{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T13:07:47Z","timestamp":1775653667125,"version":"3.50.1"},"reference-count":116,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach. Intell. Res."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s11633-025-1612-y","type":"journal-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T10:36:08Z","timestamp":1775644568000},"page":"409-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["StegaFFD: Privacy-preserving Face Forgery Detection via Fine-grained Steganographic Domain Lifting"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5429-9082","authenticated-orcid":false,"given":"Guoqing","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8387-4245","authenticated-orcid":false,"given":"Xun","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0640-5671","authenticated-orcid":false,"given":"Hui","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-9368","authenticated-orcid":false,"given":"Ajian","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6129-3260","authenticated-orcid":false,"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0530-4201","authenticated-orcid":false,"given":"Wenzhong","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4385-6306","authenticated-orcid":false,"given":"Shan","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3958-6489","authenticated-orcid":false,"given":"Chenqi","family":"Kong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-9553","authenticated-orcid":false,"given":"Yi","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,8]]},"reference":[{"key":"1612_CR1","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/CVPR.2016.262","volume-title":"Proceedings of IEEE Conference on Computer Vision and Pattern Recognition","author":"J Thies","year":"2016","unstructured":"J. Thies, M. Zollh\u00f6fer, M. Stamminger, C. Theobalt, M. Nie\u00dfner. Face2Face: Real-time face capture and reenactment of RGB videos. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, USA, pp. 2387\u20132395, 2016. DOI: https:\/\/doi.org\/10.1109\/CVPR.2016.262."},{"issue":"9","key":"1612_CR2","doi-asserted-by":"publisher","first-page":"7608","DOI":"10.1109\/TPAMI.2025.3573785","volume":"47","author":"X Lin","year":"2025","unstructured":"X. Lin, A. Liu, Z. Yu, R. Cai, S. Wang, Y. Yu, J. Wan, Z. Lei, X. Cao, A. Kot. Reliable and balanced transfer learning for generalized multimodal face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 47, no. 9, pp. 7608\u20137625, 2025. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2025.3573785.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/CVPR52733.2024.00028","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"X Lin","year":"2024","unstructured":"X. Lin, S. Wang, R. Cai, Y. Liu, Y. Fu, W. Tang, Z. Yu, A. Kot. Suppress and rebalance: Towards generalized multi-modal face anti-spoofing. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 211\u2013221, 2024. DOI: https:\/\/doi.org\/10.1109\/CVPR52733.2024.00028."},{"issue":"12","key":"1612_CR4","doi-asserted-by":"publisher","first-page":"11348","DOI":"10.1109\/TPAMI.2025.3601053","volume":"47","author":"R Cai","year":"2025","unstructured":"R. Cai, Y. Cui, Z. Yu, X. Lin, C. Chen, A. Kot. Rehearsal-free and efficient continual learning for cross-domain face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 47, no. 12, pp. 11348\u201311365, 2025. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2025.3601053.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"1612_CR5","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TETCI.2021.3100646","volume":"7","author":"M Li","year":"2023","unstructured":"M. Li, Y. M. Cheung. Identity-preserved complete face recovering network for partial face image. IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 7, no. 2, pp. 604\u2013609, 2023. DOI: https:\/\/doi.org\/10.1109\/TETCI.2021.3100646.","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"1612_CR6","doi-asserted-by":"publisher","unstructured":"X. Lin, W. Tang, H. Wang, Y. Liu, Y. Ju, S. Wang, Z. Yu. Exposing image splicing traces in scientific publications via uncertainty-guided refinement. Patterns, vol. 5, no. 9, Article number 101038, 2024. DOI: https:\/\/doi.org\/10.1016\/j.patter.2024.101038.","DOI":"10.1016\/j.patter.2024.101038"},{"key":"1612_CR7","doi-asserted-by":"publisher","unstructured":"X. Lin, S. Wang, J. Deng, Y. Fu, X. Bai, X. Chen, X. Qu, W. Tang. Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recognition, vol. 133, Article number 109026, 2023. DOI: https:\/\/doi.org\/10.1016\/j.patcog.2022.109026.","DOI":"10.1016\/j.patcog.2022.109026"},{"key":"1612_CR8","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.patrec.2023.11.005","volume":"176","author":"H Wang","year":"2023","unstructured":"H. Wang, J. Deng, X. Lin, W. Tang, S. Wang. CDS-Net: Cooperative dual-stream network for image manipulation detection. Pattern Recognition Letters, vol. 176, pp. 167\u2013173, 2023. DOI: https:\/\/doi.org\/10.1016\/j.patrec.2023.11.005.","journal-title":"Pattern Recognition Letters"},{"key":"1612_CR9","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1109\/TIFS.2023.3332218","volume":"19","author":"A Luo","year":"2024","unstructured":"A. Luo, C. Kong, J. Huang, Y. Hu, X. Kang, A. C. Kot. Beyond the prior forgery knowledge: Mining critical clues for general face forgery detection. IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1168\u20131182, 2024. DOI: https:\/\/doi.org\/10.1109\/TIFS.2023.3332218.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"1612_CR10","doi-asserted-by":"publisher","first-page":"4116","DOI":"10.1109\/TCSVT.2024.3522091","volume":"35","author":"A Luo","year":"2025","unstructured":"A. Luo, R. Cai, C. Kong, Y. Ju, X. Kang, J. Huang, A. C. Kot. Forgery-aware adaptive learning with vision transformer for generalized face forgery detection. IEEE Transactions on Circuits and Systems for Video Technology, vol. 35, no. 5, pp. 4116\u20131129, 2025. DOI: https:\/\/doi.org\/10.1109\/TCSVT.2024.3522091.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"1612_CR11","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TIFS.2022.3169921","volume":"17","author":"C Kong","year":"2022","unstructured":"C. Kong, B. Chen, H. Li, S. Wang, A. Rocha, S. Kwong. Detect and locate: Exposing face manipulation by semantic- and noise-level telltales. IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1741\u20131756, 2022. DOI: https:\/\/doi.org\/10.1109\/TIFS.2022.3169921.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR12","volume-title":"MoE-FFD: Mixture of experts for generalized and parameter-efficient face forgery detection","author":"C Kong","year":"2024","unstructured":"C. Kong, A. Luo, S. Xia, Y. Yu, H. Li, A. C. Kot. MoE-FFD: Mixture of experts for generalized and parameter-efficient face forgery detection, [Online], Available: https:\/\/arxiv.org\/abs\/2404.08452v1, 2024."},{"key":"1612_CR13","doi-asserted-by":"publisher","first-page":"4300","DOI":"10.1145\/3746027.3755386","volume-title":"Proceedings of the 33rd ACM International Conference on Multimedia","author":"Y Lai","year":"2025","unstructured":"Y. Lai, H. Wang, J. Yang, X. Kang, B. Li, L. Shen, Z. Yu. GM-DF: Generalized multi-scenario deepfake detection. In Proceedings of the 33rd ACM International Conference on Multimedia, Dublin, Ireland, pp. 4300\u20134309, 2025. DOI: https:\/\/doi.org\/10.1145\/3746027.3755386."},{"key":"1612_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/3335203.3335724","volume-title":"Proceedings of ACM Workshop on Information Hiding and Multimedia Security","author":"X Yang","year":"2019","unstructured":"X. Yang, Y. Li, H. Qi, S. Lyu. Exposing GAN-synthesized faces using landmark locations. In Proceedings of ACM Workshop on Information Hiding and Multimedia Security, Paris, France, pp. 113\u2013118, 2019. DOI: https:\/\/doi.org\/10.1145\/3335203.3335724."},{"key":"1612_CR15","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2019.5.MWSF-532","volume-title":"Proceedings of IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics","author":"L Nataraj","year":"2019","unstructured":"L. Nataraj, T. M. Mohammed, B. S. Manjunath, S. Chandrasekaran, A. Flenner, J. H. Bappy, A. K. Roy-Chowdhury. Detecting GAN generated fake images using co-occurrence matrices. In Proceedings of IS&T International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics, Burlingame, USA, Article number 532, 2019. DOI: https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2019.5.MWSF-532."},{"key":"1612_CR16","doi-asserted-by":"publisher","unstructured":"H. Lin, W. Huang, W. Luo, W. Lu. DeepFake detection with multi-scale convolution and vision transformer. Digital Signal Processing, vol. 134, Article number 103895, 2023. DOI: https:\/\/doi.org\/10.1016\/j.dsp.2022.103895.","DOI":"10.1016\/j.dsp.2022.103895"},{"key":"1612_CR17","doi-asserted-by":"publisher","first-page":"6545","DOI":"10.1109\/TIFS.2024.3421273","volume":"19","author":"R Meng","year":"2024","unstructured":"R. Meng, C. Yi, Y. Yu, S. Yang, B. Shen, A. C. Kot. Semantic deep hiding for robust unlearnable examples. IEEE Transactions on Information Forensics and Security, vol. 19, pp. 6545\u20136558, 2024. DOI: https:\/\/doi.org\/10.1109\/TIFS.2024.3421273.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR18","doi-asserted-by":"publisher","first-page":"6003","DOI":"10.1109\/CVPR52688.2022.00592","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Yu","year":"2022","unstructured":"Y. Yu, W. Yang, Y. P. Tan, A. C. Kot. Towards robust rain removal against adversarial attacks: A comprehensive benchmark analysis and beyond. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, USA, pp. 6003\u20136012, 2022. DOI: https:\/\/doi.org\/10.1109\/CVPR52688.2022.00592."},{"key":"1612_CR19","doi-asserted-by":"publisher","first-page":"12250","DOI":"10.1109\/CVPR52729.2023.01179","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Yu","year":"2023","unstructured":"Y. Yu, Y. Wang, W. Yang, S. Lu, Y. P. Tan, A. C. Kot. Backdoor attacks against deep image compression via adaptive frequency trigger. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, Canada, pp. 12250\u201312259, 2023. DOI: https:\/\/doi.org\/10.1109\/CVPR52729.2023.01179."},{"key":"1612_CR20","volume-title":"Proceedings of the 41st International Conference on Machine Learning","author":"Y Yu","year":"2024","unstructured":"Y. Yu, Y. Wang, S. Xia, W. Yang, S. Lu, Y. P. Tan, A. C. Kot. Purify unlearnable examples via rate-constrained variational autoencoders. In Proceedings of the 41st International Conference on Machine Learning, Vienna, Austria, Article number 2379, 2024."},{"issue":"3","key":"1612_CR21","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1109\/TPAMI.2024.3507873","volume":"47","author":"Y Yu","year":"2025","unstructured":"Y. Yu, Y. Wang, W. Yang, L. Guo, S. Lu, L. Y. Duan, Y. P. Tan, A. C. Kot. Robust and transferable backdoor attacks against deep image compression with selective frequency prior. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 47, no. 3, pp. 1674\u20131693, 2025. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2024.3507873.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR22","doi-asserted-by":"publisher","first-page":"9698","DOI":"10.1609\/aaai.v39i9.33051","volume-title":"Proceedings of the 39th AAAI Conference on Artificial Intelligence","author":"Y Yu","year":"2025","unstructured":"Y. Yu, S. Xia, X. Lin, W. Yang, S. Lu, Y. P. Tan, A. Kot. Backdoor attacks against no-reference image quality assessment models via a scalable trigger. In Proceedings of the 39th AAAI Conference on Artificial Intelligence, Philadelphia, USA, pp. 9698\u20139706, 2025. DOI: https:\/\/doi.org\/10.1609\/aaai.v39i9.33051."},{"key":"1612_CR23","doi-asserted-by":"publisher","first-page":"3745","DOI":"10.1109\/TIFS.2025.3553043","volume":"20","author":"Y Yu","year":"2025","unstructured":"Y. Yu, S. Xia, X. Lin, C. Kong, W. Yang, S. Lu, Y. P. Tan, A. C. Kot. Toward model resistant to transferable adversarial examples via trigger activation. IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3745\u20133757, 2025. DOI: https:\/\/doi.org\/10.1109\/TIFS.2025.3553043.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR24","first-page":"73286","volume-title":"Proceedings of the 42nd International Conference on Machine Learning","author":"Y Yu","year":"2025","unstructured":"Y. Yu, S. Xia, S. Yang, C. Kong, W. Yang, S. Lu, Y. P. Tan, A. Kot. MTL-UE: Learning to learn nothing for multi-task learning. In Proceedings of the 42nd International Conference on Machine Learning, Vancouver, Canada, pp. 73286\u201373303, 2025."},{"key":"1612_CR25","volume-title":"Temporal unlearnable examples: Preventing personal video data from unauthorized exploitation by object tracking","author":"Q Wu","year":"2025","unstructured":"Q. Wu, Y. Yu, C. Kong, Z. Liu, J. Wan, H. Li, A. C. Kot, A. B. Chan. Temporal unlearnable examples: Preventing personal video data from unauthorized exploitation by object tracking, [Online], Available: https:\/\/arxiv.org\/abs\/2507.07483, 2025."},{"issue":"2","key":"1612_CR26","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","volume":"56","author":"E Luo","year":"2018","unstructured":"E. Luo, M. Z. A. Bhuiyan, G. Wang, M. A. Rahman, J. Wu, M. Atiquzzaman. PrivacyProtector: Privacy-protected patient data collection in IoT-based healthcare systems. IEEE Communications Magazine, vol. 56, no. 2, pp. 163\u2013168, 2018. DOI: https:\/\/doi.org\/10.1109\/MCOM.2018.1700364.","journal-title":"IEEE Communications Magazine"},{"issue":"6","key":"1612_CR27","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"G A Kaissis","year":"2020","unstructured":"G. A. Kaissis, M. R. Makowski, D. R\u00fcckert, R. F. Braren. Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence, vol. 2, no. 6, pp. 305\u2013311, 2020. DOI: https:\/\/doi.org\/10.1038\/s42256-020-0186-1.","journal-title":"Nature Machine Intelligence"},{"issue":"5","key":"1612_CR28","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TIFS.2017.2656458","volume":"12","author":"R Bagai","year":"2017","unstructured":"R. Bagai, N. Malik, M. Jadliwala. Measuring anonymity of pseudonymized data after probabilistic background attacks. IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1156\u20131169, 2017. DOI: https:\/\/doi.org\/10.1109\/TIFS.2017.2656458.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"1612_CR29","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","volume":"3","author":"G Kaissis","year":"2021","unstructured":"G. Kaissis, A. Ziller, J. Passerat-Palmbach, T. Ryffel, D. Usynin, A. Trask, I. Lima Jr, J. Mancuso, F. Jungmann, M. M. Steinborn, A. Saleh, M. Makowski, D. Rueckert, R. Braren. End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nature Machine Intelligence, vol. 3, no. 6, pp. 473\u2013484, 2021. DOI: https:\/\/doi.org\/10.1038\/s42256-021-00337-8.","journal-title":"Nature Machine Intelligence"},{"key":"1612_CR30","doi-asserted-by":"publisher","unstructured":"T. Avudaiappan, R. Balasubramanian, S. S. Pandiyan, M. Saravanan, S. K. Lakshmanaprabu, K. Shankar. Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, vol. 42, no. 11, Article number 208, 2018. DOI: https:\/\/doi.org\/10.1007\/s10916-018-1053-z.","DOI":"10.1007\/s10916-018-1053-z"},{"key":"1612_CR31","doi-asserted-by":"publisher","DOI":"10.5244\/C.35.195","volume-title":"Proceedings of the 32nd British Machine Vision Conference","author":"B N Kim","year":"2021","unstructured":"B. N. Kim, J. Dolz, C. Desrosiers, P. M. Jodoin. Privacy preserving for medical image analysis via non-linear deformation proxy. In Proceedings of the 32nd British Machine Vision Conference, Article number 375, 2021. DOI: https:\/\/doi.org\/10.5244\/C.35.195."},{"key":"1612_CR32","doi-asserted-by":"publisher","first-page":"9748","DOI":"10.1109\/ICPR48806.2021.9412636","volume-title":"Proceedings of the 25th International Conference on Pattern Recognition","author":"J Li","year":"2021","unstructured":"J. Li, L. Han, H. Zhang, X. Han, J. Ge, X. Cao. Learning disentangled representations for identity preserving surveillance face camouflage. In Proceedings of the 25th International Conference on Pattern Recognition, Milan, Italy, pp. 9748\u20139755, 2021. DOI: https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412636."},{"key":"1612_CR33","doi-asserted-by":"publisher","unstructured":"H. Guan, P. T. Yap, A. Bozoki, M. Liu. Federated learning for medical image analysis: A survey. Pattern Recognition, vol. 151, Article number 110424, 2024. DOI: https:\/\/doi.org\/10.1016\/j.patcog.2024.110424.","DOI":"10.1016\/j.patcog.2024.110424"},{"key":"1612_CR34","doi-asserted-by":"publisher","unstructured":"Y. Liu, Z. Jia, Z. Jiang, X. Lin, J. Liu, Q. Wu, W. Susilo. BFL-SA: Blockchain-based federated learning via enhanced secure aggregation. Journal of Systems Architecture, vol. 152, Article number 103163, 2024. DOI: https:\/\/doi.org\/10.1016\/j.sysarc.2024.103163.","DOI":"10.1016\/j.sysarc.2024.103163"},{"key":"1612_CR35","doi-asserted-by":"publisher","unstructured":"A. Gaudio, A. Smailagic, C. Faloutsos, S. Mohan, E. Johnson, Y. Liu, P. Costa, A. Campilho. DeepFixCX: Explainable privacy-preserving image compression for medical image analysis. WIREs Data Mining and Knowledge Discovery, vol. 13, no. 4, Article number e1495, 2023. DOI: https:\/\/doi.org\/10.1002\/widm.1495.","DOI":"10.1002\/widm.1495"},{"key":"1612_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43898-1_26","volume-title":"Proceedings of the 26th International Conference on Medical Image Computing and Computer Assisted Intervention","author":"K Packh\u00e4user","year":"2023","unstructured":"K. Packh\u00e4user, S. G\u00fcndel, F. Thamm, F. Denzinger, A. Maier. Deep learning-based anonymization of chest radiographs: A utility-preserving measure for patient privacy. In Proceedings of the 26th International Conference on Medical Image Computing and Computer Assisted Intervention, Vancouver, Canada, 2023. DOI: https:\/\/doi.org\/10.1007\/978-3-031-43898-1_26."},{"issue":"7","key":"1612_CR37","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1109\/TMI.2021.3065727","volume":"40","author":"B N Kim","year":"2021","unstructured":"B. N. Kim, J. Dolz, P. M. Jodoin, C. Desrosiers. Privacy-Net: An adversarial approach for identity-obfuscated segmentation of medical images. IEEE Transactions on Medical Imaging, vol. 40, no. 7, pp. 1737\u20131749, 2021. DOI: https:\/\/doi.org\/10.1109\/TMI.2021.3065727.","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"1612_CR38","doi-asserted-by":"publisher","unstructured":"I. Shiri, B. Razeghi, S. Ferdowsi, Y. Salimi, D. G\u00fcnd\u00fcz, D. Teodoro, S. Voloshynovskiy, H. Zaidi. PRIMIS: Privacy-preserving medical image sharing via deep sparsi-fying transform learning with obfuscation. Journal of Biomedical Informatics, vol. 150, Article number 104583, 2024. DOI: https:\/\/doi.org\/10.1016\/j.jbi.2024.104583.","DOI":"10.1016\/j.jbi.2024.104583"},{"issue":"12","key":"1612_CR39","doi-asserted-by":"publisher","first-page":"5946","DOI":"10.1109\/JBHI.2023.3317632","volume":"27","author":"Z Yang","year":"2023","unstructured":"Z. Yang, Y. Chen, H. Huangfu, M. Ran, H. Wang, X. Li, Y. Zhang. Dynamic corrected split federated learning with homomorphic encryption for U-shaped medical image networks. IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 12, pp. 5946\u20135957, 2023. DOI: https:\/\/doi.org\/10.1109\/JBHI.2023.3317632.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"2","key":"1612_CR40","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/TDSC.2023.3263974","volume":"21","author":"D Zhu","year":"2024","unstructured":"D. Zhu, H. Zhu, C. Huang, R. Lu, D. Feng, X. Shen. Efficient and accurate cloud-assisted medical pre-diagnosis with privacy preservation. IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 860\u2013875, 2024. DOI: https:\/\/doi.org\/10.1109\/TDSC.2023.3263974.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1612_CR41","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1145\/2976749.2978318","volume-title":"Proceedings of ACM SIGSAC Conference on Computer and Communications Security","author":"M Abadi","year":"2016","unstructured":"M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, L. Zhang. Deep learning with differential privacy. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 308\u2013318, 2016. DOI: https:\/\/doi.org\/10.1145\/2976749.2978318."},{"issue":"1","key":"1612_CR42","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2023","unstructured":"Z. Guan, J. Jing, X. Deng, M. Xu, L. Jiang, Z. Zhang, Y. Li. DeepMIH: Deep invertible network for multiple image hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 1, pp. 372\u2013390, 2023. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2022.3141725.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR43","doi-asserted-by":"publisher","first-page":"4713","DOI":"10.1109\/ICCV48922.2021.00469","volume-title":"Proceedings of IEEE\/CVF International Conference on Computer Vision","author":"J Jing","year":"2021","unstructured":"J. Jing, X. Deng, M. Xu, J. Wang, Z. Guan. HiNet: Deep image hiding by invertible network. In Proceedings of IEEE\/CVF International Conference on Computer Vision, Montreal, Canada, pp. 4713\u20134722, 2021. DOI: https:\/\/doi.org\/10.1109\/ICCV48922.2021.00469."},{"key":"1612_CR44","doi-asserted-by":"publisher","first-page":"27559","DOI":"10.1109\/CVPR52733.2024.02603","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"G Li","year":"2024","unstructured":"G. Li, S. Li, Z. Luo, Z. Qian, X. Zhang. Purified and unified steganographic network. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 27559\u201327568, 2024. DOI: https:\/\/doi.org\/10.1109\/CVPR52733.2024.02603."},{"key":"1612_CR45","doi-asserted-by":"publisher","first-page":"8110","DOI":"10.1145\/3664647.3680806","volume-title":"Proceedings of the 32nd ACM International Conference on Multimedia","author":"X Lin","year":"2024","unstructured":"X. Lin, Y. Yu, Z. Yu, R. Meng, J. Zhou, A. Liu, Y. Liu, S. Wang, W. Tang, Z. Lei, A. Kot. HideMIA: Hidden wavelet mining for privacy-enhancing medical image analysis. In Proceedings of the 32nd ACM International Conference on Multimedia, Melbourne, Australia, pp. 8110\u20138119, 2024. DOI: https:\/\/doi.org\/10.1145\/3664647.3680806."},{"key":"1612_CR46","doi-asserted-by":"publisher","first-page":"22311","DOI":"10.1109\/ICCV51070.2023.02044","volume-title":"Proceedings of IEEE\/CVF International Conference on Computer Vision","author":"X Deng","year":"2023","unstructured":"X. Deng, C. Gao, M. Xu. PIRNet: Privacy-preserving image restoration network via wavelet lifting. In Proceedings of IEEE\/CVF International Conference on Computer Vision, Paris, France, pp. 22311\u201322320, 2023. DOI: https:\/\/doi.org\/10.1109\/ICCV51070.2023.02044."},{"issue":"12","key":"1612_CR47","doi-asserted-by":"publisher","first-page":"10763","DOI":"10.1109\/TPAMI.2024.3449959","volume":"46","author":"L Chen","year":"2024","unstructured":"L. Chen, Y. Fu, L. Gu, C. Yan, T. Harada, G. Huang. Frequency-aware feature fusion for dense image prediction. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 46, no. 12, pp. 10763\u201310780, 2024. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2024.3449959.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR48","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1109\/CVPR52733.2024.00328","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"L Chen","year":"2024","unstructured":"L. Chen, L. Gu, D. Zheng, Y. Fu. Frequency-adaptive dilated convolution for semantic segmentation. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 3414\u20133425, 2024. DOI: https:\/\/doi.org\/10.1109\/CVPR52733.2024.00328."},{"key":"1612_CR49","first-page":"11863","volume-title":"Proceedings of the 38th International Conference on Machine Learning","author":"L Yang","year":"2021","unstructured":"L. Yang, R. Y. Zhang, L. Li, X. Xie. SimAM: A simple, parameter-free attention module for convolutional neural networks. In Proceedings of the 38th International Conference on Machine Learning, pp. 11863\u201311874, 2021."},{"issue":"8","key":"1612_CR50","doi-asserted-by":"publisher","first-page":"10555","DOI":"10.1109\/TPAMI.2023.3257546","volume":"45","author":"Z Li","year":"2023","unstructured":"Z. Li, P. Xu, X. Chang, L. Yang, Y. Zhang, L. Yao, X. Chen. When object detection meets knowledge distillation: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 8, pp. 10555\u201310579, 2023. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2023.3257546.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR51","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","volume-title":"Proceedings of the 12th International Conference on Information Security and Cryptology","author":"A R Sadeghi","year":"2009","unstructured":"A. R. Sadeghi, T. Schneider, I. Wehrenberg. Efficient privacy-preserving face recognition. In Proceedings of the 12th International Conference on Information Security and Cryptology, Seoul, Republic of Korea, pp. 229\u2013244, 2009. DOI: https:\/\/doi.org\/10.1007\/978-3-642-14423-3_16."},{"key":"1612_CR52","first-page":"4507","volume-title":"Proceedings of the 37th International Conference on Machine Learning","author":"Y Huang","year":"2020","unstructured":"Y. Huang, Z. Song, K. Li, S. Arora. InstaHide: Instance-hiding schemes for private distributed learning. In Proceedings of the 37th International Conference on Machine Learning, pp. 4507\u20134518, 2020."},{"issue":"3","key":"1612_CR53","doi-asserted-by":"publisher","first-page":"5778","DOI":"10.1109\/JIOT.2019.2905555","volume":"6","author":"Z Ma","year":"2019","unstructured":"Z. Ma, Y. Liu, X. Liu, J. Ma, K. Ren. Lightweight privacy-preserving ensemble classification for face recognition. IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5778\u20135790, 2019. DOI: https:\/\/doi.org\/10.1109\/JIOT.2019.2905555.","journal-title":"IEEE Internet of Things Journal"},{"key":"1612_CR54","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1609\/aaai.v36i3.20157","volume-title":"Proceedings of the 36th AAAI Conference on Artificial Intelligence","author":"Y Wang","year":"2022","unstructured":"Y. Wang, J. Liu, M. Luo, L. Yang, L. Wang. Privacy-preserving face recognition in the frequency domain. In Proceedings of the 36th AAAI Conference on Artificial Intelligence, pp. 2558\u20132566, 2022. DOI: https:\/\/doi.org\/10.1609\/aaai.v36i3.20157."},{"key":"1612_CR55","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.neucom.2019.07.039","volume":"363","author":"Y Li","year":"2019","unstructured":"Y. Li, Y. Wang, D. Li. Privacy-preserving lightweight face recognition. Neurocomputing, vol. 363, pp. 212\u2013222, 2019. DOI: https:\/\/doi.org\/10.1016\/j.neucom.2019.07.039.","journal-title":"Neurocomputing"},{"key":"1612_CR56","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/APCCAS.2014.7032863","volume-title":"Proceedings of IEEE Asia Pacific Conference on Circuits and Systems","author":"O O Ergun","year":"2014","unstructured":"O. O. Ergun. Privacy preserving face recognition in encrypted domain. In Proceedings of IEEE Asia Pacific Conference on Circuits and Systems, Ishigaki, Japan, pp. 643\u2013646, 2014. DOI: https:\/\/doi.org\/10.1109\/APCCAS.2014.7032863."},{"key":"1612_CR57","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/AVSS.2010.38","volume-title":"Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance","author":"T Winkler","year":"2010","unstructured":"T. Winkler, B. Rinner. TrustCAM: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, Boston, USA, pp. 593\u2013600, 2010. DOI: https:\/\/doi.org\/10.1109\/AVSS.2010.38."},{"key":"1612_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33720-9_44","volume-title":"Proceedings of the 14th International Symposium on Visual Computing on Advances in Visual Computing","author":"H Hukkel\u00e5s","year":"2019","unstructured":"H. Hukkel\u00e5s, R. Mester, F. Lindseth. DeepPrivacy: A generative adversarial network for face anonymization. In Proceedings of the 14th International Symposium on Visual Computing on Advances in Visual Computing, Lake Tahoe, USA, 2019. DOI: https:\/\/doi.org\/10.1007\/978-3-030-33720-9_44."},{"key":"1612_CR59","first-page":"65","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"J Zhao","year":"2017","unstructured":"J. Zhao, L. Xiong, K. Jayashree, J. Li, F. Zhao, Z. Wang, S. Pranata, S. Shen, S. Yan, J. Feng. Dual-agent GANs for photorealistic and identity preserving profile face synthesis. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 65\u201375, 2017."},{"key":"1612_CR60","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1145\/3503161.3548202","volume-title":"Proceedings of the 30th ACM International Conference on Multimedia","author":"L Yuan","year":"2022","unstructured":"L. Yuan, L. Liu, X. Pu, Z. Li, H. Li, X. Gao. PROFace: A generic framework for privacy-preserving recognizable obfuscation of face images. In Proceedings of the 30th ACM International Conference on Multimedia, Lisboa, Portugal, pp. 1661\u20131669, 2022. DOI: https:\/\/doi.org\/10.1145\/3503161.3548202."},{"key":"1612_CR61","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TIFS.2023.3274359","volume":"18","author":"Y Zhang","year":"2023","unstructured":"Y. Zhang, T. Wang, R. Zhao, W. Wen, Y. Zhu. RAPP: Reversible privacy preservation for various face attributes. IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3074\u20133087, 2023. DOI: https:\/\/doi.org\/10.1109\/TIFS.2023.3274359.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR62","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/LSP.2023.3289392","volume":"30","author":"T Wang","year":"2023","unstructured":"T. Wang, Y. Zhang, R. Zhao, W. Wen, R. Lan. Identifiable face privacy protection via virtual identity transformation. IEEE Signal Processing Letters, vol. 30, pp. 773\u2013777, 2023. DOI: https:\/\/doi.org\/10.1109\/LSP.2023.3289392.","journal-title":"IEEE Signal Processing Letters"},{"key":"1612_CR63","first-page":"2069","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"S Baluja","year":"2017","unstructured":"S. Baluja. Hiding images in plain sight: Deep steganography. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 2069\u20132079, 2017."},{"key":"1612_CR64","first-page":"1951","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"J Hayes","year":"2017","unstructured":"J. Hayes, G. Danezis. Generating steganographic images via adversarial training. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 1951\u20131960, 2017."},{"key":"1612_CR65","doi-asserted-by":"publisher","unstructured":"L. Liu, L. Meng, Y. Peng, X. Wang. A data hiding scheme based on U-Net and wavelet transform. Knowledge-Based Systems, vol. 223, Article number 107022, 2021. DOI: https:\/\/doi.org\/10.1016\/j.knosys.2021.107022.","DOI":"10.1016\/j.knosys.2021.107022"},{"issue":"12","key":"1612_CR66","doi-asserted-by":"publisher","first-page":"4292","DOI":"10.1016\/j.patcog.2012.05.014","volume":"45","author":"Z He","year":"2012","unstructured":"Z. He, W. Lu, W. Sun, J. Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, vol. 45, no. 12, pp. 4292\u20134299, 2012. DOI: https:\/\/doi.org\/10.1016\/j.patcog.2012.05.014.","journal-title":"Pattern Recognition"},{"key":"1612_CR67","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-030-58452-8_8","volume-title":"Proceedings of the 16th European Conference on Computer Vision","author":"M Xiao","year":"2020","unstructured":"M. Xiao, S. Zheng, C. Liu, Y. Wang, D. He, G. Ke, J. Bian, Z. Lin, T. Y. Liu. Invertible image rescaling. In Proceedings of the 16th European Conference on Computer Vision, Glasgow, UK, pp. 126\u2013144, 2020. DOI: https:\/\/doi.org\/10.1007\/978-3-030-58452-8_8."},{"key":"1612_CR68","doi-asserted-by":"publisher","first-page":"6283","DOI":"10.1109\/CVPR46437.2021.00622","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Xing","year":"2021","unstructured":"Y. Xing, Z. Qian, Q. Chen. Invertible image signal processing. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, pp. 6283\u20136292, 2021. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.00622."},{"key":"1612_CR69","doi-asserted-by":"publisher","first-page":"10811","DOI":"10.1109\/CVPR46437.2021.01067","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"S P Lu","year":"2021","unstructured":"S. P. Lu, R. Wang, T. Zhong, P. L. Rosin. Large-capacity image steganography based on invertible neural networks. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, pp. 10811\u201310820, 2021. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.01067."},{"key":"1612_CR70","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/SIPROCESS.2017.8124497","volume-title":"Proceedings of the 2nd International Conference on Signal and Image Processing","author":"Y Zhang","year":"2017","unstructured":"Y. Zhang, L. Zheng, V. L. L. Thing. Automated face swapping and its detection. In Proceedings of the 2nd International Conference on Signal and Image Processing, Singapore, pp. 15\u201319, 2017. DOI: https:\/\/doi.org\/10.1109\/SIPROCESS.2017.8124497."},{"key":"1612_CR71","first-page":"133","volume-title":"Proceedings of the 20th Irish Machine Vision and Image Processing Conference","author":"M Koopman","year":"2018","unstructured":"M. Koopman, A. M. Rodriguez, Z. Geradts. Detection of deepfake video manipulation. In Proceedings of the 20th Irish Machine Vision and Image Processing Conference, Belfast, Northern Ireland, pp. 133\u2013136, 2018."},{"key":"1612_CR72","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761","volume-title":"Proceedings of IEEE International Workshop on Information Forensics and Security","author":"D Afchar","year":"2018","unstructured":"D. Afchar, V. Nozick, J. Yamagishi, I. Echizen. MesoN-et: A compact facial video forgery detection network. In Proceedings of IEEE International Workshop on Information Forensics and Security, Hong Kong, China, 2018. DOI: https:\/\/doi.org\/10.1109\/WIFS.2018.8630761."},{"key":"1612_CR73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009","volume-title":"Proceedings of IEEE\/CVF International Conference on Computer Vision","author":"A R\u00f6ssler","year":"2019","unstructured":"A. R\u00f6ssler, D. Cozzolino, L. Verdoliva, C. Riess, J. Thies, M. Nie\u00dfner. FaceForensics++: Learning to detect manipulated facial images. In Proceedings of IEEE\/CVF International Conference on Computer Vision, Seoul, Republic of Korea, 2019. DOI: https:\/\/doi.org\/10.1109\/ICCV.2019.00009."},{"key":"1612_CR74","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974","volume-title":"Proceedings of the 10th International Conference on Biometrics Theory, Applications and Systems","author":"H H Nguyen","year":"2019","unstructured":"H. H. Nguyen, F. Fang, J. Yamagishi, I. Echizen. Multi-task learning for detecting and segmenting manipulated facial images and videos. In Proceedings of the 10th International Conference on Biometrics Theory, Applications and Systems, Tampa, USA, 2019. DOI: https:\/\/doi.org\/10.1109\/BTAS46853.2019.9185974."},{"key":"1612_CR75","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1109\/ICASSP.2019.8682602","volume-title":"Proceedings of ICASSP IEEE International Conference on Acoustics, Speech and Signal Processing","author":"H H Nguyen","year":"2019","unstructured":"H. H. Nguyen, J. Yamagishi, I. Echizen. Capsule-forensics: Using capsule networks to detect forged images and videos. In Proceedings of ICASSP IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, pp. 2307\u20132311, 2019. DOI: https:\/\/doi.org\/10.1109\/ICASSP.2019.8682602."},{"key":"1612_CR76","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-58610-2_6","volume-title":"Proceedings of the 16th European Conference on Computer Vision","author":"Y Qian","year":"2020","unstructured":"Y. Qian, G. Yin, L. Sheng, Z. Chen, J. Shao. Thinking in frequency: Face forgery detection by mining frequency-aware clues. In Proceedings of the 16th European Conference on Computer Vision, Glasgow, UK, pp. 86\u2013103, 2020. DOI: https:\/\/doi.org\/10.1007\/978-3-030-58610-2_6."},{"key":"1612_CR77","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/CVPR46437.2021.00083","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"H Liu","year":"2021","unstructured":"H. Liu, X. Li, W. Zhou, Y. Chen, Y. He, H. Xue, W. Zhang, N. Yu. Spatial-phase shallow learning: Rethinking face forgery detection in frequency domain. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, pp. 772\u2013781, 2021. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.00083."},{"key":"1612_CR78","doi-asserted-by":"publisher","first-page":"7887","DOI":"10.1109\/CVPR42600.2020.00791","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"R Durall","year":"2020","unstructured":"R. Durall, M. Keuper, J. Keuper. Watch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 7887\u20137896, 2020. DOI: https:\/\/doi.org\/10.1109\/CVPR42600.2020.00791."},{"key":"1612_CR79","doi-asserted-by":"publisher","first-page":"22355","DOI":"10.1109\/ICCV51070.2023.02048","volume-title":"Proceedings of IEEE\/CVF International Conference on Computer Vision","author":"Z Yan","year":"2023","unstructured":"Z. Yan, Y. Zhang, Y. Fan, B. Wu. UCF: Uncovering common features for generalizable deepfake detection. In Proceedings of IEEE\/CVF International Conference on Computer Vision, Paris, France, pp. 22355\u201322366, 2023. doi: https:\/\/doi.org\/10.1109\/ICCV51070.2023.02048."},{"key":"1612_CR80","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1109\/CVPR52688.2022.00408","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"J Cao","year":"2022","unstructured":"J. Cao, C. Ma, T. Yao, S. Chen, S. Ding, X. Yang. End-to-end reconstruction-classification learning for face forgery detection. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, USA, pp. 4103\u20134112, 2022. DOI: https:\/\/doi.org\/10.1109\/CVPR52688.2022.00408."},{"key":"1612_CR81","doi-asserted-by":"publisher","first-page":"14918","DOI":"10.1109\/CVPR46437.2021.01468","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"C Wang","year":"2021","unstructured":"C. Wang, W. Deng. Representative forgery mining for fake face detection. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, pp. 14918\u201314927, 2021. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.01468."},{"key":"1612_CR82","first-page":"46","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","author":"Y Li","year":"2019","unstructured":"Y. Li, S. Lyu. Exposing deepfake videos by detecting face warping artifacts. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, USA, pp. 46\u201352, 2019."},{"key":"1612_CR83","doi-asserted-by":"publisher","first-page":"16312","DOI":"10.1109\/CVPR46437.2021.01605","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Luo","year":"2021","unstructured":"Y. Luo, Y. Zhang, J. Yan, W. Liu. Generalizing face forgery detection with high-frequency features. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, USA, pp. 16312\u201316321, 2021. DOI: https:\/\/doi.org\/10.1109\/CVPR46437.2021.01605."},{"issue":"4","key":"1612_CR84","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"D. Wen, H. Han, A. K. Jain. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 746\u2013761, 2015. DOI: https:\/\/doi.org\/10.1109\/TIFS.2015.2400395.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR85","doi-asserted-by":"publisher","unstructured":"B. Chen, X. Liu, Z. Xia, G. Zhao. Privacy-preserving DeepFake face image detection. Digital Signal Processing, vol. 143, Article number 104233, 2023. DOI: https:\/\/doi.org\/10.1016\/j.dsp.2023.104233.","DOI":"10.1016\/j.dsp.2023.104233"},{"key":"1612_CR86","doi-asserted-by":"publisher","first-page":"8001","DOI":"10.1109\/CVPR52729.2023.00773","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"S Barattin","year":"2023","unstructured":"S. Barattin, C. Tzelepis, I. Patras, N. Sebe. Attribute-preserving face dataset anonymization via latent code optimization. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, Canada, pp. 8001\u20138010, 2023. doi: https:\/\/doi.org\/10.1109\/CVPR52729.2023.00773."},{"issue":"7","key":"1612_CR87","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2020","unstructured":"S. Baluja. Hiding images within images. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 7, pp. 1685\u20131697, 2020. DOI: https:\/\/doi.org\/10.1109\/TPAMI.2019.2901877.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1612_CR88","doi-asserted-by":"publisher","first-page":"15294","DOI":"10.1109\/CVPR52688.2022.01488","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"C Luo","year":"2022","unstructured":"C. Luo, Q. Lin, W. Xie, B. Wu, J. Xie, L. Shen. Frequency-driven imperceptible adversarial attack on semantic similarity. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, USA, pp. 15294\u201315303, 2022. DOI: https:\/\/doi.org\/10.1109\/CVPR52688.2022.01488."},{"key":"1612_CR89","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-031-19812-0_14","volume-title":"Proceedings of the 17th European Conference on Computer Vision","author":"H Lu","year":"2022","unstructured":"H. Lu, W. Liu, H. Fu, Z. Cao. FADE: Fusing the assets of decoder and encoder for task-agnostic up-sampling. In Proceedings of the 17th European Conference on Computer Vision, Tel Aviv, Israel, pp. 231\u2013247, 2022. DOI: https:\/\/doi.org\/10.1007\/978-3-031-19812-0_14."},{"issue":"1","key":"1612_CR90","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11263-022-01672-y","volume":"131","author":"X Zou","year":"2023","unstructured":"X. Zou, F. Xiao, Z. Yu, Y. Li, Y. J. Lee. Delving deeper into anti-aliasing in ConvNets. International Journal of Computer Vision, vol. 131, no. 1, pp. 67\u201381, 2023. DOI: https:\/\/doi.org\/10.1007\/s11263-022-01672-y.","journal-title":"International Journal of Computer Vision"},{"key":"1612_CR91","doi-asserted-by":"publisher","DOI":"10.1201\/9781420037807","volume-title":"Comprehensive Dictionary of Electrical Engineering","author":"P A Laplante","year":"2018","unstructured":"P. A. Laplante. Comprehensive Dictionary of Electrical Engineering, Boca Raton, USA: CRC Press, 2018. DOI: https:\/\/doi.org\/10.1201\/9781420037807."},{"key":"1612_CR92","first-page":"6000","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"A Vaswani","year":"2017","unstructured":"A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, I. Polosukhin. Attention is all you need. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, USA, pp. 6000\u20136010, 2017."},{"issue":"6","key":"1612_CR93","doi-asserted-by":"publisher","first-page":"8219","DOI":"10.1109\/TITS.2025.3558782","volume":"26","author":"X Guo","year":"2025","unstructured":"X. Guo, W. Tang, H. Wang, J. Wang, S. Wang, X. Qu, X. Lin. MorFormer: Morphology-aware transformer for generalized pavement crack segmentation. IEEE Transactions on Intelligent Transportation Systems, vol. 26, no. 6, pp. 8219\u20138232, 2025. DOI: https:\/\/doi.org\/10.1109\/TITS.2025.3558782.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"1612_CR94","volume-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems","author":"B Zhang","year":"2019","unstructured":"B. Zhang, R. Sennrich. Root mean square layer normalization. In Proceedings of the 33rd International Conference on Neural Information Processing Systems, Vancouver, Canada, Article number 1110, 2019."},{"key":"1612_CR95","volume-title":"Llama: Open and efficient foundation language models","author":"H Touvron","year":"2023","unstructured":"H. Touvron, T. Lavril, G. Izacard, X. Martinet, M. A. Lachaux, T. Lacroix, B. Rozi\u00e9re, N. Goyal, E. Hambro, F. Azhar, A. Rodriguez, A. Joulin, E. Grave, G. Lample. Llama: Open and efficient foundation language models, [Online], Available: https:\/\/arxiv.org\/abs\/2302.13971v1, 2023."},{"key":"1612_CR96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_1","volume-title":"Proceedings of the 15th European Conference on Computer Vision","author":"Y Wu","year":"2018","unstructured":"Y. Wu, K. He. Group normalization. In Proceedings of the 15th European Conference on Computer Vision, Munich, Germany, 2018. DOI: https:\/\/doi.org\/10.1007\/978-3-030-01261-8_1."},{"key":"1612_CR97","first-page":"36077","volume-title":"Proceedings of the 40th International Conference on Machine Learning","author":"H Wang","year":"2023","unstructured":"H. Wang, S. Ma, S. Huang, L. Dong, W. Wang, Z. Peng, Y. Wu, P. Bajaj, S. Singhal, A. Benhaim, B. Patra, Z. Liu, V. Chaudhary, X. Song, F. Wei. Magneto: A foundation transformer. In Proceedings of the 40th International Conference on Machine Learning, Honolulu, USA, pp. 36077\u201336092, 2023."},{"key":"1612_CR98","doi-asserted-by":"publisher","first-page":"7025","DOI":"10.18653\/v1\/2022.emnlp-main.473","volume-title":"Proceedings of Conference on Empirical Methods in Natural Language Processing","author":"Z Qin","year":"2023","unstructured":"Z. Qin, X. Han, W. Sun, D. Li, L. Kong, N. Barnes, Y. Zhong. The devil in linear transformer. In Proceedings of Conference on Empirical Methods in Natural Language Processing, Abu Dhabi, UAE, pp. 7025\u20137041, 2023. DOI: https:\/\/doi.org\/10.18653\/v1\/2022.emnlp-main.473."},{"key":"1612_CR99","first-page":"723","volume":"13","author":"A Gretton","year":"2012","unstructured":"A. Gretton, K. M. Borgwardt, M. J. Rasch, b. Sch\u00f6lkopf, A. Smola. A kernel two-sample test. The Journal of Machine Learning Research, vol. 13, pp. 723\u2013773, 2012.","journal-title":"The Journal of Machine Learning Research"},{"key":"1612_CR100","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-319-49409-8_35","volume-title":"Computer Vision-ECCV 2016 Workshops","author":"B Sun","year":"2016","unstructured":"B. Sun, K. Saenko. Deep CORAL: Correlation alignment for deep domain adaptation. Computer Vision-ECCV 2016 Workshops, G. Hua, H. J\u00e9gou, Eds., Cham, Germany: Springer, pp. 443\u2013450, 2016. DOI: https:\/\/doi.org\/10.1007\/978-3-319-49409-8_35."},{"key":"1612_CR101","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.1609\/aaai.v34i04.5745","volume-title":"Proceedings of the 34th AAAI Conference on Artificial Intelligence","author":"C Chen","year":"2020","unstructured":"C. Chen, Z. Fu, Z. Chen, S. Jin, Z. Cheng, X. Jin, X. S. Hua. HoMM: Higher-order moment matching for unsupervised domain adaptation. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, USA, pp. 3422\u20133429, 2020. DOI: https:\/\/doi.org\/10.1609\/aaai.v34i04.5745."},{"key":"1612_CR102","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1109\/ISIT.2008.4595271","volume-title":"Proceedings of IEEE International Symposium on Information Theory","author":"F Perez-Cruz","year":"2008","unstructured":"F. Perez-Cruz. Kullback-Leibler divergence estimation of continuous distributions. In Proceedings of IEEE International Symposium on Information Theory, Toronto, Canada, pp. 1666\u20131670, 2008. DOI: https:\/\/doi.org\/10.1109\/ISIT.2008.4595271."},{"key":"1612_CR103","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.23919\/EUSIPCO54536.2021.9616270","volume-title":"Proceedings of the 29th European Signal Processing Conference","author":"S T Jose","year":"2021","unstructured":"S. T. Jose, O. Simeone. Information-theoretic bounds on transfer generalization gap based on Jensen-Shannon divergence. In Proceedings of the 29th European Signal Processing Conference, Dublin, Ireland, pp. 1461\u20131465, 2021. DOI: https:\/\/doi.org\/10.23919\/EUSIPCO54536.2021.9616270."},{"issue":"1","key":"1612_CR104","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BF00532240","volume":"70","author":"L R\u00fcschendorf","year":"1985","unstructured":"L. R\u00fcschendorf. The Wasserstein distance and approximation theorems. Probability Theory and Related Fields, vol. 70, no. 1, pp. 117\u2013129, 1985. DOI: https:\/\/doi.org\/10.1007\/BF00532240.","journal-title":"Probability Theory and Related Fields"},{"key":"1612_CR105","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2023.3328455","volume":"19","author":"Y Xue","year":"2024","unstructured":"Y. Xue, J. Wu, R. Ji, P. Zhong, J. Wen, W. Peng. Adaptive domain-invariant feature extraction for cross-domain linguistic steganalysis. IEEE Transactions on Information Forensics and Security, vol. 19, pp. 920\u2013933, 2024. DOI: https:\/\/doi.org\/10.1109\/TIFS.2023.3328455.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1612_CR106","volume-title":"Proceedings of the 13th International Conference on Learning Representations","author":"T Ye","year":"2025","unstructured":"T. Ye, L. Dong, Y. Xia, Y. Sun, Y. Zhu, G. Huang, F. Wei. Differential transformer. In Proceedings of the 13th International Conference on Learning Representations, Singapore, 2025."},{"key":"1612_CR107","doi-asserted-by":"publisher","first-page":"3204","DOI":"10.1109\/CVPR42600.2020.00327","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Li","year":"2020","unstructured":"Y. Li, X. Yang, P. Sun, H. Qi, S. Lyu. Celeb-DF: A large-scale challenging dataset for DeepFake forensics. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 3204\u20133213, 2020. doi: https:\/\/doi.org\/10.1109\/CVPR42600.2020.00327."},{"key":"1612_CR108","doi-asserted-by":"publisher","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","volume":"10","author":"M S Rana","year":"2022","unstructured":"M. S. Rana, M. N. Nobi, B. Murali, A. H. Sung. Deepfake detection: A systematic literature review. IEEE Access, vol. 10, pp. 25494\u201325513, 2022. DOI: https:\/\/doi.org\/10.1109\/ACCESS.2022.3154404.","journal-title":"IEEE Access"},{"key":"1612_CR109","volume-title":"The deepfake detection challenge (DFDC) preview dataset","author":"B Dolhansky","year":"2019","unstructured":"B. Dolhansky, R. Howes, B. Pflaum, N. Baram, C. C. Ferrer. The deepfake detection challenge (DFDC) preview dataset, [Online], Available: https:\/\/arxiv.org\/abs\/1910.08854, 2019."},{"key":"1612_CR110","volume-title":"The DeepFake detection challenge (DFDC) dataset","author":"B Dolhansky","year":"2020","unstructured":"B. Dolhansky, J. Bitton, B. Pflaum, J. Lu, R. Howes, M. Wang, C. C. Ferrer. The DeepFake detection challenge (DFDC) dataset, [Online], Available: https:\/\/arxiv.org\/abs\/2006.07397, 2020."},{"key":"1612_CR111","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787","volume-title":"Proceedings of IEEE International Workshop on Information Forensics and Security","author":"Y Li","year":"2018","unstructured":"Y. Li, M. C. Chang, S. Lyu. In Ictu Oculi: Exposing AI created fake videos by detecting eye blinking. In Proceedings of IEEE International Workshop on Information Forensics and Security, Hong Kong, China, 2018. DOI: https:\/\/doi.org\/10.1109\/WIFS.2018.8630787."},{"key":"1612_CR112","doi-asserted-by":"publisher","first-page":"5073","DOI":"10.1109\/CVPR42600.2020.00512","volume-title":"Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"L Li","year":"2020","unstructured":"L. Li, J. Bao, H. Yang, D. Chen, F. Wen. Advancing high fidelity identity swapping for forgery detection. In Proceedings of IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, USA, pp. 5073\u20135082, 2020. DOI: https:\/\/doi.org\/10.1109\/CVPR42600.2020.00512."},{"key":"1612_CR113","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/3323873.3325011","volume-title":"Proceedings of International Conference on Multimedia Retrieval","author":"X Weng","year":"2019","unstructured":"X. Weng, Y. Li, L. Chi, Y. Mu. High-capacity convolutional video steganography with temporal residual modeling. In Proceedings of International Conference on Multimedia Retrieval, Ottawa, Canada, pp. 87\u201395, 2019. DOI: https:\/\/doi.org\/10.1145\/3323873.3325011."},{"key":"1612_CR114","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-030-01267-040","volume-title":"Proceedings of the 15th European Conference on Computer Vision","author":"J Zhu","year":"2018","unstructured":"J. Zhu, R. Kaplan, J. Johnson, Li F. F. HiDDeN: Hiding data with deep networks. In Proceedings of the 15th European Conference on Computer Vision, Munich, Germany, pp. 682\u2013697, 2018. DOI: https:\/\/doi.org\/10.1007\/978-3-030-01267-040."},{"key":"1612_CR115","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.imavis.2016.01.002","volume":"47","author":"C Sagonas","year":"2016","unstructured":"C. Sagonas, E. Antonakos, G. Tzimiropoulos, S. Zafeiriou, M. Pantic. 300 Faces in-the-wild challenge: Database and results. Image and Vision Computing, vol. 47, pp. 3\u201318, 2016. DOI: https:\/\/doi.org\/10.1016\/j.imavis.2016.01.002.","journal-title":"Image and Vision Computing"},{"issue":"2","key":"1612_CR116","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"R R Selvaraju","year":"2020","unstructured":"R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, D. Batra. Grad-CAM: Visual explanations from deep networks via gradient-based localization. International Journal of Computer Vision, vol. 128, no. 2, pp. 336\u2013359, 2020. DOI: https:\/\/doi.org\/10.1007\/s11263-019-01228-7.","journal-title":"International Journal of Computer Vision"}],"container-title":["Machine Intelligence Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-025-1612-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-025-1612-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-025-1612-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T12:05:24Z","timestamp":1775649924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-025-1612-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":116,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1612"],"URL":"https:\/\/doi.org\/10.1007\/s11633-025-1612-y","relation":{},"ISSN":["2731-538X","2731-5398"],"issn-type":[{"value":"2731-538X","type":"print"},{"value":"2731-5398","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"29 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declared that they have no conflicts of interest to this work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations of conflict of interest"}}]}}