{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:56Z","timestamp":1772119976115,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102320"],"award-info":[{"award-number":["62102320"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["D5000210737"],"award-info":[{"award-number":["D5000210737"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Research and Development Program of Shaanxi Province","award":["2023-ZDLGY-53"],"award-info":[{"award-number":["2023-ZDLGY-53"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11760-023-02644-6","type":"journal-article","created":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T22:01:23Z","timestamp":1687125683000},"page":"4123-4131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An attention-erasing stripe pyramid network for face forgery detection"],"prefix":"10.1007","volume":"17","author":[{"given":"Zhenwu","family":"Hu","sequence":"first","affiliation":[]},{"given":"Qianyue","family":"Duan","sequence":"additional","affiliation":[]},{"given":"PeiYu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huanjie","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"issue":"2","key":"2644_CR1","first-page":"1081","volume":"35","author":"S Chen","year":"2021","unstructured":"Chen, S., Yao, T., Chen, Y., et al.: Local relation learning for face forgery detection. Proc. AAAI Conf. Artif. Intell. 35(2), 1081\u20131088 (2021)","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"2644_CR2","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., et al.: Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 16317\u201316326 (2021)","DOI":"10.1109\/CVPR46437.2021.01605"},{"issue":"7","key":"2644_CR3","doi-asserted-by":"publisher","first-page":"4854","DOI":"10.1109\/TCSVT.2021.3133859","volume":"32","author":"J Yang","year":"2021","unstructured":"Yang, J., Xiao, S., Li, A., et al.: MSTA-net: forgery detection by generating manipulation trace based on multi-scale self-texture attention. IEEE Trans. Circ. Syst. Video Technol. 32(7), 4854\u20134866 (2021)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"2644_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107950","volume":"116","author":"Z Shang","year":"2021","unstructured":"Shang, Z., Xie, H., Zha, Z., et al.: PRRNet: pixel-region relation network for face forgery detection. Pattern Recogn. 116, 107950 (2021)","journal-title":"Pattern Recogn."},{"key":"2644_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., et al.: Swin-transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 10012\u20131002 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"2644_CR6","doi-asserted-by":"crossref","unstructured":"Martinel, N., Luca Foresti, G., Micheloni, C.: Aggregating deep pyramidal representations for person re-identification. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, (2019)","DOI":"10.1109\/CVPRW.2019.00196"},{"key":"2644_CR7","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"2644_CR8","doi-asserted-by":"crossref","unstructured":"Wang, C., Zhang, Q., Huang, C., et al.: Mancs: A multi-task attentional network with curriculum sampling for person re-identification. In: Proceedings of the European conference on computer vision (ECCV), pp. 365\u2013381 (2018)","DOI":"10.1007\/978-3-030-01225-0_23"},{"key":"2644_CR9","doi-asserted-by":"publisher","first-page":"8384","DOI":"10.1109\/TIP.2021.3113183","volume":"30","author":"Y Zhong","year":"2021","unstructured":"Zhong, Y., Wang, Y., Zhang, S.: Progressive feature enhancement for person re-identification. IEEE Trans. Image Process. 30, 8384\u20138395 (2021)","journal-title":"IEEE Trans. Image Process."},{"key":"2644_CR10","first-page":"111","volume-title":"An information theoretic approach for attention-driven face forgery detection. European conference on computer vision","author":"K Sun","year":"2022","unstructured":"Sun, K., Liu, H., Yao, T., et al.: An information theoretic approach for attention-driven face forgery detection. European conference on computer vision, pp. 111\u2013127. Springer, Cham (2022)"},{"key":"2644_CR11","doi-asserted-by":"crossref","unstructured":"Fei, J., Dai, Y., Yu, P., et al.: Learning second order local anomaly for general face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20270\u201320280 (2022)","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"2644_CR12","doi-asserted-by":"publisher","first-page":"7636","DOI":"10.1109\/TIP.2021.3107238","volume":"30","author":"Q Wang","year":"2021","unstructured":"Wang, Q., Guo, G.: AAN-face: attention augmented networks for face recognition. IEEE Trans. Image Process. 30, 7636\u20137648 (2021)","journal-title":"IEEE Trans. Image Process."},{"key":"2644_CR13","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TIFS.2022.3146781","volume":"17","author":"P Yu","year":"2022","unstructured":"Yu, P., Fei, J., Xia, Z., et al.: Improving generalization by commonality learning in face forgery detection. IEEE Trans. Inf. Forensics Secur. 17, 547\u2013558 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2644_CR14","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., et al.: End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4113\u20134122 (2022)","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"2644_CR15","doi-asserted-by":"crossref","unstructured":"Yang, J., Cai, Y., Liu, D., et al.: Multi-scale Siamese prediction network for video anomaly detection. Signal, Image and Video Processing, pp. 1\u20138 (2022)","DOI":"10.1007\/s11760-022-02274-4"},{"issue":"1","key":"2644_CR16","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11760-022-02227-x","volume":"17","author":"M Aloraini","year":"2023","unstructured":"Aloraini, M.: FaceMD: convolutional neural network-based spatiotemporal fusion facial manipulation detection. SIViP 17(1), 247\u2013255 (2023)","journal-title":"SIViP"},{"issue":"3","key":"2644_CR17","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s11760-021-02015-z","volume":"16","author":"DV Atkale","year":"2022","unstructured":"Atkale, D.V., Pawar, M.M., Deshpande, S.C., et al.: Multi-scale feature fusion model followed by residual network for generation of face aging and de-aging. SIViP 16(3), 753\u2013761 (2022)","journal-title":"SIViP"},{"key":"2644_CR18","first-page":"86","volume-title":"Thinking in frequency: face forgery detection by mining frequency-aware clues. European conference on computer vision","author":"Y Qian","year":"2020","unstructured":"Qian, Y., Yin, G., Sheng, L., et al.: Thinking in frequency: face forgery detection by mining frequency-aware clues. European conference on computer vision, pp. 86\u2013103. Springer, Cham (2020)"},{"issue":"2","key":"2644_CR19","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11760-022-02236-w","volume":"17","author":"L Wang","year":"2023","unstructured":"Wang, L., Fayolle, P.A., Belyaev, A.G.: Reverse image filtering with clean and noisy filters. SIViP 17(2), 333\u2013341 (2023)","journal-title":"SIViP"},{"key":"2644_CR20","doi-asserted-by":"crossref","unstructured":"Jia, S., Ma, C., Yao, T., et al.: Exploring frequency adversarial attacks for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4103\u20134112 (2022)","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"2644_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., et al.: Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 2185\u20132194. (2021)","DOI":"10.1109\/CVPR46437.2021.00222"},{"issue":"23","key":"2644_CR22","doi-asserted-by":"publisher","first-page":"23136","DOI":"10.1109\/TITS.2022.3198047","volume":"12","author":"H Tao","year":"2022","unstructured":"Tao, H., Duan, Q.: Learning discriminative feature representation for estimating smoke density of smoky vehicle rear. IEEE Trans. Intell. Transp. Syst. 12(23), 23136\u201323147 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"11","key":"2644_CR23","doi-asserted-by":"publisher","first-page":"7653","DOI":"10.1109\/TII.2022.3146142","volume":"18","author":"H Tao","year":"2022","unstructured":"Tao, H., Lu, M., Hu, Z., et al.: Attention-aggregated attribute-aware network with redundancy reduction convolution for video-based industrial smoke emission recognition. IEEE Trans. Industr. Inf. 18(11), 7653\u20137664 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"2644_CR24","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 14923\u201314932 (2021)","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"2644_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-023-02522-1","author":"Q Duan","year":"2023","unstructured":"Duan, Q., Hu, Z., Lu, M., et al.: Learning discriminative features for person re-identification via multi-spectral channel attention. SIViP (2023). https:\/\/doi.org\/10.1007\/s11760-023-02522-1","journal-title":"SIViP"},{"key":"2644_CR26","doi-asserted-by":"crossref","unstructured":"Chollet, F.: Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1251\u20131258. (2017)","DOI":"10.1109\/CVPR.2017.195"},{"key":"2644_CR27","doi-asserted-by":"publisher","first-page":"1640","DOI":"10.1109\/TIFS.2019.2946938","volume":"15","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Guo, G.: LS-CNN: characterizing local patches at multiple scales for face recognition. IEEE Trans. Inf. Forensics Secur. 15, 1640\u20131653 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2644_CR28","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., et al.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 1\u201311. (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"2644_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.imavis.2016.01.002","volume":"47","author":"C Sagonas","year":"2016","unstructured":"Sagonas, C., Antonakos, E., Tzimiropoulos, G., et al.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3\u201318 (2016)","journal-title":"Image Vis. Comput."},{"key":"2644_CR30","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., et al.: Lips don't lie: a generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5039\u20135049 (2021)","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"2644_CR31","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Bao, J., Chen, D., et al.: Exploring temporal coherence for more general video face forgery detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 15044\u201315054 (2021)","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"2644_CR32","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., et al.: Face X-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 5001\u20135010 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"issue":"3","key":"2644_CR33","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2644_CR34","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp. 159\u2013164 (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"2644_CR35","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, pp. 5\u201310 (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"2644_CR36","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., et al.: Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE, pp. 1\u20137 (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"2644_CR37","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., et al.: Multi-task learning for detecting and segmenting manipulated facial images and videos. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp. 1\u20138 (2019)","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"2644_CR38","doi-asserted-by":"crossref","unstructured":"Ni, Y., Meng, D., Yu, C., et al.: CORE: consistent representation learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12\u201321 (2022)","DOI":"10.1109\/CVPRW56347.2022.00011"},{"key":"2644_CR39","doi-asserted-by":"crossref","unstructured":"Liu, D., Dang, Z., Peng, C., et al.: FedForgery: generalized face forgery detection with residual federated learning. arXiv preprint arXiv:2210.09563, (2022)","DOI":"10.1109\/TIFS.2023.3293951"},{"key":"2644_CR40","unstructured":"Deepfakes. https:\/\/github.com\/iperov\/DeepFaceLab. Accessed: 2020\u201305\u201310. 3, 6, 7."},{"key":"2644_CR41","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., et al.: Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2387\u20132395 (2016)","DOI":"10.1109\/CVPR.2016.262"},{"key":"2644_CR42","unstructured":"Faceswap. https:\/\/github.com\/MarekKowalski\/FaceSwap. Accessed: 2020\u201305\u201310. 3, 6, 7."},{"issue":"4","key":"2644_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollh\u00f6fer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. Acm Trans. Graph. (TOG) 38(4), 1\u201312 (2019)","journal-title":"Acm Trans. Graph. (TOG)"},{"key":"2644_CR44","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., et al.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"2644_CR45","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., et al.: Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE workshop on information forensics and security (WIFS). IEEE, pp. 1\u20136 (2017)","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"2644_CR46","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, (2014)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02644-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02644-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02644-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T14:11:53Z","timestamp":1694527913000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02644-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["2644"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02644-6","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2717775\/v1","asserted-by":"object"}]},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,19]]},"assertion":[{"value":"21 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}