{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:27:22Z","timestamp":1773383242423,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The Science and Technology Project in Xi\u2019an","award":["No. 22GXFW0123"],"award-info":[{"award-number":["No. 22GXFW0123"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11760-024-03059-7","type":"journal-article","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T14:02:01Z","timestamp":1709301721000},"page":"4131-4144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Research on video face forgery detection model based on multiple feature fusion network"],"prefix":"10.1007","volume":"18","author":[{"given":"Wenyan","family":"Hou","sequence":"first","affiliation":[]},{"given":"Jingtao","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Huanqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fengling","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"issue":"9","key":"3059_CR1","first-page":"1350","volume":"63","author":"T Xie","year":"2023","unstructured":"Xie, T., Yu, L., Luo, S., et al.: A review of deep face forgery and detection techniques. J. Tsinghua Univ. (Natural Science Edition) 63(9), 1350\u20131365 (2023)","journal-title":"J. Tsinghua Univ. (Natural Science Edition)"},{"issue":"1","key":"3059_CR2","first-page":"1","volume":"17","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Lu, T., Du, Y.: A review of deep forgery detection methods for face videos. Comput. Sci. Explor. 17(1), 1\u201326 (2023)","journal-title":"Comput. Sci. Explor."},{"issue":"6","key":"3059_CR3","first-page":"1396","volume":"60","author":"Z Li","year":"2023","unstructured":"Li, Z., Zhang, X., Pu, Y., et al.: A review of multimodal depth forgery and detection techniques. Comput. Res. Develop. 60(6), 1396\u20131416 (2023)","journal-title":"Comput. Res. Develop."},{"issue":"2","key":"3059_CR4","first-page":"496","volume":"32","author":"X Li","year":"2021","unstructured":"Li, X., Ji, S., Wu, C., et al.: A review of deep forgery and detection techniques. J. Softw. 32(2), 496\u2013518 (2021)","journal-title":"J. Softw."},{"key":"3059_CR5","unstructured":"Sabir, E., Cheng, J. X., Jaiswal, A., et al.: Recurrent convolutional strategies for face manipulation detection in videos. In: Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, Jun 16\u201320, pp. 80\u201387. IEEE, Piscataway (2019)"},{"issue":"1","key":"3059_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/3292039","volume":"62","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., et al.: Face2Face: real-time face capture and reenactment of RGB videos. Commun. ACM. ACM 62(1), 96\u2013104 (2019)","journal-title":"Commun. ACM. ACM"},{"issue":"4","key":"3059_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3306346.3323035","volume":"38","author":"J Thies","year":"2019","unstructured":"Thies, J., Zollhofer, M., Nie\u00dfner, M.: Deferred neural rendering: image synthesis using neural textures. ACM Trans. Graph. 38(4), 1\u201312 (2019)","journal-title":"ACM Trans. Graph."},{"key":"3059_CR8","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.neucom.2021.06.061","volume":"457","author":"Z Kuang","year":"2021","unstructured":"Kuang, Z., Guo, Z., Fang, J., et al.: Unnoticeable synthetic face replacement for image privacy protection. Neurocomputing 457, 322\u2013333 (2021)","journal-title":"Neurocomputing"},{"issue":"3","key":"3059_CR9","doi-asserted-by":"publisher","first-page":"e2155","DOI":"10.1002\/cav.2155","volume":"34","author":"R Wei","year":"2023","unstructured":"Wei, R., Wang, P.: SeTGAN: semantic-text guided face image generation. Comput. Anim. Virt. Worlds 34(3), e2155 (2023)","journal-title":"Comput. Anim. Virt. Worlds"},{"key":"3059_CR10","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., et al.: Lips don\u2019t lie: a generalisable and robust approach to face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5039\u20135049 (2021)","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"3059_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Deng, W.: Representative forgery mining for fake face detection. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14918\u201314927 (2021)","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"3059_CR12","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., El-Gaaly, T., et al.: Detecting deep-fake videos from appearance and behavior. In: Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, New York, Dec 6\u201311, pp. 1\u20136. IEEE, Piscataway (2020)","DOI":"10.1109\/WIFS49906.2020.9360904"},{"key":"3059_CR13","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Rossler, A., Thies, J., et al.: ID-Reveal: identity-aware deepfake video detection. In: Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision, Montreal, Oct 10\u201317, pp. 15088\u201315097. IEEE, Piscataway (2021)","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"3059_CR14","doi-asserted-by":"crossref","unstructured":"Qi, H., Guo, Q., Xu, J., et al.: DeepRhythm: exposing deepfakes with attentional visual heartbeat rhythms. In: Proceedings of the 28th ACM International Conference on Multimedia, Seattle, Oct 12\u201316, 2020, pp. 4318\u20134327. ACM, New York (2020)","DOI":"10.1145\/3394171.3413707"},{"key":"3059_CR15","doi-asserted-by":"publisher","first-page":"29501","DOI":"10.1007\/s11042-023-14626-4","volume":"82","author":"K Xu","year":"2023","unstructured":"Xu, K., Yang, G., Fang, X., et al.: Facial depth forgery detection based on image gradient. Multimed. Tools Appl. 82, 29501\u201329525 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3059_CR16","doi-asserted-by":"publisher","first-page":"109114","DOI":"10.1016\/j.knosys.2022.109114","volume":"250","author":"G Wang","year":"2022","unstructured":"Wang, G., Jiang, Q., Jin, X., et al.: MC-LCR: multimodal contrastive classification by locally correlated representations for effective face forgery detection. Knowl. Based Syst. 250, 109114 (2022)","journal-title":"Knowl. Based Syst."},{"key":"3059_CR17","doi-asserted-by":"publisher","first-page":"119341","DOI":"10.1016\/j.ins.2023.119341","volume":"645","author":"S Kingra","year":"2023","unstructured":"Kingra, S., Aggarwal, N., Kaur, N.: SiamNet: exploiting source camera noise discrepancies using Siamese network for Deepfake detection. Inf. Sci. 645, 119341 (2023)","journal-title":"Inf. Sci."},{"key":"3059_CR18","doi-asserted-by":"publisher","first-page":"118423","DOI":"10.1016\/j.eswa.2022.118423","volume":"210","author":"S Ganguly","year":"2022","unstructured":"Ganguly, S., Ganguly, A., Mohiuddin, S., et al.: ViXNet: vision transformer with Xception network for deepfakes based video and image forgery detection. Expert Syst. Appl. 210, 118423 (2022)","journal-title":"Expert Syst. Appl."},{"key":"3059_CR19","doi-asserted-by":"publisher","first-page":"e730","DOI":"10.7717\/peerj-cs.730","volume":"7","author":"A Ismail","year":"2021","unstructured":"Ismail, A., Elpeltagy, M., Zaki, M., et al.: Deepfake video detection: YOLO-Face convolution recurrent approach. PeerJ Comput. Sci. 7, e730 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"3059_CR20","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bao, J., Zhou, W., et al.: AltFreezing for more general video face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4129\u20134138 (2023)","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"3059_CR21","first-page":"1","volume":"1","author":"H Ren","year":"2021","unstructured":"Ren, H., Atwa, W., Zhang, H., et al.: Frame duplication forgery detection and localization algorithm based on the improved levenshtein distance. Sci. Program. 1, 1\u201310 (2021)","journal-title":"Sci. Program."},{"key":"3059_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116066","volume":"90","author":"S Fadl","year":"2021","unstructured":"Fadl, S., Han, Qi., Li, Q.: CNN spatiotemporal features and fusion for surveillance video forgery detection. Signal Process. Image Commun. 90, 116066 (2021)","journal-title":"Signal Process. Image Commun."},{"issue":"2","key":"3059_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/systems10020031","volume":"10","author":"Z Lai","year":"2022","unstructured":"Lai, Z., Wang, Y., Feng, R., et al.: Multi-feature fusion based deepfake face forgery video detection. Systems 10(2), 31 (2022)","journal-title":"Systems"},{"key":"3059_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Li, J., et al.: Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6458\u20136467 (2021)","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"3059_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y. Z., Yang, X., Sun, P., et al.: Celeb-DF: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, Jun 13\u201319, 2020, pp. 3204\u20133213. IEEE, Piscataway (2020)","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"3059_CR26","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., Verdoliva, L.: Recasting residualbased local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159\u2013164. ACM (2017)","DOI":"10.1145\/3082031.3083247"},{"key":"3059_CR27","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., et al.: Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE, Piscataway (2017)","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"3059_CR28","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5\u201310. ACM (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"3059_CR29","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., et al.: Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1\u201311. IEEE, Piscataway (2019)","DOI":"10.1109\/ICCV.2019.00009"},{"key":"3059_CR30","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., et al.: Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS) , pp. 1\u20137. IEEE, Piscataway (2018)","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"3059_CR31","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1007\/s10044-022-01083-2","volume":"25","author":"S Ganguly","year":"2022","unstructured":"Ganguly, S., Mohiuddin, S., Malakar, S., et al.: Visual attention-based deepfake video forgery detection. Pattern Anal. Appl. 25, 981\u2013992 (2022)","journal-title":"Pattern Anal. Appl."},{"key":"3059_CR32","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., et al.: Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16317\u201316326 (2021)","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"3059_CR33","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., et al.: Face x-ray for more general face forgery detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5000\u20135009 (2020)","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"3059_CR34","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-023-00614-z","author":"S Waseem","year":"2023","unstructured":"Waseem, S., Abu-Bakar, S.A.R.S., Omar, Z., et al.: Multi-attention-based approach for deepfake face and expression swap detection and localization. J. Image Video Proc. (2023). https:\/\/doi.org\/10.1186\/s13640-023-00614-z","journal-title":"J. Image Video Proc."},{"key":"3059_CR35","doi-asserted-by":"publisher","first-page":"4272","DOI":"10.1109\/TIFS.2023.3293951","volume":"18","author":"D Liu","year":"2023","unstructured":"Liu, D., Dang, Z., Peng, C., et al.: FedForgery: generalized face forgery detection with residual federated learning. IEEE Trans. Inf. Forens. Secur. 18, 4272\u20134284 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3293951","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"3059_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/2731364","volume":"1","author":"RK Pattanaik","year":"2022","unstructured":"Pattanaik, R.K., Mishra, S., Siddique, M., et al.: Breast cancer classification from mammogram images using extreme learning machine-based DenseNet121 model. J. Sens. 1, 1\u201312 (2022)","journal-title":"J. Sens."},{"issue":"14","key":"3059_CR37","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.3390\/diagnostics13142399","volume":"13","author":"N Sharma","year":"2023","unstructured":"Sharma, N., Gupta, S., Reshan, M.S.A., et al.: EfficientNetB0 cum FPN based semantic segmentation of gastrointestinal tract organs in MRI scans. Diagnostics 13(14), 2399 (2023). https:\/\/doi.org\/10.3390\/diagnostics13142399","journal-title":"Diagnostics"},{"key":"3059_CR38","doi-asserted-by":"publisher","first-page":"34885","DOI":"10.1007\/s11042-023-14892-2","volume":"82","author":"R Kadirappa","year":"2023","unstructured":"Kadirappa, R., Ko, S.B., et al.: An automated multi-class skin lesion diagnosis by embedding local and global features of dermoscopy images. Multimed. Tools Appl. 82, 34885\u201334912 (2023). https:\/\/doi.org\/10.1007\/s11042-023-14892-2","journal-title":"Multimed. Tools Appl."},{"key":"3059_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9070182","volume":"1","author":"A Zhu","year":"2021","unstructured":"Zhu, A., Chen, S., Fangfang, Lu., et al.: Recognition method of tunnel lining defects based on deep learning. Wirel. Commun. Mob. Comput.. Commun. Mob. Comput. 1, 1\u201312 (2021). https:\/\/doi.org\/10.1155\/2021\/9070182","journal-title":"Wirel. Commun. Mob. Comput.. Commun. Mob. Comput."},{"key":"3059_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8909458","volume":"1","author":"Y Chu","year":"2020","unstructured":"Chu, Y., Yue, X., Lei, Yu., et al.: Automatic image captioning based on ResNet50 and LSTM with soft attention. Wirel. Commun. Mob. Comput.. Commun. Mob. Comput. 1, 1\u20137 (2020). https:\/\/doi.org\/10.1155\/2020\/8909458","journal-title":"Wirel. Commun. Mob. Comput.. Commun. Mob. Comput."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03059-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03059-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03059-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T13:08:33Z","timestamp":1716469713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03059-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,1]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["3059"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03059-7","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,1]]},"assertion":[{"value":"24 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"We declare that we have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}