{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:50Z","timestamp":1774541690292,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11390-024-3337-8","type":"journal-article","created":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T14:59:21Z","timestamp":1746543561000},"page":"397-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["FSD-GAN: Generative Adversarial Training for Face Swap Detection via the Latent Noise Fingerprint"],"prefix":"10.1007","volume":"40","author":[{"given":"Jia-Wei","family":"Ge","sequence":"first","affiliation":[]},{"given":"Jiu-Xin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Zhi-Xiang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"3337_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J. DeepFakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 2020, 64: 131\u2013148. DOI: https:\/\/doi.org\/10.1016\/J.INFFUS.2020.06.014.","journal-title":"Information Fusion"},{"issue":"5","key":"3337_CR2","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MSP.2011.941841","volume":"28","author":"M Barni","year":"2011","unstructured":"Barni M. Steganography in digital media: Principles, algorithms, and applications (Fridrich, J. 2010) [Book Reviews]. IEEE Signal Processing Magazine, 2011, 28(5): 142\u2013144. DOI: https:\/\/doi.org\/10.1109\/MSP.2011.941841.","journal-title":"IEEE Signal Processing Magazine"},{"key":"3337_CR3","doi-asserted-by":"publisher","first-page":"2459","DOI":"10.1109\/TMM.2022.3147379","volume":"25","author":"J You","year":"2023","unstructured":"You J, Wang Y G, Zhu G, Wu L, Zhang H, Kwong S. Estimating the secret key of spread spectrum watermarking based on equivalent keys. IEEE Trans. Multimedia, 2023, 25: 2459\u20132473. DOI: https:\/\/doi.org\/10.1109\/TMM.2022.3147379.","journal-title":"IEEE Trans. Multimedia"},{"key":"3337_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/3323873.3325042","volume-title":"Proc. the 2019 International Conference on Multimedia Retrieval","author":"H Chen","year":"2019","unstructured":"Chen H, Rouhani B D, Fu C, Zhao J, Koushanfar F. DeepMarks: A secure fingerprinting framework for digital rights management of deep learning models. In Proc. the 2019 International Conference on Multimedia Retrieval, Jun. 2019, pp.105\u2013113. DOI: https:\/\/doi.org\/10.1145\/3323873.3325042."},{"issue":"10","key":"3337_CR5","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre F, Fontaine C, Furon T. Watermarking security: Theory and practice. IEEE Trans. Signal Processing, 2005, 53(10): 3976\u20133987. DOI: https:\/\/doi.org\/10.1109\/TSP.2005.855418.","journal-title":"IEEE Trans. Signal Processing"},{"key":"3337_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014, 2014: 1. DOI: https:\/\/doi.org\/10.1186\/1687-417X-2014-1.","journal-title":"EURASIP Journal on Information Security"},{"issue":"7","key":"3337_CR7","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2019","unstructured":"Zhang R, Dong S, Liu J. Invisible steganography via generative adversarial networks. Multimedia Tools and Applications, 2019, 78(7): 8559\u20138575. DOI: https:\/\/doi.org\/10.1007\/S11042-018-6951-Z.","journal-title":"Multimedia Tools and Applications"},{"key":"3337_CR8","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/CVPR42600.2020.00219","volume-title":"Proc. the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"M Tancik","year":"2020","unstructured":"Tancik M, Mildenhall B, Ng R. StegaStamp: Invisible hyperlinks in physical photographs. In Proc. the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2020, pp.2114\u20132123. DOI: https:\/\/doi.org\/10.1109\/CVPR42600.2020.00219."},{"key":"3337_CR9","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.5555\/3277203.3277324","volume-title":"Proc. the 27th USENIX Conference on Security Symposium","author":"Y Adi","year":"2018","unstructured":"Adi Y, Baum C, Ciss\u00e9 M, Pinkas B, Keshet J. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In Proc. the 27th USENIX Conference on Security Symposium, Aug. 2018, pp.1615\u20131631. DOI: https:\/\/doi.org\/10.5555\/3277203.3277324."},{"key":"3337_CR10","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3454711","volume-title":"Proc. the 33rd International Conference on Neural Information Processing Systems","author":"L Fan","year":"2019","unstructured":"Fan L, Ng K W, Chan C S. Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. In Proc. the 33rd International Conference on Neural Information Processing Systems, Dec. 2019, Article No.424. DOI: https:\/\/doi.org\/10.5555\/3454287.3454711."},{"key":"3337_CR11","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1145\/3297858.3304051","volume-title":"Proc. the 24th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"B D Rouhani","year":"2019","unstructured":"Rouhani B D, Chen H, Koushanfar F. DeepSigns: An end-to-end watermarking framework for ownership protection of deep neural networks. In Proc. the 24th International Conference on Architectural Support for Programming Languages and Operating Systems, Apr. 2019, pp.485\u2013497. DOI: https:\/\/doi.org\/10.1145\/3297858.3304051."},{"key":"3337_CR12","volume-title":"Proc. the 2nd International Conference on Learning Representations","author":"D P Kingma","year":"2014","unstructured":"Kingma D P, Welling M. Auto-encoding variational Bayes. In Proc. the 2nd International Conference on Learning Representations, Apr. 2014."},{"key":"3337_CR13","doi-asserted-by":"publisher","first-page":"2672","DOI":"10.5555\/2969033.2969125","volume-title":"Proc. the 28th International Conference on Neural Information Processing Systems","author":"I J Goodfellow","year":"2014","unstructured":"Goodfellow I J, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial nets. In Proc. the 28th International Conference on Neural Information Processing Systems, Dec. 2014, pp.2672\u20132680. DOI: https:\/\/doi.org\/10.5555\/2969033.2969125."},{"key":"3337_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/ACPR.2017.2","volume-title":"Proc. the 4th IAPR Asian Conference on Pattern Recognition","author":"Z Lu","year":"2017","unstructured":"Lu Z, Li Z, Cao J, He R, Sun Z. Recent progress of face image synthesis. In Proc. the 4th IAPR Asian Conference on Pattern Recognition, Nov. 2017, pp.7\u201312. DOI: https:\/\/doi.org\/10.1109\/ACPR.2017.2."},{"key":"3337_CR15","doi-asserted-by":"publisher","first-page":"2003","DOI":"10.1145\/3394171.3413630","volume-title":"Proc. the 28th ACM International Conference on Multimedia","author":"R Chen","year":"2020","unstructured":"Chen R, Chen X, Ni B, Ge Y. SimSwap: An efficient framework for high fidelity face swapping. In Proc. the 28th ACM International Conference on Multimedia, Oct. 2020, pp.2003\u20132011. DOI: https:\/\/doi.org\/10.1145\/3394171.3413630."},{"key":"3337_CR16","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1109\/CVPR46437.2021.00341","volume-title":"Proc. the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"G Gao","year":"2021","unstructured":"Gao G, Huang H, Fu C, Li Z, He R. Information bottleneck disentanglement for identity swapping. In Proc. the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2021, pp.3403\u20133412. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.00341."},{"key":"3337_CR17","doi-asserted-by":"publisher","first-page":"8789","DOI":"10.1109\/CVPR.2018.00916","volume-title":"Proc. the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Choi","year":"2018","unstructured":"Choi Y, Choi M, Kim M, Ha J W, Kim S, Choo J. Star-GAN: Unified generative adversarial networks for multidomain image-to-image translation. In Proc. the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2018, pp.8789\u20138797. DOI: https:\/\/doi.org\/10.1109\/CVPR.2018.00916."},{"issue":"8","key":"3337_CR18","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TPAMI.2018.2856256","volume":"41","author":"H Zhang","year":"2019","unstructured":"Zhang H, Xu T, Li H, Zhang S, Wang X, Huang X, Metaxas D N. StackGAN++: Realistic image synthesis with stacked generative adversarial networks. IEEE Trans. Pattern Analysis and Machine Intelligence, 2019, 41(8): 1947\u20131962. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2018.2856256.","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"3337_CR19","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/CVPR.2019.00379","volume-title":"Proc. the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"M Liu","year":"2019","unstructured":"Liu M, Ding Y, Xia M, Liu X, Ding E, Zuo W, Wen S. STGAN: A unified selective transfer network for arbitrary image attribute editing. In Proc. the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2019, pp.3668\u20133677. DOI: https:\/\/doi.org\/10.1109\/CVPR.2019.00379."},{"issue":"11","key":"3337_CR20","doi-asserted-by":"publisher","first-page":"5464","DOI":"10.1109\/TIP.2019.2916751","volume":"28","author":"Z He","year":"2019","unstructured":"He Z, Zuo W, Kan M, Shan S, Chen X. AttGAN: Facial attribute editing by only changing what you want. IEEE Trans. Image Processing, 2019, 28(11): 5464\u20135478. DOI: https:\/\/doi.org\/10.1109\/TIP.2019.2916751.","journal-title":"IEEE Trans. Image Processing"},{"issue":"8","key":"3337_CR21","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1007\/s11263-023-01805-x","volume":"131","author":"X Zhang","year":"2023","unstructured":"Zhang X, Zheng Z, Gao D, Zhang B, Yang Y, Chua T S. Multi-view consistent generative adversarial networks for compositional 3D-aware image synthesis. International Journal of Computer Vision, 2023, 131(8): 2219\u20132242. DOI: https:\/\/doi.org\/10.1007\/S11263-023-01805-X.","journal-title":"International Journal of Computer Vision"},{"key":"3337_CR22","volume-title":"Proc. the IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics","author":"L Nataraj","year":"2019","unstructured":"Nataraj L, Mohammed T M, Manjunath B S, Chandrasekaran S, Flenner A, Bappy J H, Roy-Chowdhury A K. Detecting GAN generated fake images using co-occurrence matrices. In Proc. the IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, Jan. 2019."},{"key":"3337_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-030-31456-9_15","volume-title":"Proc. the 14th Chinese Conference on Biometric Recognition","author":"X Xuan","year":"2019","unstructured":"Xuan X, Peng B, Wang W, Dong J. On the generalization of GAN image forensics. In Proc. the 14th Chinese Conference on Biometric Recognition, Oct. 2019, pp.134\u2013141. DOI: https:\/\/doi.org\/10.1007\/978-3-030-31456-9_15."},{"key":"3337_CR24","unstructured":"McCloskey S, Albright M. Detecting GAN-generated imagery using color cues. arXiv: 1812.08247, 2018. https:\/\/arxiv.org\/abs\/1812.08247, Mar. 2025."},{"key":"3337_CR25","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/MIPR.2019.00103","volume-title":"Proc. the 2019 IEEE Conference on Multimedia Information Processing and Retrieval","author":"F Marra","year":"2019","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G. Do GANs leave artificial fingerprints? In Proc. the 2019 IEEE Conference on Multimedia Information Processing and Retrieval, Mar. 2019, pp.506\u2013511. DOI: https:\/\/doi.org\/10.1109\/MIPR.2019.00103."},{"key":"3337_CR26","volume-title":"Proc. the 5th International Conference on Learning Representations","author":"S H Huang","year":"2017","unstructured":"Huang S H, Papernot N, Goodfellow I J, Duan Y, Abbeel P. Adversarial attacks on neural network policies. In Proc. the 5th International Conference on Learning Representations, Apr. 2017."},{"key":"3337_CR27","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-030-66823-5_14","volume-title":"Proc. the European Conference on Computer Vision","author":"N Ruiz","year":"2020","unstructured":"Ruiz N, Bargal S A, Sclaroff S. Disrupting DeepFakes: Adversarial attacks against conditional image translation networks and facial manipulation systems. In Proc. the European Conference on Computer Vision, Aug. 2020, pp.236\u2013251. DOI: https:\/\/doi.org\/10.1007\/978-3-030-66823-5_14."},{"key":"3337_CR28","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1609\/aaai.v35i2.16254","volume-title":"Proc. the 35th AAAI Conference on Artificial Intelligence","author":"Q Huang","year":"2021","unstructured":"Huang Q, Zhang J, Zhou W, Zhang W, Yu N. Initiative defense against facial manipulation. In Proc. the 35th AAAI Conference on Artificial Intelligence, Feb. 2021, pp.1619\u20131627. DOI: https:\/\/doi.org\/10.1609\/aaai.v35i2.16254."},{"key":"3337_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/IJC-NN52387.2021.9533868","volume-title":"Proc. the 2021 International Joint Conference on Neural Networks","author":"C Yang","year":"2021","unstructured":"Yang C, Ding L, Chen Y, Li H. Defending against GAN-based DeepFake attacks via transformation-aware adversarial faces. In Proc. the 2021 International Joint Conference on Neural Networks, Jul. 2021. DOI: https:\/\/doi.org\/10.1109\/IJC-NN52387.2021.9533868."},{"key":"3337_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428173","volume-title":"Proc. the 2021 IEEE International Conference on Multimedia and Expo","author":"J Dong","year":"2021","unstructured":"Dong J, Xie X. Visually maintained image disturbance against DeepFake face swapping. In Proc. the 2021 IEEE International Conference on Multimedia and Expo, Jul. 2021. DOI: https:\/\/doi.org\/10.1109\/ICME51207.2021.9428173."},{"key":"3337_CR31","doi-asserted-by":"publisher","first-page":"3546","DOI":"10.1145\/3474085.3475518","volume-title":"Proc. the 29th ACM International Conference on Multimedia","author":"R Wang","year":"2021","unstructured":"Wang R, Juefei-Xu F, Luo M, Liu Y, Wang L. Faketagger: Robust safeguards against DeepFake dissemination via provenance tracking. In Proc. the 29th ACM International Conference on Multimedia, Oct. 2021, pp.3546\u20133555. DOI: https:\/\/doi.org\/10.1145\/3474085.3475518."},{"key":"3337_CR32","volume-title":"Channel Coding for Telecommunications","author":"M Bossert","year":"1999","unstructured":"Bossert M. Channel Coding for Telecommunications. Wiley, 1999."},{"key":"3337_CR33","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/CVPR.2016.90","volume-title":"Proc. the 2016 IEEE Conference on Computer Vision and Pattern Recognition","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In Proc. the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Jun. 2016, pp.770\u2013778. DOI: https:\/\/doi.org\/10.1109\/CVPR.2016.90."},{"key":"3337_CR34","doi-asserted-by":"publisher","first-page":"214","DOI":"10.5555\/3305381.3305404","volume-title":"Proc. the 34th International Conference on Machine Learning","author":"M Arjovsky","year":"2017","unstructured":"Arjovsky M, Chintala S, Bottou L. Wasserstein generative adversarial networks. In Proc. the 34th International Conference on Machine Learning, Aug. 2017, pp.214\u2013223. DOI: https:\/\/doi.org\/10.5555\/3305381.3305404."},{"key":"3337_CR35","doi-asserted-by":"publisher","first-page":"5769","DOI":"10.5555\/3295222.3295327","volume-title":"Proc. the 31st International Conference on Neural Information Processing Systems","author":"I Gulrajani","year":"2017","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville A C. Improved training of Wasserstein GANs. In Proc. the 31st International Conference on Neural Information Processing Systems, Dec. 2017, pp.5769\u20135779. DOI: https:\/\/doi.org\/10.5555\/3295222.3295327."},{"key":"3337_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCV.2019.00009","volume-title":"Proc. the 2019 IEEE\/CVF International Conference on Computer Vision","author":"A R\u00f6ssler","year":"2019","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Niessner M. Faceforensics++: Learning to detect manipulated facial images. In Proc. the 2019 IEEE\/CVF International Conference on Computer Vision, Oct. 27-Nov. 2, 2019, pp.1\u201311. DOI: https:\/\/doi.org\/10.1109\/ICCV.2019.00009."},{"key":"3337_CR37","doi-asserted-by":"publisher","first-page":"3730","DOI":"10.1109\/ICCV.2015.425","volume-title":"Proc. the 2015 IEEE International Conference on Computer Vision","author":"Z Liu","year":"2015","unstructured":"Liu Z, Luo P, Wang X, Tang X. Deep learning face attributes in the wild. In Proc. the 2015 IEEE International Conference on Computer Vision, Dec. 2015, pp.3730\u20133738. DOI: https:\/\/doi.org\/10.1109\/ICCV.2015.425."},{"key":"3337_CR38","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/ICCV.2017.244","volume-title":"Proc. the 2017 IEEE International Conference on Computer Vision","author":"J Y Zhu","year":"2017","unstructured":"Zhu J Y, Park T, Isola P, Efros A A. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proc. the 2017 IEEE International Conference on Computer Vision, Oct. 2017, pp.2242\u20132251. DOI: https:\/\/doi.org\/10.1109\/ICCV.2017.244."},{"key":"3337_CR39","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/CVPR.2016.207","volume-title":"Proc. the 2016 IEEE Conference on Computer Vision and Pattern Recognition","author":"W Shi","year":"2016","unstructured":"Shi W, Caballero J, Husz\u00e1r F, Totz J, Aitken A P, Bishop R, Rueckert D, Wang Z. Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network. In Proc. the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Jun. 2016, pp.1874\u20131883. DOI: https:\/\/doi.org\/10.1109\/CVPR.2016.207."},{"key":"3337_CR40","doi-asserted-by":"publisher","first-page":"1800","DOI":"10.1109\/CVPR.2017.195","volume-title":"Proc. the 2017 IEEE Conference on Computer Vision and Pattern Recognition","author":"F Chollet","year":"2017","unstructured":"Chollet F. Xception: Deep learning with depthwise separable convolutions. In Proc. the 2017 IEEE Conference on Computer Vision and Pattern Recognition, Jul. 2017, pp.1800\u20131807. DOI: https:\/\/doi.org\/10.1109\/CVPR.2017.195."},{"key":"3337_CR41","doi-asserted-by":"publisher","first-page":"18699","DOI":"10.1109\/CVPR52688.2022.01816","volume-title":"Proc. the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"K Shiohara","year":"2022","unstructured":"Shiohara K, Yamasaki T. Detecting DeepFakes with selfblended images. In Proc. the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2022, pp.18699\u201318708. DOI: https:\/\/doi.org\/10.1109\/CVPR52688.2022.01816."},{"key":"3337_CR42","doi-asserted-by":"publisher","first-page":"3994","DOI":"10.1109\/CVPR52729.2023.00389","volume-title":"Proc. the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"S Dong","year":"2023","unstructured":"Dong S, Wang J, Ji R, Liang J, Fan H, Ge Z. Implicit identity leakage: The stumbling block to improving DeepFake detection generalization. In Proc. the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Jun. 2023, pp.3994\u20134004. DOI: https:\/\/doi.org\/10.1109\/CVPR52729.2023.00389."},{"issue":"10","key":"3337_CR43","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/TIFS.2014.2345479","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Dong J, Tan T. Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans. Information Forensics and Security, 2014, 9(10): 1653\u20131666. DOI: https:\/\/doi.org\/10.1109\/TIFS.2014.2345479.","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"3337_CR44","doi-asserted-by":"publisher","first-page":"14428","DOI":"10.1109\/ICCV48922.2021.01418","volume-title":"Proc. the 2021 IEEE\/CVF International Conference on Computer Vision","author":"N Yu","year":"2021","unstructured":"Yu N, Skripniuk V, Abdelnabi S, Fritz M. Artificial fingerprinting for generative models: Rooting DeepFake attribution in training data. In Proc. the 2021 IEEE\/CVF International Conference on Computer Vision, Oct. 2021, pp.14428\u201314437. DOI: https:\/\/doi.org\/10.1109\/ICCV48922.2021.01418."},{"issue":"3","key":"3337_CR45","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TCSVT.2020.2998476","volume":"31","author":"W Sun","year":"2021","unstructured":"Sun W, Zhou J, Li Y, Cheung M, She J. Robust high-capacity watermarking over online social network shared images. IEEE Trans. Circuits and Systems for Video Technology, 2021, 31(3): 1208\u20131221. DOI: https:\/\/doi.org\/10.1109\/TCSVT.2020.2998476.","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"key":"3337_CR46","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-030-01267-0_40","volume-title":"Proc. the 15th European Conference on Computer Vision","author":"J Zhu","year":"2018","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L. HiDDeN: Hiding data with deep networks. In Proc. the 15th European Conference on Computer Vision, Sept. 2018, pp.682\u2013697. DOI: https:\/\/doi.org\/10.1007\/978-3-030-01267-0_40."},{"key":"3337_CR47","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.engappai.2015.12.013","volume":"50","author":"D Lerch-Hostalot","year":"2016","unstructured":"Lerch-Hostalot D, Meg\u00edas D. Unsupervised steganalysis based on artificial training sets. Engineering Applications of Artificial Intelligence, 2016, 50: 45\u201359. DOI: https:\/\/doi.org\/10.1016\/J.ENGAPPAI.2015.12.013.","journal-title":"Engineering Applications of Artificial Intelligence"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3337-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-024-3337-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3337-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T16:02:38Z","timestamp":1746547358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-024-3337-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["3337"],"URL":"https:\/\/doi.org\/10.1007\/s11390-024-3337-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"9 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Conflict of Interest The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}},{"value":"Ethical Declaration The authors acknowledge that the development and application of the FaceSwap technology can raise significant ethical concerns. All research and practices described herein adhere strictly to ethical guidelines and legal standards, ensuring that our work is compliant with both academic and societal norms. The technology discussed in this study is intended exclusively for defensive purposes\u2014 to detect and mitigate the misuse of faceswapping techniques. We recognize the inherent risks associated with the potential abuse of defensive systems and have therefore implemented rigorous protective measures. These include robust security protocols, continuous monitoring, and strict access controls to prevent unauthorized use, ensuring that our system cannot be exploited for malicious activities.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}]}}