiyusufoglu I, Ng\u00f4 LM, Savov N, et al. (2020) Spatio-temporal features for generalized detection of deepfake videos. https:\/\/arxiv.org\/abs\/2010.11844"},{"key":"11539_CR12","volume-title":"The perception of the visual world","author":"JJ Gibson","year":"1950","unstructured":"Gibson JJ (1950) The perception of the visual world. Houghton Mifflin, Boston"},{"key":"11539_CR13","unstructured":"Google FC (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the 2017 IEEE conference on computer vision and pattern recognition (CVPR2017), pp 1800\u20131807"},{"key":"11539_CR14","doi-asserted-by":"crossref","unstructured":"Guera D, Delp EJ (2018) Deepfake video detection using recurrent neural networks. In: Proceedings of the 15th IEEE international conference on advanced video and signal based surveillance (AVSS2018), pp 1\u20136","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"11539_CR15","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Maaten LVD, et al. (2017) Densely connected convolutional networks. In: Proceedings of the 2017 IEEE conference on computer vision and pattern recognition (CVPR2017), pp 2261\u20132269","DOI":"10.1109\/CVPR.2017.243"},{"key":"11539_CR16","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. Neural Inf Process Syst 25:1097\u20131105","journal-title":"Neural Inf Process Syst"},{"key":"11539_CR17","doi-asserted-by":"crossref","unstructured":"Khalid H, Woo SS (2020) OC-FakeDect: classifying deepfakes using one-class variational autoencoder. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, vol 656\u2013657","DOI":"10.1109\/CVPRW50498.2020.00336"},{"key":"11539_CR18","unstructured":"Li Y, Lyu S (2018) Exposing deepfake videos by detecting face warping artifacts. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp 46\u201352"},{"key":"11539_CR19","doi-asserted-by":"crossref","unstructured":"Li Y, Chang M, Lyu S (2018) Exposing ai created fake videos by detecting eye blinking. In: The 2018 IEEE international workshop on information forensics and security (WIFS2018), pp. 1\u20137","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"11539_CR20","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, et al. (2020) Face x-ray for more general face forgery detection. In: Proceedings of the 2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR2020), pp 5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"11539_CR21","doi-asserted-by":"crossref","unstructured":"Li X, Lang Y, Chen Y, et al. (2020) Sharp multiple instance learning for deepfake video detection. In: Proceedings of the 28th ACM international conference on multimedia, vol 1864\u20131872","DOI":"10.1145\/3394171.3414034"},{"key":"11539_CR22","unstructured":"Lima OD, Franklin S, Basu S et al (2020) Deepfake detection using spatiotemporal convolutional networks.\u00a0https:\/\/arxiv.org\/abs\/2006.14749"},{"key":"11539_CR23","doi-asserted-by":"crossref","unstructured":"Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: Proceedings of the 2019 IEEE winter applications of computer vision workshops (WACVW2019), pp 83\u201392","DOI":"10.1109\/WACVW.2019.00020"},{"key":"11539_CR24","unstructured":"Nguyen TT, Nguyen CM, Nguyen DT, et al (2019) Deep learning for deepfakes creation and detection. https:\/\/arxiv.org\/abs\/1909.11573."},{"key":"11539_CR25","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, et al. (2019) Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the 2017 IEEE\/CVF international conference on computer vision, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"11539_CR26","unstructured":"Sabir E, Cheng J, Jaiswal A, et al (2019) Recurrent convolutional strategies for face manipulation detection in videos. In: Proceedings of the 2018 IEEE\/CVF international conference on computer vision workshops, pp 80\u201387"},{"key":"11539_CR27","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard A, Zhu M, et al. (2018) MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the 2018 IEEE\/CVF conference on computer vision and pattern recognition (CVPR2018), pp 4510\u20134520","DOI":"10.1109\/CVPR.2018.00474"},{"issue":"11","key":"11539_CR28","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster M, Paliwal KK (1997) Bidirectional recurrent neural networks. IEEE Trans Signal Process 45(11):2673\u20132681","journal-title":"IEEE Trans Signal Process"},{"key":"11539_CR29","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A (2017) Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the 2017 IEEE international conference on computer vision (CVPR2017), pp 618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"11539_CR30","first-page":"568","volume":"27","author":"K Simonyan","year":"2014","unstructured":"Simonyan K, Zisserman A (2014) Two-stream convolutional networks for action recognition in videos. Adv Neural Inf Process Syst 27:568\u2013576","journal-title":"Adv Neural Inf Process Syst"},{"key":"11539_CR31","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, et al. (2015) Going deeper with convolutions. In: Proceedings of the 2015 IEEE conference on computer vision and pattern recognition (CVPR2015), pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"11539_CR32","unstructured":"Tan M, Le QV (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: Proceedings of 2019 international conference on machine learning, pp 6105\u20136114"},{"key":"11539_CR33","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J et al (2020) Deepfakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148","journal-title":"Inf Fusion"},{"key":"11539_CR34","doi-asserted-by":"crossref","unstructured":"Tran D, Wang H, Torresani L, et al. A closer look at spatiotemporal convolutions for action recognition. In: Proceedings of the 2018 IEEE conference on computer vision and pattern recognition (CVPR2018), pp 6450\u20136459","DOI":"10.1109\/CVPR.2018.00675"},{"issue":"5","key":"11539_CR35","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Select Topic Signal Process 14(5):910\u2013932","journal-title":"IEEE J Select Topic Signal Process"},{"key":"11539_CR36","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu S (2019) Exposing deep fakes using inconsistent head poses. In: Proceedings of 2019 IEEE international conference on acoustics, speech and signal processing (ICASSP2019), pp 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"11539_CR37","doi-asserted-by":"crossref","unstructured":"Zach C, Pock T, Bischof H (2007) A duality based approach for realtime TV-L1 optical flow. In: Proceedings of the 29th DAGM conference on pattern recognition, pp 214\u2013223","DOI":"10.1007\/978-3-540-74936-3_22"},{"key":"11539_CR38","unstructured":"Zaremba W, Sutskever I, Vinyals O (2014) Recurrent neural network regularization. https:\/\/arxiv.org\/abs\/1409.2329."},{"issue":"10","key":"11539_CR39","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z et al (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503","journal-title":"IEEE Signal Process Lett"},{"key":"11539_CR40","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8830310","author":"D Zhang","year":"2020","unstructured":"Zhang D, Chen X, Li F et al (2020) Seam-carved image tampering detection based on the cooccurrence of adjacent LBPs. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2020\/8830310","journal-title":"Secur Commun Netw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11539-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11539-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11539-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T22:45:07Z","timestamp":1669502707000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11539-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":40,"journal-issue":{"issue":"29","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["11539"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11539-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"18 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}