{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:41:04Z","timestamp":1771702864485,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11760-023-02633-9","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T15:02:02Z","timestamp":1686841322000},"page":"4029-4037","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection"],"prefix":"10.1007","volume":"17","author":[{"given":"Umar","family":"Masud","sequence":"first","affiliation":[]},{"given":"Mohd.","family":"Sadiq","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2675-3484","authenticated-orcid":false,"given":"Sarfaraz","family":"Masood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4915-9325","authenticated-orcid":false,"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,15]]},"reference":[{"key":"2633_CR1","doi-asserted-by":"publisher","unstructured":"Juefei-Xu, F., Wang, R., Huang, Y., Guo, Q., Ma, L., Liu, Y.: Countering malicious deepfakes: survey, battleground, and horizon (2021). https:\/\/doi.org\/10.48550\/ARXIV.2103.00218. arxiv:https:\/\/arxiv.org\/abs\/2103.00218","DOI":"10.48550\/ARXIV.2103.00218"},{"key":"2633_CR2","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Zheng, L., Thing, V.L.L.: Automated face swapping and its detection. In: 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), pp. 15\u201319 (2017). https:\/\/doi.org\/10.1109\/SIPROCESS.2017.8124497","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"key":"2633_CR3","doi-asserted-by":"publisher","unstructured":"Zhou, P., Han, X., Morariu, V.I., Davis, L.S.: Two-stream neural networks for tampered face detection (2018). https:\/\/doi.org\/10.48550\/ARXIV.1803.11276 . arXiv:1803.11276","DOI":"10.48550\/ARXIV.1803.11276"},{"key":"2633_CR4","doi-asserted-by":"publisher","unstructured":"Marra, F., Gragnaniello, D., Cozzolino, D., Verdoliva, L.: Detection of GAN-generated fake images over social networks. In: IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), vol. 2018, pp. 384\u2013389 (2018). https:\/\/doi.org\/10.1109\/MIPR.2018.00084","DOI":"10.1109\/MIPR.2018.00084"},{"key":"2633_CR5","doi-asserted-by":"publisher","unstructured":"Li, Y., Chang, M.-C., Lyu, S.: In Ictu Oculi: exposing ai created fake videos by detecting eye blinking. In: IEEE International Workshop on Information Forensics and Security (WIFS), vol. 2018, pp. 1\u20137 (2018). https:\/\/doi.org\/10.1109\/WIFS.2018.8630787","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"2633_CR6","doi-asserted-by":"publisher","unstructured":"Mo, H., Chen, B., Luo, W.: Fake faces identification via convolutional neural network. In: IH &MMSec \u201918, Association for Computing Machinery, New York, NY, USA, pp. 43\u201347 (2018). https:\/\/doi.org\/10.1145\/3206004.3206009","DOI":"10.1145\/3206004.3206009"},{"key":"2633_CR7","unstructured":"Koopman, M., Macarulla\u00a0Rodriguez, A., Geradts, Z.: Detection of deepfake video manipulation (2018)"},{"key":"2633_CR8","doi-asserted-by":"publisher","unstructured":"G\u00fcera, D., Delp, E.J.: Deepfake video detection using recurrent neural networks. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/AVSS.2018.8639163","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"2633_CR9","doi-asserted-by":"publisher","unstructured":"Matern, F., Riess, C., Stamminger, M.: Exploiting visual artifacts to expose deepfakes and face manipulations. In: IEEE Winter Applications of Computer Vision Workshops (WACVW), vol. 2019, pp. 83\u201392 (2019). https:\/\/doi.org\/10.1109\/WACVW.2019.00020","DOI":"10.1109\/WACVW.2019.00020"},{"key":"2633_CR10","doi-asserted-by":"publisher","unstructured":"Xuan, X., Peng, B., Wang, W., Dong, J.: On the generalization of GAN image forensics (2019). https:\/\/doi.org\/10.48550\/ARXIV.1902.11153. arXiv:1902.11153","DOI":"10.48550\/ARXIV.1902.11153"},{"key":"2633_CR11","doi-asserted-by":"publisher","unstructured":"Tarasiou, M., Zafeiriou, S.: Extracting deep local features to detect manipulated images of human faces (2019). https:\/\/doi.org\/10.48550\/ARXIV.1911.13269. arXiv:1911.13269","DOI":"10.48550\/ARXIV.1911.13269"},{"key":"2633_CR12","doi-asserted-by":"publisher","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: A large-scale challenging dataset for deepfake forensics (2019). https:\/\/doi.org\/10.48550\/ARXIV.1909.12962. arXiv:1909.12962","DOI":"10.48550\/ARXIV.1909.12962"},{"key":"2633_CR13","doi-asserted-by":"publisher","unstructured":"Kumar, P., Vatsa, M., Singh, R.: Detecting face2face facial reenactment in videos (2020). https:\/\/doi.org\/10.48550\/ARXIV.2001.07444. arXiv:2001.07444","DOI":"10.48550\/ARXIV.2001.07444"},{"key":"2633_CR14","doi-asserted-by":"publisher","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., Guo, B.: Face x-ray for more general face forgery detection (2019). https:\/\/doi.org\/10.48550\/ARXIV.1912.13458. arXiv:1912.13458","DOI":"10.48550\/ARXIV.1912.13458"},{"key":"2633_CR15","doi-asserted-by":"publisher","unstructured":"Sun, K., Xiao, B., Liu, D., Wang, J.: Deep high-resolution representation learning for human pose estimation (2019). https:\/\/doi.org\/10.48550\/ARXIV.1902.09212. arXiv:1902.09212","DOI":"10.48550\/ARXIV.1902.09212"},{"key":"2633_CR16","doi-asserted-by":"publisher","unstructured":"Sun, K., Zhao, Y., Jiang, B., Cheng, T., Xiao, B., Liu, D., Mu, Y., Wang, X., Liu, W., Wang, J.: High-resolution representations for labeling pixels and regions (2019). https:\/\/doi.org\/10.48550\/ARXIV.1904.04514. arXiv:1904.04514","DOI":"10.48550\/ARXIV.1904.04514"},{"key":"2633_CR17","doi-asserted-by":"publisher","unstructured":"Lima, O.\u00a0de., Franklin, S., Basu, S., Karwoski, B., George, A.: Deepfake detection using spatiotemporal convolutional networks (2020). https:\/\/doi.org\/10.48550\/ARXIV.2006.14749. arXiv:2006.14749","DOI":"10.48550\/ARXIV.2006.14749"},{"key":"2633_CR18","doi-asserted-by":"publisher","unstructured":"Hernandez-Ortega, J., Tolosana, R., Fierrez, J., Morales, A.: Deepfakeson-phys: Deepfakes detection based on heart rate estimation (2020). https:\/\/doi.org\/10.48550\/ARXIV.2010.00400. arXiv:2010.00400","DOI":"10.48550\/ARXIV.2010.00400"},{"key":"2633_CR19","doi-asserted-by":"publisher","unstructured":"Schwarcz, S., Chellappa, R.: Finding facial forgery artifacts with parts-based detectors (2021). https:\/\/doi.org\/10.48550\/ARXIV.2109.10688. arXiv:2109.10688","DOI":"10.48550\/ARXIV.2109.10688"},{"issue":"2","key":"2633_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MITP.2022.3168351","volume":"24","author":"S Saif","year":"2022","unstructured":"Saif, S., Tehseen, S., Ali, S.S., Kausar, S., Jameel, A.: Generalized deepfake video detection through time-distribution and metric learning. IT Prof. 24(2), 38\u201344 (2022). https:\/\/doi.org\/10.1109\/MITP.2022.3168351","journal-title":"IT Prof."},{"key":"2633_CR21","doi-asserted-by":"crossref","unstructured":"Saikia, P., Dholaria, D., Yadav, P., Patel, V., Roy, M.: A hybrid CNN-LSTM model for video deepfake detection by leveraging optical flow features (2022)","DOI":"10.1109\/IJCNN55064.2022.9892905"},{"key":"2633_CR22","doi-asserted-by":"publisher","unstructured":"Ke, J., Wang, L.: Df-udetector: an effective method towards robust deepfake detection via feature restoration. Neural Netw. 160, 216\u2013226 (2023). https:\/\/doi.org\/10.1016\/j.neunet.2023.01.001","DOI":"10.1016\/j.neunet.2023.01.001"},{"key":"2633_CR23","doi-asserted-by":"publisher","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., Ferrer, C.C.: The deepfake detection challenge (DFDC) dataset (2020). https:\/\/doi.org\/10.48550\/ARXIV.2006.07397. arXiv:2006.07397","DOI":"10.48550\/ARXIV.2006.07397"},{"key":"2633_CR24","doi-asserted-by":"publisher","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). https:\/\/doi.org\/10.48550\/ARXIV.1409.1556. arXiv:1409.1556","DOI":"10.48550\/ARXIV.1409.1556"},{"key":"2633_CR25","doi-asserted-by":"publisher","unstructured":"Vamsi, V.V.V.N.S., Shet, S.S., Reddy, S.S.M., Rose, S.S., Shetty, S.R., Sathvika, S., Shankar, S.M.S., S.P.: Deepfake detection in digital media forensics. Glob. Transit. Proc. 3(1), 74\u201379 (2022). International Conference on Intelligent Engineering Approach (ICIEA-2022). https:\/\/doi.org\/10.1016\/j.gltp.2022.04.017","DOI":"10.1016\/j.gltp.2022.04.017"},{"key":"2633_CR26","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: Imagenet: A large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition, vol. 2009, pp. 248\u2013255 (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02633-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02633-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02633-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T18:10:54Z","timestamp":1694542254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02633-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,15]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["2633"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02633-9","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,15]]},"assertion":[{"value":"24 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no known financial or conflicts of interest associated with this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethical approval is not applicable for this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}