{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:29:27Z","timestamp":1767421767554,"version":"3.48.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11760-025-05051-1","type":"journal-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T06:53:35Z","timestamp":1766559215000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid AI approaches for detecting deepfake faces"],"prefix":"10.1007","volume":"19","author":[{"given":"Ammar","family":"Odeh","sequence":"first","affiliation":[]},{"given":"Osama","family":"Al-Haj Hassan","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Abu Taleb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"5051_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1438","volume":"12","author":"B Khoo","year":"2022","unstructured":"Khoo, B., Phan, R.C.W., Lim, C.H.: Deepfake attribution: on the source identification of artificially generated images. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 12, e1438 (2022)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"5051_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Jafari Navimipour, N., Dag, H., Unal, M.: Deepfake detection using deep learning methods: a systematic and comprehensive review. WIREs Data Min. Knowl. Discov. 14, e1520 (2024)","journal-title":"WIREs Data Min. Knowl. Discov."},{"key":"5051_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103525","volume":"223","author":"TT Nguyen","year":"2022","unstructured":"Nguyen, T.T., Nguyen, Q.V.H., Nguyen, D.T., Nguyen, D.T., Huynh-The, T., Nahavandi, S., et al.: Deep learning for deepfakes creation and detection: a survey. Comput. Vis. Image Underst. 223, 103525 (2022)","journal-title":"Comput. Vis. Image Underst."},{"key":"5051_CR4","first-page":"605","volume":"2021","author":"M Sharma","year":"2022","unstructured":"Sharma, M., Kaur, M.: A review of Deepfake technology: an emerging AI threat. Soft Comput. Secur. Appl.: Proc. ICSCS 2021, 605\u2013619 (2022)","journal-title":"Soft Comput. Secur. Appl.: Proc. ICSCS"},{"key":"5051_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.70470\/KHWARIZMIA\/2025\/007","volume":"2025","author":"WK Jummar","year":"2025","unstructured":"Jummar, W.K., Ali, O.K., Saleh, H.M.: A comparative analysis of deep learning models used in early detection of breast cancer. KHWARIZMIA 2025, 58\u201364 (2025)","journal-title":"KHWARIZMIA"},{"key":"5051_CR6","doi-asserted-by":"publisher","first-page":"24457","DOI":"10.1007\/s11042-024-20518-y","volume":"84","author":"G Meena","year":"2025","unstructured":"Meena, G., Mohbey, K.K., Lokesh, K.: FSTL-SA: few-shot transfer learning for sentiment analysis from facial expressions. Multimedia Tools Appl. 84, 24457\u201324485 (2025)","journal-title":"Multimedia Tools Appl."},{"key":"5051_CR7","doi-asserted-by":"publisher","first-page":"185","DOI":"10.58496\/MJBD\/2024\/013","volume":"2024","author":"MA Habeeb","year":"2024","unstructured":"Habeeb, M.A., Khaleel, Y.L., Ismail, R.D., Al-Qaysi, Z., Ameen, F.N.: Deep learning approaches for gender classification from facial images. Mesopot. J. Big Data 2024, 185\u2013198 (2024)","journal-title":"Mesopot. J. Big Data"},{"key":"5051_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.58496\/BJN\/2025\/009","volume":"2025","author":"S Yousef","year":"2025","unstructured":"Yousef, S.: Applying keras-based deep learning for intelligent analysis in network security and monitoring systems. Babylon. J. Netw. 2025, 106\u2013115 (2025)","journal-title":"Babylon. J. Netw."},{"key":"5051_CR9","first-page":"133","volume":"2","author":"J Ahmad","year":"2024","unstructured":"Ahmad, J., Khan, H., Salman, W., Amin, M., Ali, Z., Shokat, S.: A survey on enhanced approaches for cyber security challenges based on deep fake technology in computing networks. Spectr. Eng. Sci. 2, 133\u2013149 (2024)","journal-title":"Spectr. Eng. Sci."},{"key":"5051_CR10","doi-asserted-by":"crossref","unstructured":"Al-Khazraji, S.H., Saleh, H.H.; Khalid, A.I., Mishkal, I.A.: Impact of Deepfake technology on social media: detection, misinformation and societal implications. In: The Eurasia Proceedings of Science, Technology, Engineering and Mathematics, vol. 23, pp. 429\u2013441 (2023)","DOI":"10.55549\/epstem.1371792"},{"key":"5051_CR11","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.054654","author":"A Asghar","year":"2024","unstructured":"Asghar, A., Shifa, A., Asghar, M.N.: Survey on video security: examining threats, challenges, and future trends. Comput. Mater. Contin. (2024). https:\/\/doi.org\/10.32604\/cmc.2024.054654","journal-title":"Comput. Mater. Contin."},{"key":"5051_CR12","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2037","volume":"10","author":"SM Qureshi","year":"2024","unstructured":"Qureshi, S.M., Saeed, A., Almotiri, S.H., Ahmad, F., Al Ghamdi, M.A.: Deepfake forensics: a survey of digital forensic methods for multimodal deepfake identification on social media. PeerJ Comput. Sci. 10, e2037 (2024)","journal-title":"PeerJ Comput. Sci."},{"key":"5051_CR13","doi-asserted-by":"crossref","unstructured":"Alanazi, S., Asif, S.: Exploring deepfake technology: creation, consequences and countermeasures. In: Human-Intelligent Systems Integration, pp. 1\u201312 (2024)","DOI":"10.1007\/s42454-024-00054-8"},{"key":"5051_CR14","doi-asserted-by":"crossref","unstructured":"Maheshwari, R.U., Paulchamy, B., Pandey, B.K., Pandey, D.: Enhancing sensing and imaging capabilities through surface plasmon resonance for deepfake image detection. Plasmonics, pp. 1\u201320 (2024)","DOI":"10.1007\/s11468-024-02492-1"},{"issue":"40","key":"5051_CR15","doi-asserted-by":"publisher","first-page":"87579","DOI":"10.1007\/s11042-024-18706-x","volume":"83","author":"A Kaushal","year":"2024","unstructured":"Kaushal, A., Kumar, S., Kumar, R.: A review on deepfake generation and detection: bibliometric analysis. Multimedia Tools Appl. 83(40), 87579\u201387619 (2024)","journal-title":"Multimedia Tools Appl."},{"key":"5051_CR16","unstructured":"Gilbert, C., Gilbert, M.A.: The role of artificial intelligence (AI) in combatting deepfakes and digital misinformation. In: International Research Journal of Advanced Engineering and Science, vol. 9, pp. 170\u2013181 ( 2024). ISSN: 2455-9024"},{"key":"5051_CR17","doi-asserted-by":"crossref","unstructured":"Vardhan, H., An, K.S., Sangers, B.: Future trends and trials in cybersecurity and generative AI. In: Reshaping CyberSecurity With Generative AI Techniques, ed: IGI Global, pp. 465\u2013490 (2025)","DOI":"10.4018\/979-8-3693-5415-5.ch013"},{"key":"5051_CR18","doi-asserted-by":"crossref","unstructured":"Nannaware, S.C., Pillai, R., Kate, N.: Deepfakes in action: exploring use cases across industries. In: Deepfakes and Their Impact on Business (Ed): IGI Global Scientific Publishing, pp. 71\u201398 (2025)","DOI":"10.4018\/979-8-3693-6890-9.ch004"},{"key":"5051_CR19","doi-asserted-by":"crossref","unstructured":"Ma, X., Tian, J., Cai, Y., Chai, Y., Li, Z., Dai, J., et al.: HIDD: human-perception-centric incremental deepfake detection. In: 2024 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2024)","DOI":"10.1109\/ICME57554.2024.10687978"},{"key":"5051_CR20","doi-asserted-by":"crossref","unstructured":"Trinh, L., Liu, Y.: An examination of fairness of ai models for deepfake detection (2021) arXiv preprint arXiv:2105.00558","DOI":"10.24963\/ijcai.2021\/79"},{"key":"5051_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103684","volume":"139","author":"B Gowrisankar","year":"2024","unstructured":"Gowrisankar, B., Thing, V.L.: An adversarial attack approach for eXplainable AI evaluation on deepfake detection models. Comput. Secur. 139, 103684 (2024)","journal-title":"Comput. Secur."},{"key":"5051_CR22","doi-asserted-by":"crossref","unstructured":"Le, B.M., Kim, J., Tariq, S., Moore, K., Abuadbba, A., Woo, S.S.: Sok: facial deepfake detectors (2024). arXiv preprint arXiv:2401.04364","DOI":"10.1145\/3595353.3595882"},{"key":"5051_CR23","unstructured":"Pinhasov, B., Lapid, R., Ohayon, R., Sipper, M., Aperstein, Y.: Xai-based detection of adversarial attacks on deepfake detectors (2024) arXiv preprint arXiv:2403.02955"},{"key":"5051_CR24","unstructured":"Bhattacharyya, C., Wang, H., Zhang, F., Kim, S., Zhu, X.: Diffusion deepfake (2024). arXiv preprint arXiv:2404.01579"},{"key":"5051_CR25","doi-asserted-by":"crossref","unstructured":"L. Lin, X. Wang, and S. Hu, \"AI-Face: A Million-Scale Demographically Annotated AI-Generated Face Dataset and Fairness Benchmark,\" arXiv preprint arXiv:2406.00783, 2024.","DOI":"10.1109\/CVPR52734.2025.00332"},{"key":"5051_CR26","unstructured":"Yan, Z., Yao, T., Chen, S., Zhao, Y., Fu, X., Zhu, J. et al.: Df40: toward next-generation deepfake detection (2024). arXiv preprint arXiv:2406.13495"},{"key":"5051_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/3652027","author":"L Guarnera","year":"2024","unstructured":"Guarnera, L., Giudice, O., Battiato, S.: Mastering deepfake detection: a cutting-edge approach to distinguish gan and diffusion-model images. ACM Trans. Multim. Comput. Commun. Appl. (2024). https:\/\/doi.org\/10.1145\/3652027","journal-title":"ACM Trans. Multim. Comput. Commun. Appl."},{"key":"5051_CR28","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/computers13010031","volume":"13","author":"MA Arshed","year":"2024","unstructured":"Arshed, M.A., Mumtaz, S., Ibrahim, M., Dewi, C., Tanveer, M., Ahmed, S.: Multiclass AI-generated deepfake face detection using patch-wise deep learning model. Computers 13, 31 (2024)","journal-title":"Computers"},{"key":"5051_CR29","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., Lyu, S.: Celeb-df: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 3207\u20133216.","DOI":"10.1109\/CVPR42600.2020.00327"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-05051-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-05051-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-05051-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:24:00Z","timestamp":1767421440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-05051-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":29,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5051"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-05051-1","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"23 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"1457"}}