{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:39:32Z","timestamp":1775158772428,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772281"],"award-info":[{"award-number":["61772281"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702235"],"award-info":[{"award-number":["61702235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072250"],"award-info":[{"award-number":["62072250"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636117"],"award-info":[{"award-number":["U1636117"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219"],"award-info":[{"award-number":["U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2016YFB0801303"],"award-info":[{"award-number":["2016YFB0801303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2016QY01W0105"],"award-info":[{"award-number":["2016QY01W0105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11042-021-11592-7","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:04Z","timestamp":1657609504000},"page":"42527-42545","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["GAN-generated fake face detection via two-stream CNN with PRNU in the wild"],"prefix":"10.1007","volume":"81","author":[{"given":"Jinwei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kehui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Qilin","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Sunil Kr.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"11592_CR1","unstructured":"Abadi M, Agarwal A, Barham P, Brevdo E, Chen Z, Citro C, Corrado GS, Davis A, Dean J, Devin M, Ghemawat S, Goodfellow IJ, Harp A, Irving G, Isard M, Jia Y, J\u00f3zefowicz R, Kaiser L, Kudlur M, Levenberg J, Man\u00e9 D, Monga R, Moore S, Murray DG, Olah C, Schuster M, Shlens J, Steiner B, Sutskever I, Talwar K, Tucker PA, Vanhoucke V, Vasudevan V, Vi\u00e9gas FB, Vinyals O, Warden P, Wattenberg M, Wicke M, Yu Y, Zheng X (2016) Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv:1603.04467"},{"key":"11592_CR2","unstructured":"Agarwal S, Farid H, Gu Y, He M, Nagano K, Li H (2019) Protecting world leaders against deep fakes. In: IEEE Conference on computer vision and pattern recognition workshops, CVPR workshops 2019, Long Beach, CA, USA, June 16-20, 2019. Computer Vision Foundation \/ IEEE, pp 38\u201345"},{"key":"11592_CR3","unstructured":"Albright M, McCloskey S (2019) Source generator attribution via inversion. In: IEEE Conference on computer vision and pattern recognition workshops, CVPR Workshops 2019, Long Beach, CA, USA, June 16-20, 2019. Computer Vision Foundation \/ IEEE, pp 96\u2013103"},{"key":"#cr-split#-11592_CR4.1","unstructured":"Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: Precup D, Teh YW"},{"key":"#cr-split#-11592_CR4.2","unstructured":"(ed) Proceedings of the 34th International conference on machine learning, ICML 2017, Sydney, NSW, Australia, 6-11 August 2017, volume 70 of Proceedings of machine learning research. PMLR, pp 214-223"},{"key":"#cr-split#-11592_CR5.1","doi-asserted-by":"crossref","unstructured":"Bay H, Tuytelaars T, Gool LV (2006) SURF: speeded up robust features. In: Leonardis A, Bischof H, Pinz A","DOI":"10.1007\/11744023_32"},{"key":"#cr-split#-11592_CR5.2","unstructured":"(ed) Computer Vision - ECCV 2006, 9th European conference on computer vision, Graz, Austria, May 7-13, 2006, Proceedings, Part I, volume 3951 of lecture notes in computer science. Springer, pp 404-417"},{"key":"11592_CR6","unstructured":"Berthelot D, Schumm T, Metz L (2017) BEGAN: boundary equilibrium generative adversarial networks. arXiv:1703.10717"},{"key":"11592_CR7","doi-asserted-by":"crossref","unstructured":"Chen M, Fridrich JJ, Goljan M (2007) Digital imaging sensor identification (further study). In: Delp III EJ, Wong PW (eds) Security, steganography, and watermarking of multimedia contents IX, San Jose, CA, USA, January 28, 2007, volume 6505 of SPIE proceedings. SPIE, pp 65050P","DOI":"10.1117\/12.703370"},{"key":"11592_CR8","doi-asserted-by":"crossref","unstructured":"Choi Y, Choi M-J, Kim M, Ha J-W, Kim S, Choo J (2018) Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In: 2018 IEEE Conference on computer vision and pattern recognition, CVPR 2018, Salt Lake City, UT, USA, June 18-22, 2018. IEEE Computer Society, pp 8789\u20138797","DOI":"10.1109\/CVPR.2018.00916"},{"key":"11592_CR9","doi-asserted-by":"crossref","unstructured":"Dang H, Liu F, Stehouwer J, Liu X, Jain AK (2020) On the detection of digital face manipulation. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020. IEEE, pp 5780\u20135789","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"11592_CR10","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville AC, Bengio Y (2014) Generative adversarial nets. In: Ghahramani Z, Welling M, Cortes C, Lawrence ND, Weinberger KQ (eds) Advances in neural information processing systems 27: annual conference on neural information processing systems. Montreal, Quebec, Canada, pp 2672\u20132680"},{"key":"11592_CR11","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on computer vision and pattern recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016. IEEE Computer Society, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"11592_CR12","unstructured":"Karras T, Aila T, Laine S, Lehtinen J (2017) Progressive growing of gans for improved quality, stability, and variation. arXiv:1710.10196"},{"key":"11592_CR13","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: IEEE Conference on computer vision and pattern recognition, CVPR 2019, Long Beach, CA, USA, June 16-20, 2019. Computer Vision Foundation \/ IEEE, pp 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"11592_CR14","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of stylegan. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020. IEEE, pp 8107\u20138116","DOI":"10.1109\/CVPR42600.2020.00813"},{"issue":"5","key":"11592_CR15","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11704-015-4224-9","volume":"9","author":"Tu Ke","year":"2015","unstructured":"Ke Tu, Li Hongbo, Sun Fuchun (2015) A statistical learning based image denoising approach. Front Comp Sci 9(5):713\u2013719","journal-title":"Front Comp Sci"},{"issue":"1","key":"11592_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s11704-017-6114-9","volume":"13","author":"RA Khan","year":"2019","unstructured":"Khan RA, Meyer A, Konik H, Bouakaz S (2019) Saliency-based framework for facial expression recognition. Front Comp Sci 13(1):183\u2013198","journal-title":"Front Comp Sci"},{"key":"#cr-split#-11592_CR17.1","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. In: Bengio, Y LeCun Y"},{"key":"#cr-split#-11592_CR17.2","unstructured":"(ed) 3rd International conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, conference track proceedings"},{"key":"11592_CR18","unstructured":"Li C-L, Ravanbakhsh S, P\u00f3czos B (2016) Annealing gaussian into relu: a new sampling strategy for leaky-relu RBM. arXiv:1611.03879"},{"key":"11592_CR19","unstructured":"Li H, Li B, Tan S, Huang J (2018) Detection of deep network generated images using disparities in color components. arXiv:1808.07276"},{"key":"11592_CR20","doi-asserted-by":"crossref","unstructured":"Liu Z, Qi X, Torr PHS (2020) Global texture enhancement for fake face detection in the wild. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020. IEEE, pp 8057\u20138066","DOI":"10.1109\/CVPR42600.2020.00808"},{"issue":"2","key":"11592_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"Jan Luk\u00e1s","year":"2006","unstructured":"Luk\u00e1s Jan, Fridrich Jessica J, Goljan Miroslav (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11592_CR22","doi-asserted-by":"crossref","unstructured":"Luk\u00e1s J, Fridrich JJ, Goljan M (2005) Digital \u201cbullet scratches\u201d for images. In: Proceedings of the 2005 international conference on image processing, ICIP 2005, Genoa, Italy, September 11-14, 2005. IEEE, pp 65\u201368","DOI":"10.1109\/ICIP.2005.1530329"},{"key":"11592_CR23","doi-asserted-by":"crossref","unstructured":"Luk\u00e1s J, Fridrich JJ, Goljan M (2006) Detecting digital image forgeries using sensor pattern noise. In: Delp III EJ, Wong PW (eds) Security, steganography, and watermarking of multimedia contents VIII, San Jose, CA, USA, January 15, 2006, volume 6072 of SPIE Proceedings. SPIE, pp 60720Y","DOI":"10.1117\/12.640109"},{"key":"11592_CR24","doi-asserted-by":"crossref","unstructured":"Mao X, Li Q, Xie H, Lau RYK, Wang Z, Smolley SP (2017) Least squares generative adversarial networks. In: IEEE International conference on computer vision, ICCV 2017, Venice, Italy, October 22-29, 2017. IEEE Computer Society, pp 2813\u20132821","DOI":"10.1109\/ICCV.2017.304"},{"key":"11592_CR25","doi-asserted-by":"crossref","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G (2019) Do gans leave artificial fingerprints? In: 2nd IEEE conference on multimedia information processing and retrieval, MIPR 2019, San Jose, CA, USA, March 28-30, 2019. IEEE, pp 506\u2013511","DOI":"10.1109\/MIPR.2019.00103"},{"key":"11592_CR26","doi-asserted-by":"crossref","unstructured":"McCloskey S, Albright M (2018) Detecting gan-generated imagery using color cues. arXiv:1812.08247","DOI":"10.1109\/ICIP.2019.8803661"},{"key":"11592_CR27","doi-asserted-by":"crossref","unstructured":"Mo H, Chen B, Luo W (2018) Fake faces identification via convolutional neural network. In: B\u00f6hme R, Pasquini C, Boato G, Sch\u00f6ttle P (eds) Proceedings of the 6th ACM workshop on information hiding and multimedia security, Innsbruck, Austria, June 20-22, 2018. ACM, pp 43\u201347","DOI":"10.1145\/3206004.3206009"},{"key":"11592_CR28","doi-asserted-by":"crossref","unstructured":"Nataraj L, Mohammed TM, Manjunath BS, Chandrasekaran S, Flenner A, Bappy JH, Roy-Chowdhury, AK (2020) Detecting GAN generated fake images using co-occurrence matrices. arXiv:1903.06836","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532"},{"key":"11592_CR29","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.eswa.2016.10.038","volume":"71","author":"B Shuang","year":"2017","unstructured":"Shuang B (2017) Growing random forest on deep convolutional neural networks for scene categorization. Expert Syst Appl 71:279\u2013287","journal-title":"Expert Syst Appl"},{"key":"11592_CR30","unstructured":"Sun Y, Chen Y, Wang X, Tang X (2014) Deep learning face representation by joint identification-verification. In: Ghahramani Z, Welling M, Cortes C, Lawrence ND, Weinberger KQ (eds) Advances in neural information processing systems 27: annual conference on neural information processing systems 2014, December 8-13 2014, Montreal, Quebec, Canada. pp 1988\u20131996"},{"key":"11592_CR31","doi-asserted-by":"crossref","unstructured":"Wang S-Y, Wang O, Zhang R, Owens A, Efros, AA (2019) Detecting photoshopped faces by scripting photoshop. In: 2019 IEEE\/CVF International conference on computer vision, ICCV 2019, Seoul, Korea (South), October 27 - November 2, 2019. IEEE, pp 10071\u201310080","DOI":"10.1109\/ICCV.2019.01017"},{"key":"11592_CR32","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.patcog.2017.07.001","volume":"72","author":"X Wang","year":"2017","unstructured":"Wang X, Thome N, Cord M (2017) Gaze latent support vector machine for image classification improved by weakly supervised region selection. Pattern Recogn 72:59\u201371","journal-title":"Pattern Recogn"},{"key":"11592_CR33","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Lyu, S (2019) Exposing deep fakes using inconsistent head poses. In: IEEE International conference on acoustics, speech and signal processing, ICASSP 2019, Brighton, United Kingdom, May 12-17, 2019. IEEE, pp 8261\u20138265","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"11592_CR34","doi-asserted-by":"crossref","unstructured":"Yu N, Davis L, Fritz, M (2018) Attributing fake images to gans: Analyzing fingerprints in generated images. arXiv:1811.08180","DOI":"10.1109\/ICCV.2019.00765"},{"key":"11592_CR35","doi-asserted-by":"crossref","unstructured":"Zhang X, Karaman S, Chang S-F (2019) Detecting and simulating artifacts in GAN fake images. In: IEEE international workshop on information forensics and security, WIFS 2019, Delft, The Netherlands, December 9-12, 2019. IEEE, pp 1\u20136","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"11592_CR36","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zheng L, Thing VLL (2017) Automated face swapping and its detection. In: 2017 2nd International conference on signal and image processing","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"issue":"9","key":"11592_CR37","doi-asserted-by":"publisher","first-page":"5055","DOI":"10.1007\/s11042-015-2847-3","volume":"75","author":"L Zheng","year":"2016","unstructured":"Zheng L, Duffner S, Idrissi K, Garcia C, Baskurt A (2016) Siamese multi-layer perceptrons for dimensionality reduction and face identification. Multimed Tools Appl 75(9):5055\u20135073","journal-title":"Multimed Tools Appl"},{"key":"11592_CR38","doi-asserted-by":"crossref","unstructured":"Zhong Z, Zheng L, Kang G, Li S, Yang Y (2020) Random erasing data augmentation. In: The thirty-fourth AAAI conference on artificial intelligence, AAAI 2020, the thirty-second innovative applications of artificial intelligence conference, IAAI 2020, The tenth AAAI symposium on educational advances in artificial intelligence, EAAI 2020, New York, NY, USA, February 7-12, 2020. AAAI Press, pp 13001\u201313008","DOI":"10.1609\/aaai.v34i07.7000"},{"issue":"1","key":"11592_CR39","doi-asserted-by":"publisher","first-page":"151603","DOI":"10.1007\/s11704-020-9182-1","volume":"15","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Gu Y, Yu G (2021) Adversarial network embedding using structural similarity. Front Comp Sci 15(1):151603","journal-title":"Front Comp Sci"},{"key":"11592_CR40","doi-asserted-by":"crossref","unstructured":"Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: IEEE International conference on computer vision, ICCV 2017, Venice, Italy, October 22-29, 2017. IEEE Computer Society, pp 2242\u20132251","DOI":"10.1109\/ICCV.2017.244"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11592-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11592-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11592-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T22:42:39Z","timestamp":1669502559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11592-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":43,"journal-issue":{"issue":"29","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["11592"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11592-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"1 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}