{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:07:26Z","timestamp":1771564046361,"version":"3.50.1"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:00:00Z","timestamp":1740182400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:00:00Z","timestamp":1740182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20684-7","type":"journal-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T07:04:55Z","timestamp":1740207895000},"page":"38159-38201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Face image authentication scheme based on MTCNN and SLT"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4141-5723","authenticated-orcid":false,"given":"Rasha","family":"Thabit","sequence":"first","affiliation":[]},{"given":"Mohanad A.","family":"Al-Askari","sequence":"additional","affiliation":[]},{"given":"Dunya Zeki","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Elham Abdulwahab","family":"Anaam","sequence":"additional","affiliation":[]},{"given":"Zainab H.","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Dina Jamal","family":"Jabbar","sequence":"additional","affiliation":[]},{"given":"Zahraa Aqeel","family":"Salih","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"20684_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12530-x","author":"C-L Wu","year":"2022","unstructured":"Wu C-L, Yang C-K, Lin Y-L (2022) Privacy protection and beautification of cornea images. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-12530-x","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20684_CR2","doi-asserted-by":"publisher","first-page":"100054","DOI":"10.1016\/j.jjimei.2021.100054","volume":"2","author":"S Kolagati","year":"2022","unstructured":"Kolagati S, Priyadharshini T, Mary Anita Rajam V (2022) Exposing deepfakes using a deep multilayer perceptron \u2013 convolutional neural network model. Int J Inf Manag Data Insights 2(1):100054. https:\/\/doi.org\/10.1016\/j.jjimei.2021.100054","journal-title":"Int J Inf Manag Data Insights"},{"key":"20684_CR3","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.ins.2022.03.026","volume":"596","author":"G Wang","year":"2022","unstructured":"Wang G, Jiang Q, Jin X, Cui X (2022) FFR_FD: Effective and fast detection of DeepFakes via feature point defects. Inf Sci (Ny) 596:472\u2013488. https:\/\/doi.org\/10.1016\/j.ins.2022.03.026","journal-title":"Inf Sci (Ny)"},{"key":"20684_CR4","doi-asserted-by":"publisher","unstructured":"Tolosana R et al (2022) \u201cFuture Trends in Digital Face Manipulation and Detection BT - Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks,\u201d In: Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (eds) Cham: Springer International Publishing, pp. 463\u2013482. https:\/\/doi.org\/10.1007\/978-3-030-87664-7_21.","DOI":"10.1007\/978-3-030-87664-7_21"},{"key":"20684_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"P Korus","year":"2017","unstructured":"Korus P (2017) Digital image integrity \u2013 a survey of protection and verification techniques. Digit Signal Process 71:1\u201326. https:\/\/doi.org\/10.1016\/j.dsp.2017.08.009","journal-title":"Digit Signal Process"},{"key":"20684_CR6","doi-asserted-by":"publisher","unstructured":"Castillo Camacho I, Wang K (2021) \u201cA Comprehensive Review of Deep-Learning-Based Methods for Image Forensics,\u201d J Imaging 7(4). https:\/\/doi.org\/10.3390\/jimaging7040069.","DOI":"10.3390\/jimaging7040069"},{"key":"20684_CR7","doi-asserted-by":"publisher","unstructured":"Matern F, Riess C, Stamminger M (2019) \u201cExploiting Visual Artifacts to Expose Deepfakes and Face Manipulations,\u201d in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) pp. 83\u201392. https:\/\/doi.org\/10.1109\/WACVW.2019.00020","DOI":"10.1109\/WACVW.2019.00020"},{"key":"20684_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: A Survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148. https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Inf Fusion"},{"key":"20684_CR9","unstructured":"Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC (2019) \u201cThe deepfake detection challenge (dfdc) preview dataset,\u201d arXiv Prepr. arXiv1910.08854."},{"key":"20684_CR10","unstructured":"Hendrikse R (2019) \u201cHow Deepfakes Could Become A Threat To Your Identity,\u201d Forbes [Online]. Available: https:\/\/www.forbes.com\/sites\/renehendrikse\/2019\/12\/20\/how-deepfakes-could-become-a-threat-to-your-identity\/?sh=3ce7083e1063"},{"key":"20684_CR11","doi-asserted-by":"publisher","unstructured":"Cozzolino D, R\u00f6ssler A, Thies J, Nie\u00dfner M, Verdoliva L (2021) \u201cID-Reveal: Identity-aware DeepFake Video Detection,\u201d in 2021 IEEE\/CVF International Conference on Computer Vision (ICCV) pp. 15088\u201315097. https:\/\/doi.org\/10.1109\/ICCV48922.2021.01483","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"20684_CR12","doi-asserted-by":"publisher","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Niessner M (2019) \u201cFaceForensics++: Learning to Detect Manipulated Facial Images,\u201d in 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311. https:\/\/doi.org\/10.1109\/ICCV.2019.00009","DOI":"10.1109\/ICCV.2019.00009"},{"issue":"12","key":"20684_CR13","doi-asserted-by":"publisher","first-page":"18461","DOI":"10.1007\/s11042-020-10420-8","volume":"80","author":"A Kohli","year":"2021","unstructured":"Kohli A, Gupta A (2021) Detecting DeepFake, FaceSwap and Face2Face facial forgeries using frequency CNN. Multimed Tools Appl 80(12):18461\u201318478. https:\/\/doi.org\/10.1007\/s11042-020-10420-8","journal-title":"Multimed Tools Appl"},{"key":"20684_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11539-y","author":"L Kuang","year":"2022","unstructured":"Kuang L, Wang Y, Hang T, Chen B, Zhao G (2022) A dual-branch neural network for DeepFake video detection by detecting spatial and temporal inconsistencies. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-11539-y","journal-title":"Multimed Tools Appl"},{"key":"20684_CR15","unstructured":"Papastratis I (2020) \u201cDeepfakes: Face synthesis with GANs and Autoencoders,\u201d AI Summer, [Online]. Available: https:\/\/theaisummer.com\/deepfakes\/"},{"key":"20684_CR16","doi-asserted-by":"publisher","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2022) \u201cAn Introduction to\u00a0Digital Face Manipulation BT - Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks,\u201d In: Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (eds) Cham: Springer International Publishing pp. 3\u201326. https:\/\/doi.org\/10.1007\/978-3-030-87664-7_1.","DOI":"10.1007\/978-3-030-87664-7_1"},{"key":"20684_CR17","doi-asserted-by":"crossref","unstructured":"Scherhag U, Budhrani D, Gomez-Barrero M, Busch C (2018) \u201cDetecting Morphed Face Images Using Facial Landmarks BT - Image and Signal Processing,\u201d pp. 444\u2013452.","DOI":"10.1007\/978-3-319-94211-7_48"},{"key":"20684_CR18","unstructured":"Sarkar E, Korshunov P, Colbois L, Marcel S (2020) \u201cVulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks,\u201d ArXiv abs\/2012.0."},{"key":"20684_CR19","doi-asserted-by":"publisher","unstructured":"Raghavendra R, Raja KB, Busch C (2016) \u201cDetecting morphed face images,\u201d in 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137. https:\/\/doi.org\/10.1109\/BTAS.2016.7791169.","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"20684_CR20","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (2022) \u201cAdvances in Computer Vision and Pattern Recognition Handbook of Digital Face Manipulation and Detection From DeepFakes to Morphing Attacks.\u201d Springer Publishing Company, Incorporated. [Online]. Available: https:\/\/link.springer.com\/bookseries\/4205","DOI":"10.1007\/978-3-030-87664-7"},{"key":"20684_CR21","doi-asserted-by":"publisher","unstructured":"Suwajanakorn S, Seitz SM, Kemelmacher-Shlizerman I (2017) \u201cSynthesizing Obama: Learning Lip Sync from Audio,\u201d ACM Trans Graph v 36(4). https:\/\/doi.org\/10.1145\/3072959.3073640.","DOI":"10.1145\/3072959.3073640"},{"key":"20684_CR22","doi-asserted-by":"crossref","unstructured":"Passos LA, Jodas D, da Costa KAP, J\u00fanior LAS, Colombo D, Papa JP (2022) \u201cA Review of Deep Learning-based Approaches for Deepfake Content Detection.\u201d arXiv. [Online]. Available: http:\/\/arxiv.org\/abs\/2202.06095","DOI":"10.22541\/au.169735672.27713914\/v1"},{"issue":"2","key":"20684_CR23","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.bushor.2019.11.006","volume":"63","author":"J Kietzmann","year":"2020","unstructured":"Kietzmann J, Lee LW, McCarthy IP, Kietzmann TC (2020) Deepfakes: Trick or treat? Bus Horiz 63(2):135\u2013146. https:\/\/doi.org\/10.1016\/j.bushor.2019.11.006","journal-title":"Bus Horiz"},{"key":"20684_CR24","unstructured":"Pashine S, Mandiya S, Gupta P, Sheikh R (2021) \u201cDeep Fake Detection: Survey of Facial Manipulation Detection Solutions,\u201d Int Res J Eng Technol 8(8):4441\u20134449. [Online]. Available: http:\/\/arxiv.org\/abs\/2106.12605"},{"issue":"05","key":"20684_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4236\/jcc.2021.95003","volume":"09","author":"AM Almars","year":"2021","unstructured":"Almars AM (2021) Deepfakes Detection Techniques Using Deep Learning: A Survey. J Comput Commun 09(05):20\u201335. https:\/\/doi.org\/10.4236\/jcc.2021.95003","journal-title":"J Comput Commun"},{"issue":"4","key":"20684_CR26","doi-asserted-by":"publisher","first-page":"197","DOI":"10.32604\/jcs.2020.014310","volume":"2","author":"X Ju","year":"2020","unstructured":"Ju X (2020) An Overview of Face Manipulation Detection. J Cyber Secur 2(4):197\u2013207. https:\/\/doi.org\/10.32604\/jcs.2020.014310","journal-title":"J Cyber Secur"},{"issue":"5","key":"20684_CR27","doi-asserted-by":"publisher","first-page":"6259","DOI":"10.1007\/s11042-021-11733-y","volume":"81","author":"T Zhang","year":"2022","unstructured":"Zhang T (2022) Deepfake generation and detection, a survey. Multimed Tools Appl 81(5):6259\u20136276. https:\/\/doi.org\/10.1007\/s11042-021-11733-y","journal-title":"Multimed Tools Appl"},{"key":"20684_CR28","doi-asserted-by":"publisher","unstructured":"Salih ZA, Thabit R, Zidan KA, Khoo BE (2022) \u201cChallenges of Face Image Authentication and Suggested Solutions,\u201d in 2022 International Conference on Information Technology Systems and Innovation (ICITSI). 189\u2013193. https:\/\/doi.org\/10.1109\/ICITSI56531.2022.9970797","DOI":"10.1109\/ICITSI56531.2022.9970797"},{"key":"20684_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7","author":"C Rathgeb","year":"2022","unstructured":"Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (2022) Handbook of Digital Face Manipulation and Detection (From DeepFakes to Morphing Attacks). Springer Cham. https:\/\/doi.org\/10.1007\/978-3-030-87664-7","journal-title":"Springer Cham"},{"key":"20684_CR30","doi-asserted-by":"publisher","unstructured":"Bappy JH, Roy-Chowdhury AK, Bunk J, Nataraj L, Manjunath BS (2017) \u201cExploiting Spatial Structure for Localizing Manipulated Image Regions,\u201d in 2017 IEEE International Conference on Computer Vision (ICCV), pp. 4980\u20134989. https:\/\/doi.org\/10.1109\/ICCV.2017.532.","DOI":"10.1109\/ICCV.2017.532"},{"key":"20684_CR31","doi-asserted-by":"publisher","unstructured":"Cristin R, Ananth JP, Cyril Raj V (2018) \u201cIllumination\u2010based texture descriptor and fruitfly support vector neural network for image forgery detection in face images,\u201d IET Image Process 12(8):1439\u20131449. https:\/\/doi.org\/10.1049\/iet-ipr.2017.1120.","DOI":"10.1049\/iet-ipr.2017.1120"},{"key":"20684_CR32","doi-asserted-by":"publisher","unstructured":"Dang LM, Hassan S, Im S, Moon H (2019) \u201cFace Image Manipulation Detection based on a Convolutional Neural Network,\u201d Expert Syst Appl 129. https:\/\/doi.org\/10.1016\/j.eswa.2019.04.005.","DOI":"10.1016\/j.eswa.2019.04.005"},{"key":"20684_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Yamagishi J, Echizen I (2019) \u201cUse of a Capsule Network to Detect Fake Images and Videos,\u201d arXiv. [Online]. Available: http:\/\/arxiv.org\/abs\/1910.12467","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"20684_CR34","doi-asserted-by":"publisher","unstructured":"Nguyen HH, Yamagishi J, Echizen I (2022) \u201cCapsule-Forensics Networks for\u00a0Deepfake Detection BT - Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks,\u201d In: Rathgeb C, Tolosana R, Vera-Rodriguez R, Busch C (eds) Cham: Springer International Publishing. pp. 275\u2013301. https:\/\/doi.org\/10.1007\/978-3-030-87664-7_13.","DOI":"10.1007\/978-3-030-87664-7_13"},{"key":"20684_CR35","doi-asserted-by":"publisher","unstructured":"Khalil SS, Youssef SM, Saleh SN (2021) \u201cA Multi-Layer Capsule-based Forensics Model for Fake Detection of Digital Visual Media,\u201d in 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA) pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCSPA49915.2021.9385719.","DOI":"10.1109\/ICCSPA49915.2021.9385719"},{"key":"20684_CR36","doi-asserted-by":"publisher","unstructured":"Cao L, Sheng W, Zhang F, Du K, Fu C, Song P (2021) \u201cFace Manipulation Detection Based on Supervised Multi-Feature Fusion Attention Network.,\u201d Sensors (Basel) 21(24). https:\/\/doi.org\/10.3390\/s21248181.","DOI":"10.3390\/s21248181"},{"key":"20684_CR37","doi-asserted-by":"publisher","unstructured":"Marra F, Gragnaniello D, Cozzolino D, Verdoliva L (2018) \u201cDetection of GAN-Generated Fake Images over Social Networks,\u201d in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 384\u2013389. https:\/\/doi.org\/10.1109\/MIPR.2018.00084.","DOI":"10.1109\/MIPR.2018.00084"},{"key":"20684_CR38","doi-asserted-by":"publisher","unstructured":"Hu S, Li Y, Lyu S (2021) \u201cExposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights,\u201d in ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2500\u20132504. https:\/\/doi.org\/10.1109\/ICASSP39728.2021.9414582.","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"20684_CR39","doi-asserted-by":"publisher","unstructured":"Han X, Ji Z, Wang W (2020) \u201cLow Resolution Facial Manipulation Detection,\u201d in 2020 IEEE International Conference on Visual Communications and Image Processing (VCIP) pp. 431\u2013434. https:\/\/doi.org\/10.1109\/VCIP49819.2020.9301796","DOI":"10.1109\/VCIP49819.2020.9301796"},{"key":"20684_CR40","doi-asserted-by":"publisher","unstructured":"Yang X, Li Y, Qi H, Lyu S (2019) \u201cExposing GAN-synthesized Faces Using Landmark Locations,\u201d in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 113\u2013118. https:\/\/doi.org\/10.1145\/3335203.3335724.","DOI":"10.1145\/3335203.3335724"},{"key":"20684_CR41","doi-asserted-by":"publisher","unstructured":"McCloskey S, Albright M (2019) \u201cDetecting GAN-Generated Imagery Using Saturation Cues,\u201d in 2019 IEEE International Conference on Image Processing (ICIP), pp. 4584\u20134588. https:\/\/doi.org\/10.1109\/ICIP.2019.8803661.","DOI":"10.1109\/ICIP.2019.8803661"},{"key":"20684_CR42","unstructured":"Li H, Li B, Tan S, Huang J (2018) \u201cDetection of Deep Network Generated Images Using Disparities in Color Components,\u201d ArXiv, abs\/1808.0."},{"issue":"5","key":"20684_CR43","doi-asserted-by":"publisher","first-page":"532-1","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532","volume":"31","author":"L Nataraj","year":"2019","unstructured":"Nataraj L et al (2019) Detecting GAN generated Fake Images using Co-occurrence Matrices. Electron Imaging 31(5):532-1\u2013532-7. https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2019.5.MWSF-532","journal-title":"Electron Imaging"},{"key":"20684_CR44","doi-asserted-by":"publisher","unstructured":"Barni M, Kallas K, Nowroozi E, Tondi B (2020) \u201cCNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis,\u201d in 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/WIFS49906.2020.9360905.","DOI":"10.1109\/WIFS49906.2020.9360905"},{"key":"20684_CR45","doi-asserted-by":"publisher","unstructured":"Dang H, Liu F, Stehouwer J, Liu X, Jain AK (2020) \u201cOn the Detection of Digital Face Manipulation,\u201d in 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5780\u20135789. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00582.","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"20684_CR46","unstructured":"Frank J, Eisenhofer T, Sch\u00f6nherr L, Fischer A, Kolossa D, Holz T (2020) \u201cLeveraging frequency analysis for deep fake image recognition,\u201d in 37th International Conference on Machine Learning, ICML 2020 PartF16814:3205\u20133216"},{"issue":"5","key":"20684_CR47","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/JSTSP.2020.2994523","volume":"14","author":"Z Mi","year":"2020","unstructured":"Mi Z, Jiang X, Sun T, Xu K (2020) GAN-Generated Image Detection With Self-Attention Mechanism Against GAN Generator Defect. IEEE J Sel Top Signal Process 14(5):969\u2013981. https:\/\/doi.org\/10.1109\/JSTSP.2020.2994523","journal-title":"IEEE J Sel Top Signal Process"},{"key":"20684_CR48","doi-asserted-by":"publisher","unstructured":"Zhang X, Karaman S, Chang S-F (2019) \u201cDetecting and Simulating Artifacts in GAN Fake Images,\u201d in 2019 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/WIFS47025.2019.9035107","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"20684_CR49","unstructured":"Dzanic T, Shah K, Witherden FD (2020) \u201cFourier spectrum discrepancies in deep network generated images,\u201d in Advances in Neural Information Processing Systems 2020-Decem."},{"key":"20684_CR50","doi-asserted-by":"publisher","unstructured":"Durall R, Keuper M, Keuper J (2020) \u201cWatch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions,\u201d in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 7887\u20137896. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00791.","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"20684_CR51","doi-asserted-by":"publisher","unstructured":"Bonettini N, Bestagini P, Milani S, Tubaro S (2020) \u201cOn the use of Benford\u2019s law to detect GAN-generated images,\u201d Proc Int Conf Pattern Recognit pp. 5495\u20135502. https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412944.","DOI":"10.1109\/ICPR48806.2021.9412944"},{"key":"20684_CR52","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) \u201cXception: Deep Learning with Depthwise Separable Convolutions,\u201d 2017 IEEE Conf. Comput. Vis. Pattern Recognit pp. 1800\u20131807.","DOI":"10.1109\/CVPR.2017.195"},{"key":"20684_CR53","doi-asserted-by":"crossref","unstructured":"Sitawarin C Wagner DA (2020) \u201cMinimum-Norm Adversarial Examples on KNN and KNN based Models,\u201d 2020 IEEE Secur Priv Work pp. 34\u201340, 2020.","DOI":"10.1109\/SPW50608.2020.00023"},{"issue":"1","key":"20684_CR54","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309\u2013332. https:\/\/doi.org\/10.1007\/s11042-015-3055-x","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"20684_CR55","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"},{"key":"20684_CR56","doi-asserted-by":"crossref","unstructured":"Wen Y, Zhang K, Li Z, Qiao Y (2016) \u201cA Discriminative Feature Learning Approach for Deep Face Recognition BT - Computer Vision \u2013 ECCV 2016,\u201d in Computer Vision \u2013 ECCV 2016 pp. 499\u2013515.","DOI":"10.1007\/978-3-319-46478-7_31"},{"issue":"11","key":"20684_CR57","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1109\/TNNLS.2018.2876865","volume":"30","author":"Z-Q Zhao","year":"2019","unstructured":"Zhao Z-Q, Zheng P, Xu S-T, Wu X (2019) Object Detection With Deep Learning: A Review. IEEE Trans Neural Networks Learn Syst 30(11):3212\u20133232. https:\/\/doi.org\/10.1109\/TNNLS.2018.2876865","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"20684_CR58","doi-asserted-by":"publisher","unstructured":"Cao Q, Shen L, Xie W, Parkhi OM, Zisserman A (2018) \u201cVGGFace2: A Dataset for Recognising Faces across Pose and Age,\u201d in 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018) pp. 67\u201374. https:\/\/doi.org\/10.1109\/FG.2018.00020.","DOI":"10.1109\/FG.2018.00020"},{"issue":"2","key":"20684_CR59","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11263-019-01247-4","volume":"128","author":"L Liu","year":"2020","unstructured":"Liu L et al (2020) Deep Learning for Generic Object Detection: A Survey. Int J Comput Vis 128(2):261\u2013318. https:\/\/doi.org\/10.1007\/s11263-019-01247-4","journal-title":"Int J Comput Vis"},{"issue":"8","key":"20684_CR60","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","volume":"53","author":"A Khan","year":"2020","unstructured":"Khan A, Sohail A, Zahoora U, Qureshi AS (2020) A survey of the recent architectures of deep convolutional neural networks. Artif Intell Rev 53(8):5455\u20135516. https:\/\/doi.org\/10.1007\/s10462-020-09825-6","journal-title":"Artif Intell Rev"},{"key":"20684_CR61","doi-asserted-by":"publisher","unstructured":"Baltrusaitis T, Zadeh A, Lim YC, Morency L (2018) \u201cOpenFace 2.0: Facial Behavior Analysis Toolkit,\u201d in 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 59\u201366. https:\/\/doi.org\/10.1109\/FG.2018.00019.","DOI":"10.1109\/FG.2018.00019"},{"key":"20684_CR62","doi-asserted-by":"publisher","unstructured":"Wang et al (2018) \u201cCosFace: Large Margin Cosine Loss for Deep Face Recognition,\u201d in 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5265\u20135274. https:\/\/doi.org\/10.1109\/CVPR.2018.00552","DOI":"10.1109\/CVPR.2018.00552"},{"key":"20684_CR63","doi-asserted-by":"publisher","unstructured":"Deng J, Guo J, Xue N, Zafeiriou S (2019) \u201cArcFace: Additive Angular Margin Loss for Deep Face Recognition,\u201d in 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4685\u20134694. https:\/\/doi.org\/10.1109\/CVPR.2019.00482","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"5","key":"20684_CR64","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11760-021-02087-x","volume":"16","author":"M Gu","year":"2022","unstructured":"Gu M, Liu X, Feng J (2022) Classroom face detection algorithm based on improved MTCNN. Signal Image Video Process 16(5):1355\u20131362. https:\/\/doi.org\/10.1007\/s11760-021-02087-x","journal-title":"Signal Image Video Process"},{"issue":"1","key":"20684_CR65","doi-asserted-by":"publisher","first-page":"102","DOI":"10.3103\/S0146411621010090","volume":"55","author":"C Wu","year":"2021","unstructured":"Wu C, Zhang Y (2021) MTCNN and FACENET Based Access Control System for Face Detection and Recognition. Autom Control Comput Sci 55(1):102\u2013112. https:\/\/doi.org\/10.3103\/S0146411621010090","journal-title":"Autom Control Comput Sci"},{"key":"20684_CR66","doi-asserted-by":"publisher","unstructured":"Shi W, Li J, Yang Y (2020) \u201cFace Fatigue Detection Method Based on MTCNN and Machine Vision BT - International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019,\u201d in International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, pp. 233\u2013240. https:\/\/doi.org\/10.1007\/978-3-030-25128-4_31.","DOI":"10.1007\/978-3-030-25128-4_31"},{"key":"20684_CR67","doi-asserted-by":"publisher","unstructured":"Cao J, Pang R, Ma R, Qi Y (2021) \u201cFace Mask Recognition Based on MTCNN and MobileNet BT - Advances in Simulation and Process Modelling,\u201d in Advances in Simulation and Process Modelling. ISSPM 2020. Advances in Intelligent Systems and Computing, pp. 433\u2013442. https:\/\/doi.org\/10.1007\/978-981-33-4575-1_41.","DOI":"10.1007\/978-981-33-4575-1_41"},{"key":"20684_CR68","doi-asserted-by":"publisher","unstructured":"Yifan W, Xiao C, Wenyi Z, Guangzhou Z, Yuancheng C (2022) \u201cWeak and Small Face Target Recognition Based on MTCNN Network in Dynamic Platform BT - Cyber Security Intelligence and Analytics,\u201d in Cyber Security Intelligence and Analytics. CSIA 2022. Lecture Notes on Data Engineering and Communications Technologies, pp. 129\u2013137. https:\/\/doi.org\/10.1007\/978-3-030-97874-7_16.","DOI":"10.1007\/978-3-030-97874-7_16"},{"key":"20684_CR69","doi-asserted-by":"publisher","unstructured":"Burri RD, Swarupa K, Dileep Sagar P, Thanmayee K (2022) \u201cReal-Time Driver Drowsiness Detection Using Visual Behaviour and MTCNN Algorithm BT - Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems,\u201d in Proceedings of Third International Conference on Intelligent Computing, Information and Control Systems. Advances in Intelligent Systems and Computing, pp. 913\u2013921. https:\/\/doi.org\/10.1007\/978-981-16-7330-6_67.","DOI":"10.1007\/978-981-16-7330-6_67"},{"key":"20684_CR70","doi-asserted-by":"publisher","unstructured":"Tiwari AS, Gupta P, Jain A, Panjwani HV, Malathi G (2022) \u201cFace Recognition with Mask Using MTCNN and FaceNet BT - Artificial Intelligence and Technologies,\u201d in Lecture Notes in Electrical Engineering, pp. 103\u2013109. https:\/\/doi.org\/10.1007\/978-981-16-6448-9_12.","DOI":"10.1007\/978-981-16-6448-9_12"},{"issue":"18","key":"20684_CR71","doi-asserted-by":"publisher","first-page":"26661","DOI":"10.1007\/s11042-019-07836-2","volume":"78","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Lv P, Lu X, Li J (2019) Face detection and alignment method for driver on highroad based on improved multi-task cascaded convolutional networks. Multimed Tools Appl 78(18):26661\u201326679. https:\/\/doi.org\/10.1007\/s11042-019-07836-2","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"20684_CR72","doi-asserted-by":"publisher","first-page":"17223","DOI":"10.1007\/s11042-020-09601-2","volume":"80","author":"J Li","year":"2021","unstructured":"Li J, Wang Y, Fang G, Zeng Z (2021) Real-time detection tracking and recognition algorithm based on multi-target faces. Multimed Tools Appl 80(11):17223\u201317238. https:\/\/doi.org\/10.1007\/s11042-020-09601-2","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20684_CR73","doi-asserted-by":"publisher","first-page":"16707","DOI":"10.1007\/s11042-019-08014-0","volume":"79","author":"X Zhao","year":"2020","unstructured":"Zhao X, Lin S, Chen X, Ou C, Liao C (2020) Application of face image detection based on deep learning in privacy security of intelligent cloud platform. Multimed Tools Appl 79(23):16707\u201316718. https:\/\/doi.org\/10.1007\/s11042-019-08014-0","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20684_CR74","doi-asserted-by":"publisher","first-page":"13439","DOI":"10.1007\/s11042-020-10421-7","volume":"80","author":"R Thabit","year":"2021","unstructured":"Thabit R (2021) Review of medical image authentication techniques and their recent trends. Multimed Tools Appl 80(9):13439\u201313473. https:\/\/doi.org\/10.1007\/s11042-020-10421-7","journal-title":"Multimed Tools Appl"},{"key":"20684_CR75","doi-asserted-by":"publisher","unstructured":"Mohammed RT, Khoo BE (2013) \u201cRobust reversible watermarking scheme based on wavelet-like transform,\u201d. https:\/\/doi.org\/10.1109\/ICSIPA.2013.6708032.","DOI":"10.1109\/ICSIPA.2013.6708032"},{"key":"20684_CR76","doi-asserted-by":"publisher","unstructured":"Thabit R (2019) \u201cMulti-biometric watermarking scheme based on interactive segmentation process,\u201d Period Polytech Electr Eng Comput Sci 63(4). https:\/\/doi.org\/10.3311\/PPee.14219.","DOI":"10.3311\/PPee.14219"},{"key":"20684_CR77","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) \u201cCapacity improved robust lossless image watermarking,\u201d IET Image Process 8(11). https:\/\/doi.org\/10.1049\/iet-ipr.2013.0862.","DOI":"10.1049\/iet-ipr.2013.0862"},{"key":"20684_CR78","unstructured":"Thabit R (2019) \u201cImproved steganography techniques for different types of secret data,\u201d Adv Syst Sc Appl 19(3)."},{"key":"20684_CR79","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2015) \u201cA new robust lossless data hiding scheme and its application to color medical images,\u201d Digit Signal Process A Rev J 38. https:\/\/doi.org\/10.1016\/j.dsp.2014.12.005.","DOI":"10.1016\/j.dsp.2014.12.005"},{"key":"20684_CR80","unstructured":"Thabit R (2015) \u201cA study of robust reversible image watermarking based on Slantlet transform (PhD thesis),\u201d UNIVERSITI SAINS MALAYSIA. [Online]. Available: https:\/\/elib.usm.my\/cgi-bin\/koha\/opac-detail.pl?biblionumber=722519"},{"key":"20684_CR81","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) \u201cRobust reversible watermarking scheme using Slantlet transform matrix,\u201d J Syst Softw 88(1). https:\/\/doi.org\/10.1016\/j.jss.2013.09.033.","DOI":"10.1016\/j.jss.2013.09.033"},{"key":"20684_CR82","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) \u201cA new robust reversible watermarking method in the transform domain,\u201d Lect Notes Electr Eng 291 LNEE. https:\/\/doi.org\/10.1007\/978-981-4585-42-2_19.","DOI":"10.1007\/978-981-4585-42-2_19"},{"issue":"1","key":"20684_CR83","first-page":"117","volume":"22","author":"R Thabit","year":"2022","unstructured":"Thabit R, Khoo BE (2022) Robust Reversible Watermarking Application for Fingerprint Image Security. Adv Syst Sci Appl 22(1):117\u2013129","journal-title":"Adv Syst Sci Appl"},{"issue":"8","key":"20684_CR84","doi-asserted-by":"publisher","first-page":"5822","DOI":"10.1016\/j.jksuci.2022.02.009","volume":"34","author":"A Aminuddin","year":"2022","unstructured":"Aminuddin A, Ernawan F (2022) AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking. J King Saud Univ Comput Inf Sci 34(8):5822\u20135840. https:\/\/doi.org\/10.1016\/j.jksuci.2022.02.009","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"20684_CR85","doi-asserted-by":"publisher","first-page":"6522","DOI":"10.1109\/ACCESS.2020.3047270","volume":"9","author":"W Hong","year":"2021","unstructured":"Hong W, Chen J, Chang PS, Wu J, Chen TS, Lin J (2021) A Color Image Authentication Scheme with Grayscale Invariance. IEEE Access 9:6522\u20136535. https:\/\/doi.org\/10.1109\/ACCESS.2020.3047270","journal-title":"IEEE Access"},{"issue":"2","key":"20684_CR86","doi-asserted-by":"publisher","first-page":"510","DOI":"10.3745\/JIPS.02.0082","volume":"14","author":"C Wang","year":"2018","unstructured":"Wang C, Zhang H, Zhou X (2018) Review on self-embedding fragile watermarking for image authentication and self-recovery. J Inf Process Syst 14(2):510\u2013522. https:\/\/doi.org\/10.3745\/JIPS.02.0082","journal-title":"J Inf Process Syst"},{"key":"20684_CR87","first-page":"1","volume":"2267","author":"C Lee","year":"2019","unstructured":"Lee C, Shen J, Chen Z, Agrawi S (2019) Self-Embedding Authentication Watermarking High-Quality Image Recovery. Sensors 2267:1\u201318","journal-title":"Sensors"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20684-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20684-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20684-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T09:45:18Z","timestamp":1758102318000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20684-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,22]]},"references-count":87,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["20684"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20684-7","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,22]]},"assertion":[{"value":"20 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No fund available for this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors have declared that there are no competing interests exist.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}