{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T14:39:24Z","timestamp":1772462364649,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T00:00:00Z","timestamp":1693008000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T00:00:00Z","timestamp":1693008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["62106250"],"award-info":[{"award-number":["62106250"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16173-4","type":"journal-article","created":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T05:01:40Z","timestamp":1693026100000},"page":"27901-27920","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mining collaborative spatio-temporal clues for face forgery detection"],"prefix":"10.1007","volume":"83","author":[{"given":"Bo","family":"Ding","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Zhenfeng","family":"Fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Zejun","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7228-9646","authenticated-orcid":false,"given":"Shihong","family":"Xia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,8,26]]},"reference":[{"key":"16173_CR1","doi-asserted-by":"publisher","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: IEEE international workshop on information forensics and security (WIFS), pp 1\u20137. IEEE. https:\/\/doi.org\/10.1109\/WIFS.2018.8630761","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"16173_CR2","doi-asserted-by":"publisher","unstructured":"Amerini I, Galteri L, Caldelli R, Del Bimbo A (2019) Deepfake video detection through optical flow based cnn. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops, pp 1205\u20131207. https:\/\/doi.org\/10.1109\/ICCVW.2019.00152","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"16173_CR3","doi-asserted-by":"publisher","unstructured":"Bahdanau D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. In: International Conference on Learning Representations. https:\/\/doi.org\/10.48550\/arXiv.1409.0473","DOI":"10.48550\/arXiv.1409.0473"},{"key":"16173_CR4","doi-asserted-by":"publisher","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp 5\u201310. https:\/\/doi.org\/10.1145\/2909827.2930786","DOI":"10.1145\/2909827.2930786"},{"key":"16173_CR5","doi-asserted-by":"publisher","unstructured":"Brooks R, Yuan Y, Liu Y, Chen H et al (2022) Deepfake and its enabling techniques: a review. APSIPA Transactions on Signal and Information Processing 11(2). https:\/\/doi.org\/10.1561\/116.00000024","DOI":"10.1561\/116.00000024"},{"key":"16173_CR6","doi-asserted-by":"publisher","unstructured":"Caldelli R, Galteri L, Amerini I, Del Bimbo A (2021) Optical flow based cnn for detection of unlearnt deepfake manipulations. Pattern Recogn Lett 146:31\u201337.\u00a0https:\/\/doi.org\/10.1016\/j.patrec.2021.03.005","DOI":"10.1016\/j.patrec.2021.03.005"},{"key":"16173_CR7","doi-asserted-by":"publisher","unstructured":"Chen S, Yao T, Chen Y, Ding S, Li J, Ji R (2021) Local relation learning for face forgery detection. Proceed AAAI Conf Artif Intell 35:1081\u20131088.\u00a0https:\/\/doi.org\/10.48550\/arXiv.2105.02577","DOI":"10.48550\/arXiv.2105.02577"},{"key":"16173_CR8","doi-asserted-by":"publisher","unstructured":"Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1800\u20131807. https:\/\/doi.org\/10.1109\/CVPR.2017.195","DOI":"10.1109\/CVPR.2017.195"},{"key":"16173_CR9","doi-asserted-by":"publisher","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2017) Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp 159\u2013164. https:\/\/doi.org\/10.1145\/3082031.3083247","DOI":"10.1145\/3082031.3083247"},{"issue":"1\u20132","key":"16173_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11071-013-0969-6","volume":"74","author":"AC D\u0103sc\u0103lescu","year":"2013","unstructured":"D\u0103sc\u0103lescu AC, Boriga RE (2013) A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn 74(1\u20132):307\u2013318. https:\/\/doi.org\/10.1007\/s11071-013-0969-6","journal-title":"Nonlinear Dyn"},{"key":"16173_CR11","unstructured":"Deepfakes: Deepfakes github (2018) https:\/\/github.com\/deepfakes\/faceswap. Accessed: 2023-01-03"},{"key":"16173_CR12","doi-asserted-by":"publisher","unstructured":"Deng J, Guo J, Ververas E, Kotsia I, Zafeiriou S (2020) Retinaface: Single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 5202\u20135211. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00525","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"16173_CR13","doi-asserted-by":"publisher","unstructured":"Durall R, Keuper M, Keuper J (2020) Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 7887\u20137896. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00791","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"16173_CR14","doi-asserted-by":"publisher","unstructured":"Dzanic T, Shah K, Witherden FD (2020) Fourier spectrum discrepancies in deep network generated images. In: Annual Conference on Neural Information Processing Systems, pp 3022\u20133032. https:\/\/doi.org\/10.48550\/arXiv.1911.06465","DOI":"10.48550\/arXiv.1911.06465"},{"key":"16173_CR15","doi-asserted-by":"publisher","unstructured":"Etemadi Borujeni S, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Math Probl Eng. https:\/\/doi.org\/10.1155\/2009\/762652","DOI":"10.1155\/2009\/762652"},{"key":"16173_CR16","unstructured":"Faceswap: Faceswap github (2018) https:\/\/github.com\/MarekKowalski\/FaceSwap. Accessed: 2023-01-03"},{"key":"16173_CR17","doi-asserted-by":"publisher","unstructured":"Fei J, Dai Y, Yu P, Shen T, Xia Z, Weng J (2022) Learning second order local anomaly for general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 20238\u201320248. https:\/\/doi.org\/10.1109\/CVPR52688.2022.01963","DOI":"10.1109\/CVPR52688.2022.01963"},{"issue":"3","key":"16173_CR18","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868\u2013882. https:\/\/doi.org\/10.1109\/TIFS.2012.2190402","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"9","key":"16173_CR19","doi-asserted-by":"publisher","first-page":"2804","DOI":"10.3390\/s18092804","volume":"18","author":"Fern\u00e1ndez E Gonz\u00e1lez","year":"2018","unstructured":"Gonz\u00e1lez Fern\u00e1ndez E, Sandoval Orozco AL, Gar\u0107\u0131a Villalba L, J., Hernandez-Castro, J. (2018) Digital image tamper detection technique based on spectrum analysis of cfa artifacts. Sensors 18(9):2804. https:\/\/doi.org\/10.3390\/s18092804","journal-title":"Sensors"},{"key":"16173_CR20","doi-asserted-by":"publisher","unstructured":"Gu Z, Chen Y, Yao T, Ding S, Li J, Huang F, Ma L (2021) Spatiotemporal inconsistency learning for deepfake video detection. In: Proceedings of the 29th ACM International Conference on Multimedia, pp 3473\u20133481. https:\/\/doi.org\/10.1145\/3474085.3475508","DOI":"10.1145\/3474085.3475508"},{"key":"16173_CR21","doi-asserted-by":"publisher","unstructured":"Guan J, Zhou H, Hong Z, Ding E, Wang J, Quan C, Zhao Y (2022) Delving into sequential patches for deepfake detection. CoRR abs\/2207.02803. https:\/\/doi.org\/10.48550\/arXiv.2207.02803","DOI":"10.48550\/arXiv.2207.02803"},{"issue":"9","key":"16173_CR22","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1109\/TIP.2002.801121","volume":"11","author":"BK Gunturk","year":"2002","unstructured":"Gunturk BK, Altunbasak Y, Mersereau RM (2002) Color plane interpolation using alternating projections. IEEE Trans Image Process 11(9):997\u20131013. https:\/\/doi.org\/10.1109\/TIP.2002.801121","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"16173_CR23","doi-asserted-by":"publisher","first-page":"7687","DOI":"10.1007\/s11042-020-10098-y","volume":"80","author":"Z Guo","year":"2021","unstructured":"Guo Z, Hu L, Xia M, Yang G (2021) Blind detection of glow-based facial forgery. Multimed Tools Appl 80(5):7687\u20137710. https:\/\/doi.org\/10.1007\/s11042-020-10098-y","journal-title":"Multimed Tools Appl"},{"key":"16173_CR24","doi-asserted-by":"publisher","unstructured":"Haliassos A, Vougioukas K, Petridis S, Pantic M (2021) Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 5039\u20135049. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00500","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"16173_CR25","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"16173_CR26","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"16173_CR27","doi-asserted-by":"publisher","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: International Conference on Learning Representations. https:\/\/doi.org\/10.48550\/arXiv.1412.6980","DOI":"10.48550\/arXiv.1412.6980"},{"key":"16173_CR28","doi-asserted-by":"publisher","unstructured":"Kirchner M (2010) Efficient estimation of cfa pattern configuration in digital camera images. In: Media forensics and security II, vol 7541. SPIE, pp 383\u2013394. https:\/\/doi.org\/10.1117\/12.839102","DOI":"10.1117\/12.839102"},{"issue":"22","key":"16173_CR29","doi-asserted-by":"publisher","first-page":"31391","DOI":"10.1007\/s11042-022-12778-3","volume":"81","author":"A Kohli","year":"2022","unstructured":"Kohli A, Gupta A (2022) Light-weight 3dcnn for deepfakes, faceswap and face2face facial forgery detection. Multimed Tools Appl 81(22):31391\u201331403. https:\/\/doi.org\/10.1007\/s11042-022-12778-3","journal-title":"Multimed Tools Appl"},{"issue":"29","key":"16173_CR30","doi-asserted-by":"publisher","first-page":"42591","DOI":"10.1007\/s11042-021-11539-y","volume":"81","author":"L Kuang","year":"2022","unstructured":"Kuang L, Wang Y, Hang T, Chen B, Zhao G (2022) A dual-branch neural network for deepfake video detection by detecting spatial and temporal inconsistencies. Multimed Tools Appl 81(29):42591\u201342606. https:\/\/doi.org\/10.1007\/s11042-021-11539-y","journal-title":"Multimed Tools Appl"},{"key":"16173_CR31","doi-asserted-by":"publisher","unstructured":"Li Y, Chang M-C, Lyu S (2018) In ictu oculi: exposing ai created fake videos by detecting eye blinking. In: IEEE international workshop on information forensics and security (WIFS), pp 1\u20137. IEEE. https:\/\/doi.org\/10.1109\/WIFS.2018.8630787","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"16173_CR32","doi-asserted-by":"publisher","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 5000\u20135009. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00505","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"16173_CR33","doi-asserted-by":"publisher","unstructured":"Li L, Bao J, Yang H, Chen D, Wen F (2020) Advancing high fidelity identity swapping for forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 5073\u20135082. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00512","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"16173_CR34","doi-asserted-by":"publisher","unstructured":"Li J, Xie H, Li J, Wang Z, Zhang Y (2021) Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 6458\u20136467. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00639","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"16173_CR35","doi-asserted-by":"publisher","unstructured":"Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on rubik\u2019s cube principle. J Electrical Comput Eng. https:\/\/doi.org\/10.1155\/2012\/173931","DOI":"10.1155\/2012\/173931"},{"key":"16173_CR36","doi-asserted-by":"publisher","unstructured":"Luo Y, Zhang Y, Yan J, Liu W (2021) Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 16317\u201316326. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01605","DOI":"10.1109\/CVPR46437.2021.01605"},{"issue":"30","key":"16173_CR37","doi-asserted-by":"publisher","first-page":"43441","DOI":"10.1007\/s11042-022-13102-9","volume":"81","author":"A Megahed","year":"2022","unstructured":"Megahed A, Han Q (2022) Identify videos with facial manipulations based on convolution neural network and dynamic texture. Multimed Tools Appl 81(30):43441\u201343466. https:\/\/doi.org\/10.1007\/s11042-022-13102-9","journal-title":"Multimed Tools Appl"},{"key":"16173_CR38","unstructured":"Mnih V, Heess N, Graves A et al (2014) Recurrent models of visual attention. In: Annual Conference on Neural Information Processing Systems, vol 27"},{"key":"16173_CR39","unstructured":"Nick, D, Andrew, G (2019) Deepfake Detection Dataset. https:\/\/ai.googleblog.com\/2019\/09\/contributing-data-to-deepfake-detection.html. Accessed: 2022-11-10"},{"issue":"10","key":"16173_CR40","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","volume":"44","author":"Y Nirkin","year":"2021","unstructured":"Nirkin Y, Wolf L, Keller Y, Hassner T (2021) Deepfake detection based on discrepancies between faces and their context. IEEE Trans Pattern Anal Mach Intell 44(10):6111\u20136121. https:\/\/doi.org\/10.1109\/TPAMI.2021.3093446","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16173_CR41","doi-asserted-by":"publisher","unstructured":"Panda SK, Diwan T, Kakde OG, Tembhurne JV (2022) Improvised detection of deepfakes from visual inputs using light weight deep ensemble model. Multimed Tools Appl, pp 1\u201318. https:\/\/doi.org\/10.1007\/s11042-022-14307-8","DOI":"10.1007\/s11042-022-14307-8"},{"key":"16173_CR42","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-58610-2_6","volume":"12357","author":"Y Qian","year":"2020","unstructured":"Qian Y, Yin G, Sheng L, Chen Z, Shao J (2020) Thinking in frequency: face forgery detection by mining frequency-aware clues. Eur Conf Comput Vis 12357:86\u2013103. https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6","journal-title":"Eur Conf Comput Vis"},{"key":"16173_CR43","doi-asserted-by":"publisher","unstructured":"Rahaman N, Baratin A, Arpit D, Draxler F, Lin M, Hamprecht F, Bengio Y, Courville A (2019) On the spectral bias of neural networks. In: International conference on machine learning, pp 5301\u20135310. PMLR. https:\/\/doi.org\/10.48550\/arXiv.1806.08734","DOI":"10.48550\/arXiv.1806.08734"},{"key":"16173_CR44","doi-asserted-by":"publisher","unstructured":"Rahmouni N, Nozick V, Yamagishi J, Echizen I (2017) Distinguishing computer graphics from natural images using convolution neural networks. In: IEEE international workshop on information forensics and security (WIFS), pp 1\u20136. IEEE. https:\/\/doi.org\/10.1109\/WIFS.2017.8267647","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"16173_CR45","doi-asserted-by":"publisher","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 1\u201311. https:\/\/doi.org\/10.1109\/ICCV.2019.00009","DOI":"10.1109\/ICCV.2019.00009"},{"key":"16173_CR46","doi-asserted-by":"publisher","unstructured":"Saikia P, Dholaria D, Yadav P, Patel V, Roy M (2022) A hybrid cnn-lstm model for video deepfake detection by leveraging optical flow features. In: 2022 international joint conference on neural networks (IJCNN), pp 1\u20137. IEEE. https:\/\/doi.org\/10.1109\/IJCNN55064.2022.9892905","DOI":"10.1109\/IJCNN55064.2022.9892905"},{"key":"16173_CR47","doi-asserted-by":"publisher","unstructured":"Shin HJ, Jeon JJ, Eom IK (2017) Color filter array pattern identification using variance of color difference image. J Electron Imaging\u00a026(4):043015. https:\/\/doi.org\/10.1117\/1.JEI.26.4.043015","DOI":"10.1117\/1.JEI.26.4.043015"},{"key":"16173_CR48","doi-asserted-by":"publisher","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556. https:\/\/doi.org\/10.48550\/arXiv.1409.1556","DOI":"10.48550\/arXiv.1409.1556"},{"key":"16173_CR49","doi-asserted-by":"publisher","unstructured":"Sun Z, Han Y, Hua Z, Ruan N, Jia W (2021) Improving the efficiency and robustness of deepfakes detection through precise geometric features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 3609\u20133618. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00361","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"16173_CR50","doi-asserted-by":"publisher","unstructured":"Thies J, Zollh\u00f6fer M, Stamminger M, Theobalt C, Nie\u00dfner M (2016) Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 2387\u20132395. https:\/\/doi.org\/10.1109\/CVPR.2016.262","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"16173_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies J, Zollh\u00f6fer M, Nie\u00dfner M (2019) Deferred neural rendering: image synthesis using neural textures. ACM Trans Graph (TOG) 38(4):1\u201312. https:\/\/doi.org\/10.1145\/3306346.3323035","journal-title":"ACM Trans Graph (TOG)"},{"issue":"11","key":"16173_CR52","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(11):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"16173_CR53","doi-asserted-by":"publisher","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Annual Conference on Neural Information Processing Systems. https:\/\/doi.org\/10.48550\/arXiv.1706.03762","DOI":"10.48550\/arXiv.1706.03762"},{"issue":"4","key":"16173_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3499026","volume":"18","author":"Y Yu","year":"2022","unstructured":"Yu Y, Ni R, Li W, Zhao Y (2022) Detection of ai-manipulated fake faces via mining generalized features. ACM Trans Multimed Comput Commun Appl (TOMM) 18(4):1\u201323. https:\/\/doi.org\/10.1145\/3499026","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"16173_CR55","doi-asserted-by":"publisher","unstructured":"Zhang Y, Li G, Cao Y, Zhao X (2020) A method for detecting human-face-tampered videos based on interframe difference. J Cyber Secur 5(2):49\u201372.\u00a0https:\/\/doi.org\/10.19363\/J.cnki.cn10-1380\/tn.2020.02.05","DOI":"10.19363\/J.cnki.cn10-1380\/tn.2020.02.05"},{"key":"16173_CR56","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1609\/aaai.v36i3.20233","volume":"36","author":"B Zhang","year":"2022","unstructured":"Zhang B, Li S, Feng G, Qian Z, Zhang X (2022) Patch diffusion: a general module for face manipulation detection. Proceed AAAI Conf Artif Intell 36:3243\u20133251. https:\/\/doi.org\/10.1609\/aaai.v36i3.20233","journal-title":"Proceed AAAI Conf Artif Intell"},{"key":"16173_CR57","doi-asserted-by":"publisher","unstructured":"Zhang D, Zhu W, Ding X, Yang G, Li F, Deng Z, Song Y (2022) Srtnet: a spatial and residual based two-stream neural network for deepfakes detection. Multimed Tools Appl, pp 1\u201319. https:\/\/doi.org\/10.1007\/s11042-022-13966-x","DOI":"10.1007\/s11042-022-13966-x"},{"key":"16173_CR58","doi-asserted-by":"publisher","unstructured":"Zhao T, Xu X, Xu M, Ding H, Xiong Y, Xia W (2021) Learning self-consistency for deepfake detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 15003\u201315013. https:\/\/doi.org\/10.48550\/arXiv.2012.09311","DOI":"10.48550\/arXiv.2012.09311"},{"key":"16173_CR59","doi-asserted-by":"publisher","unstructured":"Zheng Y, Bao J, Chen D, Zeng M, Wen F (2021) Exploring temporal coherence for more general video face forgery detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 15044\u201315054. https:\/\/doi.org\/10.1109\/ICCV48922.2021.01477","DOI":"10.1109\/ICCV48922.2021.01477"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16173-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16173-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16173-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T03:28:10Z","timestamp":1709522890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16173-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,26]]},"references-count":59,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16173"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16173-4","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,26]]},"assertion":[{"value":"13 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}