{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:49:20Z","timestamp":1775548160991,"version":"3.50.1"},"reference-count":118,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:00:00Z","timestamp":1775520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:00:00Z","timestamp":1775520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s11263-026-02806-2","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:52:17Z","timestamp":1775544737000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cascaded Cross-Attention Vision Transformers with Wavelet-Based Encodings for DeepFake Detection"],"prefix":"10.1007","volume":"134","author":[{"given":"Anand","family":"Polamarasetti","sequence":"first","affiliation":[]},{"given":"Shakeel","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6831-3589","authenticated-orcid":false,"given":"Muhammad","family":"Zaman","sequence":"additional","affiliation":[]},{"given":"Rahiel","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Aftab","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Akhunzada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,7]]},"reference":[{"key":"2806_CR1","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). Mesonet: A compact facial video forgery detection network. 2018 IEEE International Workshop on Information Forensics and Security (WIFS), 1\u20137.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"2806_CR2","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., & Echizen, I. (2018). Mesonet: A compact facial video forgery detection network. arXiv:1809.00888","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"2806_CR3","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., & Li, H. (2019). Protecting world leaders against deep fakes. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 38\u201345."},{"key":"2806_CR4","doi-asserted-by":"crossref","unstructured":"Amerini, I., Galteri, L., Caldelli, R., & Del\u00a0Bimbo, A. (2019). Deepfake video detection through optical flow-based cnn. arXiv:1912.08299","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"2806_CR5","doi-asserted-by":"crossref","unstructured":"Ashraf, I., Kehkashan, T., Zaman, M., Akhunzada, A., Talib, H.K., & Cao, Y. (2024). Enhancing micro-expression recognition with broadbent attention mechanism: A high-performance approach for emotion detection, 189\u2013194. IEEE","DOI":"10.1109\/HONET63146.2024.10822916"},{"key":"2806_CR6","doi-asserted-by":"crossref","unstructured":"Balafrej, I., & Dahmane, M. (2024). Enhancing practicality and efficiency of deepfake detection. arXiv:2401.12345","DOI":"10.21203\/rs.3.rs-4320842\/v1"},{"key":"2806_CR7","doi-asserted-by":"crossref","unstructured":"Bayar, B., & Stamm, M.C. (2016). A deep learning approach to universal image manipulation detection using a new convolutional layer. Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 5\u201310.","DOI":"10.1145\/2909827.2930786"},{"issue":"11","key":"2806_CR8","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TIFS.2018.2825953","volume":"13","author":"B Bayar","year":"2018","unstructured":"Bayar, B., & Stamm, M. C. (2018). Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection. IEEE Transactions on Information Forensics and Security, 13(11), 2691\u20132706.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2806_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.patrec.2021.03.005","volume":"146","author":"R Caldelli","year":"2021","unstructured":"Caldelli, R., Galteri, L., & Amerini, I. (2021). Optical flow-based cnn for detection of unlearnt deepfake manipulations. Pattern Recognition Letters, 146, 31\u201337.","journal-title":"Pattern Recognition Letters"},{"key":"2806_CR10","unstructured":"Carletti, M., Piciucco, E., Poggi, G., & Verdoliva, L. (2020). Synthetic video detection using biological signals. arXiv:2006.12837"},{"issue":"4","key":"2806_CR11","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/TMM.2019.2938345","volume":"22","author":"Z Cheng","year":"2019","unstructured":"Cheng, Z., Sun, H., & Takeuchi, M. (2019). Energy compaction-based image compression using convolutional autoencoder. IEEE Transactions on Multimedia, 22(4), 860\u2013873.","journal-title":"IEEE Transactions on Multimedia"},{"key":"2806_CR12","unstructured":"Chingovska, I., Anjos, A., & Marcel, S. (2012). On the effectiveness of local binary patterns in face anti-spoofing. arXiv:1209.5992"},{"key":"2806_CR13","doi-asserted-by":"crossref","unstructured":"Cho, K., Van\u00a0Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., & Bengio, Y. (2014). Learning phrase representations using rnn encoder\u2013decoder for statistical machine translation. arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"2806_CR14","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017). Xception: Deep learning with depthwise separable convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1251\u20131258.","DOI":"10.1109\/CVPR.2017.195"},{"issue":"12","key":"2806_CR15","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TASLP.2019.2938863","volume":"27","author":"J Chorowski","year":"2019","unstructured":"Chorowski, J., Weiss, R. J., & Bengio, S. (2019). Unsupervised speech representation learning using wavenet autoencoders. IEEE\/ACM Transactions on Audio, Speech, and Language Processing, 27(12), 2041\u20132053.","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"key":"2806_CR16","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., & Zisserman, A. (2018). Voxceleb2: Deep speaker recognition. arXiv:1806.05622","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"2806_CR17","unstructured":"Ciftci, U., Demir, I., & Yin, L. (2020). Deepfake detection based on biological signals. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 1\u201310."},{"key":"2806_CR18","unstructured":"Ciftci, U., Demir, I., & Yin, L. (2022). Fakecatcher: Detection of synthetic portrait videos using biological signals. IEEE Transactions on Pattern Analysis and Machine Intelligence."},{"key":"2806_CR19","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., & Verdoliva, L. (2021). Noiseprint++: Improved cnn-based camera model fingerprint. arXiv:2102.12047","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"2806_CR20","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., & Verdoliva, L.(2017). Recasting residual-based local descriptors as convolutional neural networks: An application to image forgery detection. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 159\u2013164.","DOI":"10.1145\/3082031.3083247"},{"key":"2806_CR21","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino, D., Poggi, G., & Verdoliva, L. (2020). Noiseprint: A cnn-based camera model fingerprint. IEEE Transactions on Information Forensics and Security, 15, 144\u2013159.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2806_CR22","doi-asserted-by":"crossref","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., & Jain, A.K. (2020). On the detection of digital face manipulation. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 5781\u20135790","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"2806_CR23","unstructured":"Dang, H., Liu, F., Stehouwer, J., Liu, X., & Jain, A.K. (2020). Real-time deepfake detection on mobile devices using lightweight cnn models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1\u20137."},{"key":"2806_CR24","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal, P., & Nichol, A. (2021). Diffusion models beat gans on image synthesis. Advances in Neural Information Processing Systems (NeurIPS), 34, 8780\u20138794.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"2806_CR25","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., Gutfreund, D., Barhum, M., Kordas, P., R\u00f6ssler, A. (2020). The deepfake detection challenge (dfdc) dataset. arXiv:2006.07397"},{"key":"2806_CR26","doi-asserted-by":"crossref","unstructured":"Donahue, J., Hendricks, L.A., Guadarrama, S., Rohrbach, M., Venugopalan, S., Saenko, K., & Darrell, T.(2014). Long-term recurrent convolutional networks for visual recognition and description. arXiv:1411.4389","DOI":"10.21236\/ADA623249"},{"key":"2806_CR27","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., & Houlsby, N. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. In: International Conference on Learning Representations (ICLR)"},{"key":"2806_CR28","unstructured":"Dzanic, T., Shah, N., & Witherden, F. (2020). Deepfake detection using spectral domain features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1\u20138."},{"key":"2806_CR29","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6ttle, P., R\u00f6ssler, A., Fischer, A., & Nie\u00dfner, M. (2020). Frequency domain analysis for deepfake detection. arXiv:2003.08685"},{"issue":"8","key":"2806_CR30","doi-asserted-by":"publisher","first-page":"128","DOI":"10.3390\/jimaging7080128","volume":"7","author":"O Giudice","year":"2021","unstructured":"Giudice, O., Guarnera, L., & Battiato, S. (2021). Fighting deepfakes by detecting gan dct anomalies. Journal of Imaging, 7(8), 128.","journal-title":"Journal of Imaging"},{"issue":"11","key":"2806_CR31","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., & Mirza, M. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139\u2013144.","journal-title":"Communications of the ACM"},{"key":"2806_CR32","doi-asserted-by":"crossref","unstructured":"Guan, H., Kozak, M., Robertson, E., Yates, A., Bestagini, P., Paris, S., & Barni, M. (2020). Mfc datasets: Large-scale benchmark datasets for media forensic challenge evaluation. arXiv:2002.01686","DOI":"10.1109\/WACVW.2019.00018"},{"key":"2806_CR33","doi-asserted-by":"crossref","unstructured":"Guarnera, L., Giudice, O., Battiato, S.: Deepfake detection by analyzing convolutional traces. arXiv:2002.01168 (2020)","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"2806_CR34","doi-asserted-by":"crossref","first-page":"128426","DOI":"10.1109\/ACCESS.2020.3023037","volume":"8","author":"L Guarnera","year":"2020","unstructured":"Guarnera, L., Giudice, O., & Battiato, S. (2020). Deepfake detection based on spatiotemporal convolutional networks. IEEE Access, 8, 128426\u2013128436.","journal-title":"IEEE Access"},{"issue":"8","key":"2806_CR35","doi-asserted-by":"crossref","first-page":"134","DOI":"10.3390\/jimaging7080126","volume":"7","author":"L Guarnera","year":"2021","unstructured":"Guarnera, L., Giudice, O., & Battiato, S. (2021). Forensic analysis of deepfake videos using image quality metrics. Journal of Imaging, 7(8), 134.","journal-title":"Journal of Imaging"},{"key":"2806_CR36","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., & Delp, E.J. (2018). Deepfake video detection using recurrent neural networks. arXiv:1808.07269","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"2806_CR37","unstructured":"Haliassos, A., Petridis, S., & Pantic, M. (2020). Leveraging real talking faces via self-supervision for robust forgery detection. arXiv:2011.02054"},{"key":"2806_CR38","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., & Pantic, M. (2021). Fakeavceleb: A novel audio-video multimodal deepfake dataset. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), 3574\u20133583."},{"key":"2806_CR39","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., & Pantic, M. (2021). Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 5039\u20135049.","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"2806_CR40","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2015). Deep residual learning for image recognition. arXiv:1512.03385","DOI":"10.1109\/CVPR.2016.90"},{"key":"2806_CR41","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"2806_CR42","unstructured":"Heo, Y.-J., Choi, Y.-J., & Lee, Y.-W. (2021). Deepfake detection scheme based on vision transformer and distillation. arXiv:2104.01353"},{"key":"2806_CR43","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., & Abbeel, P. (2020). Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems (NeurIPS), 33, 6840\u20136851.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"2806_CR44","unstructured":"Howard, A.G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., & Adam, H. (2017). Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv:1704.04861"},{"issue":"1","key":"2806_CR45","doi-asserted-by":"publisher","first-page":"370","DOI":"10.3390\/app10010370","volume":"10","author":"C-C Hsu","year":"2020","unstructured":"Hsu, C.-C., Zhuang, Y.-X., & Lee, C.-Y. (2020). Deepfake image detection based on pairwise learning. Applied Sciences, 10(1), 370.","journal-title":"Applied Sciences"},{"key":"2806_CR46","doi-asserted-by":"crossref","unstructured":"Hu, Y., Li, Y., & Lyu, S. (2021). Exposing gan-generated faces using inconsistent corneal specular highlights. arXiv:2109.09378","DOI":"10.1109\/ICASSP39728.2021.9414582"},{"key":"2806_CR47","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Maaten, L., & Weinberger, K.Q. (2016). Densely connected convolutional networks. arXiv:1608.06993","DOI":"10.1109\/CVPR.2017.243"},{"key":"2806_CR48","doi-asserted-by":"crossref","first-page":"158842","DOI":"10.1109\/ACCESS.2021.3130999","volume":"9","author":"Y Huang","year":"2021","unstructured":"Huang, Y., Zhang, H., Wang, X., & Li, J. (2021). Deepfake detection based on multi-scale spatial-temporal features. IEEE Access, 9, 158842\u2013158851.","journal-title":"IEEE Access"},{"key":"2806_CR49","first-page":"147856","volume":"9","author":"H Jeon","year":"2021","unstructured":"Jeon, H., Park, J., & Kim, D. (2021). Magdr: Mask-guided detection and reconstruction for deepfake video detection and localization. IEEE Access, 9, 147856\u2013147868.","journal-title":"IEEE Access"},{"key":"2806_CR50","doi-asserted-by":"crossref","unstructured":"Jiang, L., Li, R., Wu, W., Qian, C., & Loy, C.C. (2020). Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. arXiv:2001.03024","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"2806_CR51","unstructured":"Jones, V.A. (2020). Artificial intelligence enabled deepfake technology: The emergence of a new threat. Master\u2019s thesis, Utica College"},{"key":"2806_CR52","unstructured":"Karras, T., Aittala, M., Hellsten, J., Laine, S., Lehtinen, J., & Aila, T. (2021). Alias-free generative adversarial networks. arXiv:2106.12423"},{"key":"2806_CR53","unstructured":"Kaur, S., Dutta, K., & Dhall, A. (2022). Xceptiontime: A deep learning framework for temporal deepfake detection. In: Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition (FG), pp. 1\u20138."},{"key":"2806_CR54","unstructured":"Kingma, D.P., & Welling, M. (2013). Auto-encoding variational bayes. arXiv:1312.6114"},{"issue":"3","key":"2806_CR55","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1080\/13600834.2020.1794615","volume":"29","author":"T Kirchengast","year":"2020","unstructured":"Kirchengast, T. (2020). Deepfakes and image manipulation: Criminalisation and control. Information & Communications Technology Law, 29(3), 308\u2013323.","journal-title":"Information & Communications Technology Law"},{"key":"2806_CR56","doi-asserted-by":"crossref","unstructured":"Korshunov, P., & Marcel, S. (2018). Vulnerability assessment and detection of deepfake videos. arXiv:1812.08685","DOI":"10.1109\/ICB45273.2019.8987375"},{"key":"2806_CR57","doi-asserted-by":"crossref","unstructured":"Korshunova, I., Shi, W., Dambre, J., Theis, L., Van Den\u00a0Oord, A., & Maaten, L. (2017). Fast face-swap using convolutional neural networks.arXiv:1710.10196","DOI":"10.1109\/ICCV.2017.397"},{"key":"2806_CR58","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TIFS.2022.3179945","volume":"17","author":"P Korus","year":"2022","unstructured":"Korus, P., & Huang, J. (2022). Deepfake detection using residual noise analysis. IEEE Transactions on Information Forensics and Security, 17, 2046\u20132058.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2806_CR59","doi-asserted-by":"publisher","DOI":"10.3389\/fcomm.2021.632317","volume":"6","author":"J Langguth","year":"2021","unstructured":"Langguth, J., Pogorelov, K., Brenner, S., Filkukov\u00e1, P., & Schroeder, D. T. (2021). Don\u2019t trust your eyes: Image manipulation in the age of deepfakes. Frontiers in Communication, 6, Article 632317.","journal-title":"Frontiers in Communication"},{"key":"2806_CR60","unstructured":"Li, Y., & Lyu, S. (2018). Exposing deepfake videos by detecting face warping artifacts. arXiv:1811.00656"},{"key":"2806_CR61","unstructured":"Li, Y., & Lyu, S. (2018). Exposing deepfake videos by detecting face warping artifacts. arXiv:1811.00656"},{"key":"2806_CR62","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.-C., & Lyu, S. (2018). In ictu oculi: Exposing ai-created fake videos by detecting eye blinking. arXiv:1806.02877","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"2806_CR63","unstructured":"Li, Y., Chang, M.-C., & Lyu, S. (2018). On the detection of synthetic faces generated by gans. IEEE International Conference on Biometrics (ICB), 1\u20138."},{"key":"2806_CR64","doi-asserted-by":"crossref","unstructured":"Li, J., Zheng, K., Gao, L., Han, Z., Li, Z., & Chanussot, J. (2025). Enhanced deep image prior for unsupervised hyperspectral image super-resolution. IEEE Transactions on Geoscience and Remote Sensing","DOI":"10.1109\/TGRS.2025.3531646"},{"key":"2806_CR65","unstructured":"Lima, O., Franklin, S., & Basu, S. (2020). Deepfake detection using spatiotemporal convolutional networks. arXiv:2006.14749"},{"key":"2806_CR66","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., & Guo, B. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 10012\u201310022.","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2806_CR67","unstructured":"Liu, Z., Qi, X., Torr, P.H.S., & Zisserman, A. (2021). Phased consistency for video deepfake detection. arXiv:2106.01204"},{"key":"2806_CR68","doi-asserted-by":"crossref","unstructured":"Lu, W., Liu, L., Zhang, B., Luo, J., Zhao, X., Zhou, Y., & Huang, J. (2023). Detection of deepfake videos using long-distance attention. IEEE Transactions on Neural Networks and Learning Systems.","DOI":"10.1109\/TNNLS.2022.3233063"},{"issue":"4","key":"2806_CR69","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","volume":"53","author":"M Masood","year":"2023","unstructured":"Masood, M., Nawaz, M., Malik, K. M., Javed, A., Irtaza, A., & Malik, H. (2023). Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Applied Intelligence, 53(4), 3974\u20134026.","journal-title":"Applied Intelligence"},{"key":"2806_CR70","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., & Stamminger, M. (2019). Exploiting visual artifacts to expose deepfakes and face manipulations. arXiv:1906.05856","DOI":"10.1109\/WACVW.2019.00020"},{"issue":"1","key":"2806_CR71","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3390\/jcp2010010","volume":"2","author":"A McCarthy","year":"2022","unstructured":"McCarthy, A., Ghadafi, E., Andriotis, P., & Legg, P. (2022). Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey. Journal of Cybersecurity and Privacy, 2(1), 154\u2013190.","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"2806_CR72","unstructured":"Mittal, T., Bhattacharya, S., Chandra, A., Bera, A., & Manocha, D. (2021). Emotions don\u2019t lie: A deepfake detection method using emotional cues. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), 3458\u20133465"},{"key":"2806_CR73","doi-asserted-by":"crossref","unstructured":"Montserrat, D.M., Hao, H., Yarlagadda, S.K., Baireddy, S., Shao, R., Horvath, J., Hennings, V., Weninger, L., Riegler, M., & Borth, D. (2020). Deepfakes detection with automatic face weighting. arXiv:2003.12461","DOI":"10.1109\/CVPRW50498.2020.00342"},{"issue":"10","key":"2806_CR74","doi-asserted-by":"publisher","first-page":"216","DOI":"10.3390\/computers12100216","volume":"12","author":"A Naitali","year":"2023","unstructured":"Naitali, A., Ridouani, M., Salahdine, F., & Kaabouch, N. (2023). Deepfake attacks: Generation, detection, datasets, challenges, and research directions. Computers, 12(10), 216.","journal-title":"Computers"},{"key":"2806_CR75","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., & Echizen, I. (2018). Capsule-forensics: Using capsule networks to detect forged images and videos. arXiv:1810.11215","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"2806_CR76","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., & Echizen, I. (2019). Multi-task learning for detecting and segmenting manipulated facial images and videos. arXiv:1906.06876","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"2806_CR77","first-page":"3486","volume":"15","author":"HH Nguyen","year":"2020","unstructured":"Nguyen, H. H., Yamagishi, J., & Echizen, I. (2020). Deepfake detection using capsule networks. IEEE Transactions on Information Forensics and Security, 15, 3486\u20133499.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2806_CR78","unstructured":"Nichol, A.Q., & Dhariwal, P. (2021). Improved denoising diffusion probabilistic models. arXiv:2102.09672"},{"issue":"4","key":"2806_CR79","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TPAMI.2019.2903062","volume":"42","author":"A Punnappurath","year":"2019","unstructured":"Punnappurath, A., & Brown, M. S. (2019). Learning raw image reconstruction-aware deep image compressors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42(4), 1013\u20131019.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2806_CR80","unstructured":"Qian, Y., Yang, Y., Sun, X., & Su, Z. (2022). Deepfake detection using frequency analysis and attention networks. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 1\u201310."},{"key":"2806_CR81","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., & Echizen, I. (2017). Distinguishing computer graphics from natural images using convolutional neural networks. arXiv:1708.07676","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"2806_CR82","unstructured":"Ramesh, A., Pavlov, M., Goh, G., Gray, S., Voss, C., Radford, A., Chen, M., & Sutskever, I. (2021). Zero-shot text-to-image generation. In: Proceedings of the International Conference on Machine Learning (ICML), pp. 8821\u20138831."},{"issue":"01","key":"2806_CR83","doi-asserted-by":"publisher","first-page":"4780","DOI":"10.1609\/aaai.v33i01.33014780","volume":"33","author":"E Real","year":"2019","unstructured":"Real, E., Aggarwal, A., Huang, Y., & Le, Q. V. (2019). Regularized evolution for image classifier architecture search. Proceedings of the AAAI Conference on Artificial Intelligence, 33(01), 4780\u20134789.","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"2806_CR84","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nie\u00dfner, M. (2018). Faceforensics: A large-scale video dataset for forgery detection in human faces. arXiv:1803.09179"},{"key":"2806_CR85","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nie\u00dfner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. arXiv:1901.08971","DOI":"10.1109\/ICCV.2019.00009"},{"key":"2806_CR86","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., & Nie\u00dfner, M. (2019). Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 1\u201311.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"2806_CR87","unstructured":"Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., & Natarajan, P. (2019). Deepfake detection using cnn-lstm architecture. arXiv:1907.00623"},{"key":"2806_CR88","unstructured":"Sabir, E., Cheng, J., Jaiswal, A., AbdAlmageed, W., Masi, I., & Natarajan, P. (2019). Recurrent convolutional strategies for face manipulation detection in videos. arXiv:1905.00582"},{"key":"2806_CR89","first-page":"3856","volume":"30","author":"S Sabour","year":"2017","unstructured":"Sabour, S., Frosst, N., & Hinton, G. E. (2017). Dynamic routing between capsules. Advances in Neural Information Processing Systems (NeurIPS), 30, 3856\u20133866.","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"2806_CR90","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., & Chen, L.-C. (2018). Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4510\u20134520.","DOI":"10.1109\/CVPR.2018.00474"},{"key":"2806_CR91","unstructured":"Seferbekov, S. (2024). DFDC 1st Place Solution. https:\/\/github.com\/selimsef\/dfdc_deepfake_challenge. Accessed: 2024"},{"key":"2806_CR92","unstructured":"Shiohara, K., & Yamasaki, T. (2021). Deepfake detection using vision transformer with efficient attention. arXiv:2103.00242"},{"key":"2806_CR93","unstructured":"Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"2806_CR94","unstructured":"Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"2806_CR95","doi-asserted-by":"crossref","unstructured":"Sun, Z., Leng, X., Zhang, X., Zhou, Z., Xiong, B., Ji, K., & Kuang, G. (2025). Arbitrary-direction sar ship detection method for multi-scale imbalance. IEEE Transactions on Geoscience and Remote Sensing.","DOI":"10.1109\/TGRS.2025.3559701"},{"key":"2806_CR96","doi-asserted-by":"crossref","unstructured":"Sundararajan, D. (2016). Discrete Wavelet Transform: A Signal Processing Approach. John Wiley & Sons.","DOI":"10.1002\/9781119113119"},{"key":"2806_CR97","doi-asserted-by":"crossref","unstructured":"Talib, H.K.B., Xu, K., Cao, Y., Zaman, M., Toqeer, M.H., & Akhunzada, A. (2025). Error-corrected quantum cnn for gender-based micro-expression analysis in affective computing, 1\u20137. IEEE","DOI":"10.1109\/ICHORA65333.2025.11017004"},{"key":"2806_CR98","doi-asserted-by":"publisher","first-page":"23732","DOI":"10.1109\/ACCESS.2024.3525151","volume":"13","author":"HKB Talib","year":"2025","unstructured":"Talib, H. K. B., Xu, K., Cao, Y., Xu, Y.-P., Xu, Z., Zaman, M., & Akhunzada, A. (2025). Convolutional attention based mechanism for facial microexpression recognition. IEEE Access, 13, 23732\u201323747.","journal-title":"IEEE Access"},{"key":"2806_CR99","unstructured":"Tan, M., & Le, Q.V. (2019). Efficientnet: Rethinking model scaling for convolutional neural networks. In: Proceedings of the 36th International Conference on Machine Learning (ICML), pp. 6105\u20136114."},{"issue":"1","key":"2806_CR100","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNET.2012.2230448","volume":"21","author":"MB Tariq","year":"2013","unstructured":"Tariq, M. B., Bhandankar, K., Valancius, V., Zeitoun, A., Feamster, N., & Ammar, M. (2013). Answering \u201cwhat-if\u2019\u2019 deployment and configuration questions with wise: Techniques and deployment experience. IEEE\/ACM Transactions on Networking, 21(1), 1\u201313.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2806_CR101","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., & Nie\u00dfner, M.(2016). Face2face: Real-time face capture and reenactment of rgb videos. arXiv:1603.01215","DOI":"10.1109\/CVPR.2016.262"},{"issue":"4","key":"2806_CR102","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Stamminger, M., Theobalt, C., & Nie\u00dfner, M. (2019). Deferred neural rendering: Image synthesis using neural textures. ACM Transactions on Graphics (TOG), 38(4), 1\u201312.","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"2806_CR103","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., & Ortega-Garcia, J. (2020). Deepfake detection: Survey, benchmark, and challenges. arXiv:2004.11138"},{"key":"2806_CR104","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., & J\u00e9gou, H. (2021). Training data-efficient image transformers & distillation through attention. In: Proceedings of the 38th International Conference on Machine Learning (ICML), pp. 10347\u201310357."},{"issue":"5","key":"2806_CR105","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"L Verdoliva","year":"2020","unstructured":"Verdoliva, L. (2020). Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910\u2013932.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2806_CR106","doi-asserted-by":"crossref","unstructured":"Wang, S.-Y., Wang, O., Zhang, R., Owens, A., & Efros, A.A.(2020). Cnn-generated images are surprisingly easy to spot... for now. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 8695\u20138704.","DOI":"10.1109\/CVPR42600.2020.00872"},{"issue":"4","key":"2806_CR107","doi-asserted-by":"publisher","first-page":"6188","DOI":"10.1109\/TNNLS.2024.3395751","volume":"36","author":"G Wang","year":"2024","unstructured":"Wang, G., Zhang, X., Peng, Z., Zhang, T., Tang, X., Zhou, H., & Jiao, L. (2024). Negative deterministic information-based multiple instance learning for weakly supervised object detection and segmentation. IEEE Transactions on Neural Networks and Learning Systems, 36(4), 6188\u20136202.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"2806_CR108","unstructured":"Wodajo, D., & Atnafu, S. (2021). Deepfake video detection using convolutional vision transformer. arXiv:2102.11126"},{"key":"2806_CR109","unstructured":"Yang, X., Li, Y., & Lyu, S. (2019). Exposing deepfake videos by detecting face inconsistencies. arXiv:1909.03770"},{"issue":"13","key":"2806_CR110","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.3390\/rs11131557","volume":"11","author":"J Yang","year":"2019","unstructured":"Yang, J., Zhao, Y.-Q., Chan, J.C.-W., & Xiao, L. (2019). A multi-scale wavelet 3d-cnn for hyperspectral image super-resolution. Remote Sensing, 11(13), 1557.","journal-title":"Remote Sensing"},{"key":"2806_CR111","doi-asserted-by":"crossref","unstructured":"Yuan, L., Chen, Y., Wang, T., Yu, W., Shi, Y., Jiang, Z., Tay, F.E.H., Feng, J., & Yan, S. (2021). Tokens-to-token vit: Training vision transformers from scratch on imagenet. arXiv:2101.11986","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"2806_CR112","first-page":"64680","volume":"10","author":"Y Yuan","year":"2022","unstructured":"Yuan, Y., Zhang, X., Wang, Q., & Shi, C. (2022). Deepfake detection via transfer learning and ensemble models. IEEE Access, 10, 64680\u201364691.","journal-title":"IEEE Access"},{"key":"2806_CR113","doi-asserted-by":"crossref","unstructured":"Zaman, M., Kehkashan, T., Akhunzada, A., Alaidaros, H., Uddin, M., & Azeem, M. (2024). Eqcnn: Enhanced remote sensing imagery classification with circuit-based error-corrected quantum convolutional neural networks, 730\u2013737. IEEE.","DOI":"10.1109\/DICTA63115.2024.00109"},{"key":"2806_CR114","unstructured":"Zhang, X., Yang, Y., & Lyu, S. (2020). Deepfake detection based on inconsistency between images and their local noise signatures. arXiv:2012.09397"},{"key":"2806_CR115","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, P., Zhang, W., Li, X., & Zhang, S. (2021). Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2184\u20132193.","DOI":"10.1109\/CVPR46437.2021.00222"},{"issue":"10","key":"2806_CR116","doi-asserted-by":"publisher","first-page":"5055","DOI":"10.1007\/s11042-015-2847-3","volume":"75","author":"L Zheng","year":"2016","unstructured":"Zheng, L., Duffner, S., & Idrissi, K. (2016). Siamese multi-layer perceptrons for dimensionality reduction and face identification. Multimedia Tools and Applications, 75(10), 5055\u20135073.","journal-title":"Multimedia Tools and Applications"},{"key":"2806_CR117","doi-asserted-by":"crossref","unstructured":"Zhou, P., Han, X., Morariu, V.I., & Davis, L.S. (2017). Two-stream neural networks for tampered face detection. arXiv:1708.09548","DOI":"10.1109\/CVPRW.2017.229"},{"key":"2806_CR118","unstructured":"Zhou, P., Han, X., Xie, H., So, A., & Xu, L. (2021). Deepfake detection using spatiotemporal convolutional networks. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 1558\u20131567."}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-026-02806-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-026-02806-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-026-02806-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:53:43Z","timestamp":1775544823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-026-02806-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,7]]},"references-count":118,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["2806"],"URL":"https:\/\/doi.org\/10.1007\/s11263-026-02806-2","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,7]]},"assertion":[{"value":"9 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest among authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"221"}}