{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:40:18Z","timestamp":1770748818427,"version":"3.50.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17588-9","type":"journal-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T11:05:36Z","timestamp":1700564736000},"page":"53549-53580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A generalized novel image forgery detection method using generative adversarial network"],"prefix":"10.1007","volume":"83","author":[{"given":"Preeti","family":"Sharma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5113-0639","authenticated-orcid":false,"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Hitesh Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"17588_CR1","unstructured":"Korshunov P, Marcel S (2018) DeepFakes: a new threat to face recognition? Assessment and detection. pp. 1\u20135. [Online]. http:\/\/arxiv.org\/abs\/1812.08685. Accessed Jul 2021"},{"key":"17588_CR2","doi-asserted-by":"publisher","unstructured":"Xu L (2021) Face manipulation with generative adversarial network. J Phys Conf Ser 1848(1). https:\/\/doi.org\/10.1088\/1742-6596\/1848\/1\/012081","DOI":"10.1088\/1742-6596\/1848\/1\/012081"},{"key":"17588_CR3","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-030-63823-8_37","volume":"1333","author":"D Feng","year":"2020","unstructured":"Feng D, Lu X, Lin X (2020) Deep detection for face manipulation. Commun Comput Inf Sci 1333:316\u2013323. https:\/\/doi.org\/10.1007\/978-3-030-63823-8_37","journal-title":"Commun Comput Inf Sci"},{"key":"17588_CR4","unstructured":"Jay F, Renou J-P, Voinnet O, Navarro L (2017) Unpaired Image-to-image translation using cycle-consistent adversarial networks Jun-Yan. Proc IEEE Int Conf Comput Vis:183\u2013202. [Online]. http:\/\/link.springer.com\/10.1007\/978-1-60327-005-2_13.\u00a0Accessed Jul 2021"},{"issue":"8","key":"17588_CR5","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1111\/1755-0998.13386","volume":"21","author":"Z Wang","year":"2021","unstructured":"Wang Z et al (2021) Automatic inference of demographic parameters using generative adversarial networks. Mol Ecol Resour 21(8):2689\u20132705. https:\/\/doi.org\/10.1111\/1755-0998.13386","journal-title":"Mol Ecol Resour"},{"issue":"12","key":"17588_CR6","doi-asserted-by":"publisher","first-page":"4217","DOI":"10.1109\/TPAMI.2020.2970919","volume":"43","author":"T Karras","year":"2021","unstructured":"Karras T, Laine S, Aila T (2021) A style-based generator architecture for generative adversarial networks. IEEE Trans Pattern Anal Mach Intell 43(12):4217\u20134228. https:\/\/doi.org\/10.1109\/TPAMI.2020.2970919","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"17588_CR7","unstructured":"Van den Oord A, Kalchbrenner N, Espeholt L, Vinyals, O, Graves A (2016) Conditional image generation with pixelcnn decoders. Advances in neural information processing systems, 29"},{"key":"17588_CR8","unstructured":"Kingma DP, Welling M (2014) Auto-encoding variational bayes. 2nd Int. Conf. Learn. Represent. ICLR 2014 - Conf. Track Proc. no. Ml, pp 1\u201314"},{"key":"17588_CR9","unstructured":"Hudson DA, Zitnick L (2021) Generative adversarial transformers. In: International conference on machine learning. PMLR, pp 4487\u20134499. [Online]. http:\/\/arxiv.org\/abs\/2103.01209. Accessed Jul 2021"},{"key":"17588_CR10","unstructured":"Brock A, Donahue J, Simonyan K (2019) Large scale GAN training for high fidelity natural image synthesis, ICLR (2019). Input RGB synthesized RGB ground-truth RGB input red-edge synthesized red-edge ground-truth red-edge"},{"key":"17588_CR11","unstructured":"Tero K, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 8110\u20138119"},{"key":"17588_CR12","doi-asserted-by":"publisher","unstructured":"Battery L Deep transfer ensemble learning-based diagnostic of proposed model\u202f. IEEE\/CAA J Autom Sin PP(1):1\u20133. https:\/\/doi.org\/10.1109\/JAS.2022.106001","DOI":"10.1109\/JAS.2022.106001"},{"key":"17588_CR13","doi-asserted-by":"publisher","unstructured":"Ohata EF et al (2021) Automatic detection of COVID-19 Infection using chest x-ray images through transfer learning. 8(1). https:\/\/doi.org\/10.1109\/JAS.2020.1003393","DOI":"10.1109\/JAS.2020.1003393"},{"issue":"9","key":"17588_CR14","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/JAS.2022.105515","volume":"9","author":"Y Wang","year":"2022","unstructured":"Wang Y, Qiu S, Li D, Du C, Lu B, He H (2022) Multi-modal domain adaptation variational auto-encoder for EEG-based emotion recognition. IEEE\/CAA J Autom Sin 9(9):1612\u20131626. https:\/\/doi.org\/10.1109\/JAS.2022.105515","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"2","key":"17588_CR15","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TASE.2018.2865663","volume":"16","author":"G Wang","year":"2019","unstructured":"Wang G, Qiao J, Bi J, Li W, Zhou M (2019) TL-GDBN: growing deep belief network with transfer learning. IEEE Trans Autom Sci Eng 16(2):874\u2013885. https:\/\/doi.org\/10.1109\/TASE.2018.2865663","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"8","key":"17588_CR16","doi-asserted-by":"publisher","first-page":"3073","DOI":"10.1109\/TNNLS.2019.2935384","volume":"31","author":"G Cai","year":"2020","unstructured":"Cai G, Wang Y, He L, Zhou M (2020) Residual transform networks. IEEE Trans Neural Netw Learn Syst 31(8):3073\u20133086. https:\/\/doi.org\/10.1109\/TNNLS.2019.2935384","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"17588_CR17","doi-asserted-by":"publisher","unstructured":"Yao S, Kang Q, Zhou M, Rawa MJ, Abusorrah A (2022) A survey of transfer learning for machinery diagnostics and prognostics. (August). https:\/\/doi.org\/10.1007\/s10462-022-10230-4. (Springer Netherlands)","DOI":"10.1007\/s10462-022-10230-4"},{"key":"17588_CR18","doi-asserted-by":"publisher","unstructured":"Yang N, Zhou M, Xia B, Guo X (2021) Inversion Based on a detached dual-channel domain method for StyleGAN2 embedding 28:553\u2013557. https:\/\/doi.org\/10.1109\/LSP.2021.3059371","DOI":"10.1109\/LSP.2021.3059371"},{"key":"17588_CR19","doi-asserted-by":"publisher","first-page":"6198","DOI":"10.1109\/TIP.2021.3089905","volume":"30","author":"N Yang","year":"2021","unstructured":"Yang N, Zheng Z, Zhou M, Guo X, Qi L, Wang T (2021) A domain-guided noise-optimization-based inversion method for facial image manipulation. IEEE Trans Image Process 30:6198\u20136211. https:\/\/doi.org\/10.1109\/TIP.2021.3089905","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"17588_CR20","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1109\/JAS.2021.1004057","volume":"8","author":"K Liu","year":"2021","unstructured":"Liu K et al (2021) FISS GAN: a generative adversarial network for foggy image semantic segmentation. IEEE\/CAA J Autom Sin 8(8):1428\u20131439. https:\/\/doi.org\/10.1109\/JAS.2021.1004057","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"9","key":"17588_CR21","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/JAS.2020.1003390","volume":"8","author":"K Zhang","year":"2021","unstructured":"Zhang K, Su Y, Guo X (2021) MU-GAN: facial attribute editing based on multi-attention mechanism. IEEE\/CAA J Autom Sin 8(9):1614\u20131626. https:\/\/doi.org\/10.1109\/JAS.2020.1003390","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"10","key":"17588_CR22","doi-asserted-by":"publisher","first-page":"1886","DOI":"10.1109\/JAS.2022.105887","volume":"9","author":"N Yang","year":"2022","unstructured":"Yang N, Xia B, Han Z, Wang T (2022) Letter a domain-guided model for facial cartoonlization. IEEE\/CAA J Autom Sin 9(10):1886\u20131888. https:\/\/doi.org\/10.1109\/JAS.2022.105887","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"17588_CR23","unstructured":"Zhang H, Goodfellow I, Metaxas D, Odena A (2019) Self-attention generative adversarial networks. In: International conference on machine learning. PMLR, pp 7354\u20137363"},{"key":"17588_CR24","doi-asserted-by":"crossref","unstructured":"Mao X, Li Q, Xie H, Lau RYK, Wang Z, Smolley SP (2017) Least squares generative adversarial networks. In: Proceedings of the IEEE international conference on computer vision. pp 2794\u20132802","DOI":"10.1109\/ICCV.2017.304"},{"issue":"4","key":"17588_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450626.3459766","volume":"40","author":"R Li","year":"2021","unstructured":"Li R, Li X, Hui K-H, Chi-Wing Fu (2021) SP-GAN: sphere-guided 3D shape generation and manipulation. ACM Trans Graphics (TOG) 40(4):1\u201312. https:\/\/doi.org\/10.1145\/3450626.3459766","journal-title":"ACM Trans Graphics (TOG)"},{"key":"17588_CR26","unstructured":"Miyato T, Kataoka T, Koyama M, Yoshida Y (2018) Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17588-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17588-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17588-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T10:15:01Z","timestamp":1715768101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17588-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":26,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17588"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17588-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,21]]},"assertion":[{"value":"9 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Competing of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}