{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:29:24Z","timestamp":1740122964487,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11042-023-14612-w","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T10:03:38Z","timestamp":1677060218000},"page":"28797-28825","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Face forgery detection via optimum deep convolution activation feature selection algorithm using expert-generated images"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0318-7168","authenticated-orcid":false,"given":"Ghulam","family":"Murtaza","sequence":"first","affiliation":[]},{"given":"Raheel Ahmed","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Safdar","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Nura Modi","family":"Shagari","sequence":"additional","affiliation":[]},{"given":"Javed","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"14612_CR1","doi-asserted-by":"crossref","unstructured":"Anwar S, Milanova M, Anwer M, Banihirwe A (2019). Perceptual judgments to detect computer generated forged faces in social media.\u00a0Springer International Publishing\u00a0Cham.","DOI":"10.1007\/978-3-030-20984-1_4"},{"key":"14612_CR2","doi-asserted-by":"publisher","unstructured":"Baek JY, Yoo YS, Bae SH (2020) Generative adversarial ensemble learning for face forensics. IEEE Access 8:45421\u201345431. https:\/\/doi.org\/10.1109\/access.2020.2968612","DOI":"10.1109\/access.2020.2968612"},{"key":"14612_CR3","doi-asserted-by":"crossref","unstructured":"Brockschmidt, J, Shang J, Wu J (2019)\u00a0On the generality of facial forgery detection. In: Paper presented at the 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)","DOI":"10.1109\/MASSW.2019.00015"},{"key":"14612_CR4","doi-asserted-by":"crossref","unstructured":"Choi Y, Choi M, Kim M, Ha J-W, Kim S, Choo J (2018) Stargan: unified generative adversarial networks for multi-domain image-to-image translation. In: Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2018.00916"},{"key":"14612_CR5","doi-asserted-by":"publisher","unstructured":"Dang LM, Hassan SI, Im S, Moon H (2019)\u00a0Face image manipulation detection based on a convolutional neural network.\u00a0Expert Syst Appl 129:156\u2013168. https:\/\/doi.org\/10.1016\/j.eswa.2019.04.005","DOI":"10.1016\/j.eswa.2019.04.005"},{"key":"14612_CR6","doi-asserted-by":"publisher","unstructured":"Gholamiangonabadi D, Kiselov N, Grolinger K (2020)\u00a0Deep neural networks for human activity recognition with wearable sensors: leave-one-subject-out cross-validation for model selection.\u00a0IEEE Access\u00a08:133982\u2013133994. https:\/\/doi.org\/10.1109\/access.2020.3010715","DOI":"10.1109\/access.2020.3010715"},{"key":"14612_CR7","doi-asserted-by":"crossref","unstructured":"Gong J, Guo J (2016)\u00a0Image copy-move forgery detection using SURF in opponent color space. Trans\u00a0Tianjin Univ 22(2):151\u2013157","DOI":"10.1007\/s12209-016-2705-z"},{"key":"14612_CR8","doi-asserted-by":"crossref","unstructured":"Hashmi MF, Hambarde AR, Keskar AG (2013)\u00a0Copy move forgery detection using DWT and SIFT features. In: Paper presented at the 2013 13th International conference on intellient systems design and applications","DOI":"10.1109\/ISDA.2013.6920733"},{"key":"14612_CR9","doi-asserted-by":"crossref","unstructured":"He T, Zhang Z, Zhang H, Zhang Z, Xie J, Li M (2019) Bag of tricks for image classification with convolutional neural networks. In: Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR.2019.00065"},{"key":"14612_CR10","doi-asserted-by":"crossref","unstructured":"Hsu CC, Lee CY, Zhuang YX (2018)\u00a0Learning to detect fake face images in the wild. In:\u00a02018 International Symposium on Computer, Consumer and Control, pp 388\u2013391","DOI":"10.1109\/IS3C.2018.00104"},{"key":"14612_CR11","doi-asserted-by":"crossref","unstructured":"Jayan TJ, Aneesh RP (2018)\u00a0Image quality measures based face spoofing detection algorithm for online social media. In: Paper presented at the 2018 International CET Conference on Control, Communication, and Computing, IC4 2018","DOI":"10.1109\/CETIC4.2018.8531037"},{"key":"14612_CR12","doi-asserted-by":"crossref","unstructured":"Jindal N (2021)\u00a0Copy move and splicing forgery detection using deep convolution neural network, and semantic segmentation. Multimed Tools Appl\u00a080(3):3571\u20133599","DOI":"10.1007\/s11042-020-09816-3"},{"key":"14612_CR13","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019)\u00a0A style-based generator architecture for generative adversarial networks. In: Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00453"},{"key":"14612_CR14","doi-asserted-by":"crossref","unstructured":"Kashyap A, Suresh B, Agrawal M, Gupta H, Joshi SD (2015) Detection of splicing forgery using wavelet decomposition. In: Paper presented at the International Conference on Computing, Communication & Automation","DOI":"10.1109\/CCAA.2015.7148492"},{"key":"14612_CR15","doi-asserted-by":"crossref","unstructured":"Khodabakhsh A, Ramachandra R, Raja K, Wasnik P, Busch C (2018) Fake face detection methods: can they be generalized? In: Paper presented at the 2018 International Conference of the Biometrics Special Interest Group, BIOSIG 2018","DOI":"10.23919\/BIOSIG.2018.8553251"},{"key":"14612_CR16","doi-asserted-by":"publisher","unstructured":"Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. J Opt Soc Am A Opt Image Sci Vis\u00a026(4):760\u2013766. https:\/\/doi.org\/10.1364\/josaa.26.000760","DOI":"10.1364\/josaa.26.000760"},{"key":"14612_CR17","doi-asserted-by":"publisher","unstructured":"Liu H, Zheng S, Hao S, Li Y (2018)\u00a0Multifeature fusion detection method for fake face attack in identity authentication. Adv Multimed\u00a02018:1\u201310. https:\/\/doi.org\/10.1155\/2018\/9025458","DOI":"10.1155\/2018\/9025458"},{"key":"14612_CR18","doi-asserted-by":"crossref","unstructured":"Liu M, Ding Y, Xia M, Liu X, Ding E, Zuo W, Wen S (2019) Stgan: a unified selective transfer network for arbitrary image attribute editing. In: Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00379"},{"key":"14612_CR19","doi-asserted-by":"crossref","unstructured":"Matern F, Riess C, Stamminger M (2019)\u00a0Exploiting visual artifacts to expose deepfakes and face manipulations. In: Paper presented at the 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW)","DOI":"10.1109\/WACVW.2019.00020"},{"key":"14612_CR20","doi-asserted-by":"crossref","unstructured":"McCloskey S, Albright M (2019)\u00a0Detecting GAN-generated imagery using saturation cues. In: Paper presented at the 2019 IEEE International Conference on Image Processing (ICIP)","DOI":"10.1109\/ICIP.2019.8803661"},{"key":"14612_CR21","doi-asserted-by":"crossref","unstructured":"Mo H, Chen B, Luo W (2018) Fake faces identification via convolutional neural network. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security, pp 43\u201347","DOI":"10.1145\/3206004.3206009"},{"key":"14612_CR22","doi-asserted-by":"crossref","unstructured":"Muhammad G (2013)\u00a0Multi-scale local texture descriptor for image forgery detection. In: Paper presented at the 2013 IEEE International Conference on Industrial Technology (ICIT)","DOI":"10.1109\/ICIT.2013.6505834"},{"key":"14612_CR23","doi-asserted-by":"crossref","unstructured":"Negi A, Chauhan P, Kumar K, Rajput R (2020) Face mask detection classifier and model pruning with keras-surgeon. In: Paper presented at the 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","DOI":"10.1109\/ICRAIE51050.2020.9358337"},{"key":"14612_CR24","doi-asserted-by":"crossref","unstructured":"Negi A, Kumar K, Chauhan P, Rajput R (2021) Deep neural architecture for face mask detection on simulated masked face dataset against COVID-19 pandemic. In: Paper presented at the 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","DOI":"10.1109\/ICCCIS51004.2021.9397196"},{"key":"14612_CR25","doi-asserted-by":"crossref","unstructured":"Pandey AK, Pandey R (2015)\u00a0Application of spectral information in identification of real-fake face images. In: Paper presented at the Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, Allahabad, India. https:\/\/doi-org.ezproxy.um.edu.my\/10.1145\/2818567.2818606","DOI":"10.1145\/2818567.2818606"},{"key":"14612_CR26","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Paper presented at the Proceedings of the IEEE International Conference on Computer Vision","DOI":"10.1109\/ICCV.2019.00009"},{"key":"14612_CR27","doi-asserted-by":"crossref","unstructured":"Stamm MC, Liu KR (2010)\u00a0Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Trans Inf Forensics Secur\u00a05(3):492\u2013506","DOI":"10.1109\/TIFS.2010.2053202"},{"key":"14612_CR28","doi-asserted-by":"crossref","unstructured":"Tan T, Wang X, Fang Y, Zhang W (2019) The impact of data correlation on identification of computer-generated face images. In: Paper presented at the Chinese Conference on Biometric Recognition","DOI":"10.1007\/978-3-030-31456-9_17"},{"key":"14612_CR29","doi-asserted-by":"crossref","unstructured":"Tariq S, Lee S, Kim H, Shin Y, Woo SS, Assoc Comp M (2018) Detecting both machine and human created fake face images in the wild","DOI":"10.1145\/3267357.3267367"},{"key":"14612_CR30","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2face: real-time face capture and reenactment of rgb videos. In: Paper presented at the Proceedings of the IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2016.262"},{"key":"14612_CR31","doi-asserted-by":"crossref","unstructured":"Vinolin V, Sucharitha M (2021)\u00a0Dual adaptive deep convolutional neural network for video forgery detection in 3D lighting environment. Vis Comput\u00a037(8):2369\u20132390","DOI":"10.1007\/s00371-020-01992-5"},{"key":"14612_CR32","doi-asserted-by":"crossref","unstructured":"Wang R, Juefei-Xu F, Ma L, Xie X, Huang Y, Wang J, Liu Y (2019) Fakespotter: a simple yet robust baseline for spotting ai-synthesized fake faces. arXiv preprint arXiv:1909.06122","DOI":"10.24963\/ijcai.2020\/476"},{"key":"14612_CR33","doi-asserted-by":"crossref","unstructured":"Zhao X, Li J, Li S, Wang S (2011) Detecting digital image splicing in chroma spaces. In: Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers 9. Springer Berlin Heidelberg,\u00a0pp 12\u201322","DOI":"10.1007\/978-3-642-18405-5_2"},{"key":"14612_CR34","doi-asserted-by":"publisher","unstructured":"Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N (2016) Digital image modification detection using color information and its histograms. Forensic Sci Int\u00a0266:379\u2013388. https:\/\/doi.org\/10.1016\/j.forsciint.2016.06.005","DOI":"10.1016\/j.forsciint.2016.06.005"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14612-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14612-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14612-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T10:28:22Z","timestamp":1690021702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14612-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":34,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["14612"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14612-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"5 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors listed in the manuscript have declared that no competing interests exist.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}