{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:58:03Z","timestamp":1768539483394,"version":"3.49.0"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21276-9","type":"journal-article","created":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T11:39:19Z","timestamp":1768477159000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deepfake detection using a distinctive eye signature and the entropy heat map of the image texture"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5259-5321","authenticated-orcid":false,"given":"Elisabeth","family":"Tchaptchet","sequence":"first","affiliation":[]},{"given":"Elie","family":"Fute Tagne","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Djimeli-Tsajio","sequence":"additional","affiliation":[]},{"given":"Jaime","family":"Acosta","sequence":"additional","affiliation":[]},{"given":"Rawat","family":"Danda","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,15]]},"reference":[{"key":"21276_CR1","unstructured":"Karras T (2017) Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196"},{"key":"21276_CR2","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"21276_CR3","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of stylegan. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8110\u20138119","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"21276_CR4","unstructured":"https:\/\/thispersondoesnotexist.com"},{"key":"21276_CR5","doi-asserted-by":"crossref","unstructured":"Tchaptchet E, Tagne EF, Acosta J, Danda R, Kamhoua C (2024) Detecting deepfakes using gan manipulation defects in human eyes. In: 2024 International conference on computing, networking and communications (ICNC), IEEE, pp 456\u2013462","DOI":"10.1109\/ICNC59896.2024.10556045"},{"key":"21276_CR6","doi-asserted-by":"crossref","unstructured":"Guo H, Hu S, Wang X, Chang M-C, Lyu S (2022) Eyes tell all: Irregular pupil shapes reveal gan-generated faces. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, pp 2904\u20132908","DOI":"10.1109\/ICASSP43922.2022.9746597"},{"key":"21276_CR7","doi-asserted-by":"crossref","unstructured":"Hu S, Li Y, Lyu S (2021) Exposing gan-generated faces using inconsistent corneal specular highlights. In: ICASSP 2021-2021 IEEE International conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 2500\u20132504","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"issue":"1","key":"21276_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","volume":"54","author":"Y Mirsky","year":"2021","unstructured":"Mirsky Y, Lee W (2021) The creation and detection of deepfakes: A survey. ACM computing surveys (CSUR) 54(1):1\u201341","journal-title":"ACM computing surveys (CSUR)"},{"key":"21276_CR9","doi-asserted-by":"crossref","unstructured":"Matern F, Riess C, Stamminger M (2019) Exploiting visual artifacts to expose deepfakes and face manipulations. In: 2019 IEEE Winter applications of computer vision workshops (WACVW), IEEE, pp 83\u201392","DOI":"10.1109\/WACVW.2019.00020"},{"issue":"10","key":"21276_CR10","doi-asserted-by":"publisher","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","volume":"44","author":"Y Nirkin","year":"2021","unstructured":"Nirkin Y, Wolf L, Keller Y, Hassner T (2021) Deepfake detection based on discrepancies between faces and their context. IEEE Trans Pattern Anal Mach Intell 44(10):6111\u20136121","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"21276_CR11","unstructured":"Roy-Chowdhury AK (2019) Detecting gan generated fake images using co-occurrence ma-trices"},{"key":"21276_CR12","unstructured":"Chen Z, Yang H (2020) Manipulated face detector: Joint spatial and frequency domain attention network, 1(2):4. arXiv preprint arXiv:2005.02958"},{"key":"21276_CR13","doi-asserted-by":"crossref","unstructured":"Wang J, Wu Z, Ouyang W, Han X, Chen J, Jiang Y-G, Li S-N (2022) M2tr: Multi-modal multi-scale transformers for deepfake detection. In: Proceedings of the 2022 international conference on multimedia retrieval, pp 615\u2013623","DOI":"10.1145\/3512527.3531415"},{"key":"21276_CR14","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 1\u201311","DOI":"10.1109\/ICCV.2019.00009"},{"key":"21276_CR15","doi-asserted-by":"crossref","unstructured":"Agarwal S, Farid H, Fried O, Agrawala M (2020) Detecting deep-fake videos from phoneme-viseme mismatches. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp 660\u2013661","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"21276_CR16","doi-asserted-by":"crossref","unstructured":"Haliassos A, Vougioukas K, Petridis S, Pantic M (2021) Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5039\u20135049","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"21276_CR17","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5001\u20135010","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"21276_CR18","doi-asserted-by":"crossref","unstructured":"Liu H, Li X, Zhou W, Chen Y, He Y, Xue H, Zhang W, Yu N (2021) Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 772\u2013781","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"21276_CR19","doi-asserted-by":"crossref","unstructured":"Masi I, Killekar A, Mascarenhas RM, Gurudatt SP, AbdAlmageed W (2020) Two-branch recurrent network for isolating deepfakes in videos. In: Computer vision\u2013ECCV 2020: 16th European conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Springer, Part VII 16, pp 667\u2013684","DOI":"10.1007\/978-3-030-58571-6_39"},{"issue":"7","key":"21276_CR20","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1080\/0144929X.2020.1717626","volume":"40","author":"Z Gu","year":"2021","unstructured":"Gu Z, Jin C, Chang D, Zhang L (2021) Predicting webpage aesthetics with heatmap entropy. Behaviour & information technology 40(7):676\u2013690","journal-title":"Behaviour & information technology"},{"key":"21276_CR21","doi-asserted-by":"crossref","unstructured":"He Y, Yu N, Keuper M, Fritz M (2021) Beyond the spectrum: Detecting deepfakes via re-synthesis. arXiv preprint arXiv:2105.14376","DOI":"10.24963\/ijcai.2021\/349"},{"key":"21276_CR22","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang Y, Yan J, Liu W (2021) Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16317\u201316326","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"21276_CR23","unstructured":"Arjovsky M, Chintala S, Bottou, L (2017) Wasserstein generative adversarial networks. In: International conference on machine learning, PMLR, pp 214\u2013223"},{"key":"21276_CR24","unstructured":"Brock A (2018) Large scale gan training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096"},{"key":"21276_CR25","doi-asserted-by":"crossref","unstructured":"Bulat A, Yang J, Tzimiropoulos G (2018) To learn image super-resolution, use a gan to learn how to do image degradation first. In: Proceedings of the European conference on computer vision (ECCV), pp 185\u2013200","DOI":"10.1007\/978-3-030-01231-1_12"},{"key":"21276_CR26","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11831-019-09388-y","volume":"28","author":"H Alqahtani","year":"2021","unstructured":"Alqahtani H, Kavakli-Thorne M, Kumar G (2021) Applications of generative adversarial networks (gans): An updated review. Arch Comput Method Eng 28:525\u2013552","journal-title":"Arch Comput Method Eng"},{"issue":"1","key":"21276_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath AA (2018) Generative adversarial networks: An overview. IEEE Signal Process Mag 35(1):53\u201365","journal-title":"IEEE Signal Process Mag"},{"key":"21276_CR28","doi-asserted-by":"crossref","unstructured":"Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2223\u20132232","DOI":"10.1109\/ICCV.2017.244"},{"key":"21276_CR29","doi-asserted-by":"crossref","unstructured":"Ledig C, Theis L, Husz\u00e1r F, Caballero J, Cunningham A, Acosta A, Aitken A, Tejani A, Totz J, Wang Z et al (2017) Photo-realistic single image super-resolution using a generative adversarial network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4681\u20134690","DOI":"10.1109\/CVPR.2017.19"},{"issue":"4","key":"21276_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3072959.3073659","volume":"36","author":"S Iizuka","year":"2017","unstructured":"Iizuka S, Simo-Serra E, Ishikawa H (2017) Globally and locally consistent image completion. ACM Trans Graph (ToG) 36(4):1\u201314","journal-title":"ACM Trans Graph (ToG)"},{"key":"21276_CR31","unstructured":"Reed S, Akata Z, Yan X, Logeswaran L, Schiele B, Lee H (2016) Generative adversarial text to image synthesis. In: International conference on machine learning, PMLR, pp 1060\u20131069"},{"issue":"1","key":"21276_CR32","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/jimaging9010018","volume":"9","author":"Z Akhtar","year":"2023","unstructured":"Akhtar Z (2023) Deepfakes generation and detection: a short survey. J Imaging 9(1):18","journal-title":"J Imaging"},{"issue":"7","key":"21276_CR33","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1007\/s11263-022-01606-8","volume":"130","author":"F Juefei-Xu","year":"2022","unstructured":"Juefei-Xu F, Wang R, Huang Y, Guo Q, Ma L, Liu Y (2022) Countering malicious deepfakes: Survey, battleground, and horizon. Int J Comput Vision 130(7):1678\u20131734","journal-title":"Int J Comput Vision"},{"key":"21276_CR34","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J (2020) Deepfakes and beyond: A survey of face manipulation and fake detection. Inform Fusion 64:131\u2013148","journal-title":"Inform Fusion"},{"issue":"5","key":"21276_CR35","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/2019627.2019639","volume":"30","author":"F Berthouzoz","year":"2011","unstructured":"Berthouzoz F, Li W, Dontcheva M, Agrawala M (2011) A framework for content-adaptive photo manipulation macros: Application to face, landscape, and global manipulations. ACM Trans Graph 30(5):120\u20131","journal-title":"ACM Trans Graph"},{"key":"21276_CR36","unstructured":"Lu J, Sunkavalli K, Carr N, Hadap S, Forsyth D (2016) A visual representation for editing face images. arXiv preprint arXiv:1612.00522"},{"issue":"2","key":"21276_CR37","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/TCDS.2022.3182650","volume":"15","author":"X Ning","year":"2022","unstructured":"Ning X, Xu S, Nan F, Zeng Q, Wang C, Cai W, Li W, Jiang Y (2022) Face editing based on facial recognition features. IEEE Trans Cogn Develop Syst 15(2):774\u2013783","journal-title":"IEEE Trans Cogn Develop Syst"},{"key":"21276_CR38","unstructured":"Zhao J (2016) Energy-based generative adversarial network. arXiv preprint arXiv:1609.03126"},{"key":"21276_CR39","doi-asserted-by":"crossref","unstructured":"Kossaifi J, Tran L, Panagakis Y, Pantic M (2018) Gagan: Geometry-aware generative adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 878\u2013887","DOI":"10.1109\/CVPR.2018.00098"},{"key":"21276_CR40","doi-asserted-by":"crossref","unstructured":"Kaneko T, Hiramatsu K, Kashino K (2017) Generative attribute controller with conditional filtered generative adversarial networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6089\u20136098","DOI":"10.1109\/CVPR.2017.741"},{"key":"21276_CR41","first-page":"2533","volume":"2023","author":"X Wang","year":"2023","unstructured":"Wang X, Guo H, Hu S, Chang M-C, Lyu S (2023) Gan-generated faces detection: A survey and new perspectives. ECAI 2023:2533\u20132542","journal-title":"ECAI"},{"key":"21276_CR42","doi-asserted-by":"crossref","unstructured":"Amerini I, Galteri L, Caldelli R, Del\u00a0Bimbo A (2019) Deepfake video detection through optical flow based cnn. In: Proceedings of the IEEE\/CVF international conference on computer vision workshops, pp 0\u20130","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"21276_CR43","doi-asserted-by":"crossref","unstructured":"Bonettini N, Cannas ED, Mandelli S, Bondi L, Bestagini P, Tubaro S (2021) Video face manipulation detection through ensemble of cnns. In: 2020 25th International conference on pattern recognition (ICPR), IEEE, pp 5012\u20135019","DOI":"10.1109\/ICPR48806.2021.9412711"},{"issue":"1","key":"21276_CR44","first-page":"80","volume":"3","author":"E Sabir","year":"2019","unstructured":"Sabir E, Cheng J, Jaiswal A, AbdAlmageed W, Masi I, Natarajan P (2019) Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI) 3(1):80\u201387","journal-title":"Interfaces (GUI)"},{"key":"21276_CR45","doi-asserted-by":"crossref","unstructured":"Kumar P, Vatsa M, Singh R (2020) Detecting face2face facial reenactment in videos. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp 2589\u20132597","DOI":"10.1109\/WACV45572.2020.9093628"},{"key":"21276_CR46","doi-asserted-by":"crossref","unstructured":"Wang Y, Dantcheva A (2020) A video is worth more than 1000 lies. comparing 3dcnn approaches for detecting deepfakes. In: 2020 15Th IEEE International conference on automatic face and gesture recognition (FG 2020), IEEE, pp 515\u2013519","DOI":"10.1109\/FG47880.2020.00089"},{"key":"21276_CR47","doi-asserted-by":"crossref","unstructured":"Zhao X, Yu Y, Ni R, Zhao Y (2022) Exploring complementarity of global and local spatiotemporal information for fake face video detection. In: ICASSP 2022-2022 IEEE International conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 2884\u20132888","DOI":"10.1109\/ICASSP43922.2022.9746061"},{"key":"21276_CR48","unstructured":"Koopman M, Rodriguez AM, Geradts Z (2018) Detection of deepfake video manipulation. In: The 20th Irish machine vision and image processing conference (IMVIP), pp 133\u2013136"},{"key":"21276_CR49","unstructured":"Li Y (2018) Exposing deepfake videos by detecting face warping artif acts. arXiv preprint arXiv:1811.00656"},{"key":"21276_CR50","doi-asserted-by":"crossref","unstructured":"Yang X, Li Y, Qi H, Lyu S (2019) Exposing gan-synthesized faces using landmark locations. In: Proceedings of the ACM workshop on information hiding and multimedia security, pp 113\u2013118","DOI":"10.1145\/3335203.3335724"},{"issue":"2","key":"21276_CR51","doi-asserted-by":"publisher","first-page":"616","DOI":"10.3390\/s23020616","volume":"23","author":"Z Xue","year":"2023","unstructured":"Xue Z, Jiang X, Liu Q, Wei Z (2023) Global-local facial fusion based gan generated fake face detection. Sensors 23(2):616","journal-title":"Sensors"},{"key":"21276_CR52","doi-asserted-by":"crossref","unstructured":"Guarnera L, Giudice O, Battiato S (2024) Level up the deepfake detection: a method to effectively discriminate images generated by gan architectures and diffusion models. In: Intelligent systems conference, Springer, pp 615\u2013625","DOI":"10.1007\/978-3-031-66431-1_43"},{"key":"21276_CR53","doi-asserted-by":"crossref","unstructured":"Tchaptchet E, Tagne EF, Acosta J, Danda R, Kamhoua C (2025) Deepfakes detection by iris analysis. IEEE Access","DOI":"10.1109\/ACCESS.2025.3527868"},{"issue":"5","key":"21276_CR54","doi-asserted-by":"publisher","first-page":"371","DOI":"10.3390\/info16050371","volume":"16","author":"E Tchaptchet","year":"2025","unstructured":"Tchaptchet E, Tagne EF, Acosta J, Rawat DB, Kamhoua C (2025) The eyes: A source of information for detecting deepfakes. Information 16(5):371","journal-title":"Information"},{"issue":"1","key":"21276_CR55","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/MSP.2021.3120982","volume":"39","author":"F Lago","year":"2021","unstructured":"Lago F, Pasquini C, B\u00f6hme R, Dumont H, Goffaux V, Boato G (2021) More real than real: A study on human visual perception of synthetic faces [applications corner]. IEEE Signal Process Mag 39(1):109\u2013116","journal-title":"IEEE Signal Process Mag"},{"issue":"3","key":"21276_CR56","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1167\/jov.21.3.4","volume":"21","author":"SJ Nightingale","year":"2021","unstructured":"Nightingale SJ, Agarwal S, Farid H (2021) Perceptual and computational detection of face morphing. J Vis 21(3):4\u20134","journal-title":"J Vis"},{"key":"21276_CR57","doi-asserted-by":"crossref","unstructured":"Gull S, Skilling J (1985) The entropy of an image. In: Maximum-entropy and Bayesian methods in inverse problems, Springer, pp 287\u2013301","DOI":"10.1007\/978-94-017-2221-6_11"},{"key":"21276_CR58","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King DE (2009) Dlib-ml: A machine learning toolkit. J Mach Learn Res 10:1755\u20131758","journal-title":"J Mach Learn Res"},{"key":"21276_CR59","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Y, Zhang K, Muhammad J, Lu T, Zhang Q, Tian Q, He Z, Sun Z, Zhang Y et al (2021) Nir iris challenge evaluation in non-cooperative environments: Segmentation and localization. In: 2021 IEEE International joint conference on biometrics (IJCB), IEEE, pp 1\u201310","DOI":"10.1109\/IJCB52358.2021.9484336"},{"key":"21276_CR60","unstructured":"Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neural networks. In: International conference on machine learning, PMLR, pp 6105\u20136114"},{"issue":"3","key":"21276_CR61","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/83.366472","volume":"4","author":"J-C Yen","year":"1995","unstructured":"Yen J-C, Chang F-J, Chang S (1995) A new criterion for automatic multilevel thresholding. IEEE Trans Image Process 4(3):370\u2013378","journal-title":"IEEE Trans Image Process"},{"key":"21276_CR62","doi-asserted-by":"crossref","unstructured":"Liu Z, Luo P, Wang X, Tang X (2015) Deep learning face attributes in the wild. In: Proceedings of the IEEE international conference on computer vision, pp 3730\u20133738","DOI":"10.1109\/ICCV.2015.425"},{"key":"21276_CR63","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. Adv Neural Inform Process Syst 28"},{"key":"21276_CR64","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"key":"21276_CR65","doi-asserted-by":"crossref","unstructured":"Yang C, Chen M, Yuan Y, Wang Q (2023) Zoom text detector. IEEE Trans Neural Netw Learn Syst","DOI":"10.1109\/TNNLS.2023.3289327"},{"key":"21276_CR66","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.1109\/TIP.2022.3141844","volume":"31","author":"C Yang","year":"2022","unstructured":"Yang C, Chen M, Xiong Z, Yuan Y, Wang Q (2022) Cm-net: Concentric mask based arbitrary-shaped text detection. IEEE Trans Image Process 31:2864\u20132877","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21276-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21276-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21276-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T11:40:16Z","timestamp":1768477216000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21276-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,15]]},"references-count":66,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["21276"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21276-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,15]]},"assertion":[{"value":"23 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Humans or animals were not directly involved in the study. No other ethical approvals were applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Consent was obtained from all the authors to publish the work. None other consent was required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors of the manuscript declare that they have no conflicts of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"3"}}