{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T21:19:38Z","timestamp":1776979178982,"version":"3.51.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s11760-026-05275-9","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T20:39:46Z","timestamp":1774384786000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid deep learning architecture for real-time deepfake detection in WebRTC-based video platforms"],"prefix":"10.1007","volume":"20","author":[{"family":"Nishant","sequence":"first","affiliation":[]},{"given":"Prakhar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,24]]},"reference":[{"issue":"1","key":"5275_CR1","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1007\/s10586-023-03977-0","volume":"27","author":"R Ahamad","year":"2024","unstructured":"Ahamad, R., Mishra, K.N.: Hybrid approach for suspicious object surveillance using video clips and uav images in cloud-iot-based computing environment. Clust. Comput. 27(1), 761\u2013785 (2024). https:\/\/doi.org\/10.1007\/s10586-023-03977-0","journal-title":"Clust. Comput."},{"key":"5275_CR2","doi-asserted-by":"publisher","first-page":"145954","DOI":"10.1109\/ACCESS.2023.3341857","volume":"11","author":"M Ali","year":"2023","unstructured":"Ali, M., et al.: Analysis of feature selection methods in software defect prediction models. IEEE Access 11, 145954\u2013145974 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3341857","journal-title":"IEEE Access"},{"key":"5275_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2022.104412","volume":"141","author":"R Ali","year":"2022","unstructured":"Ali, R., Cha, Y.-J.: Attention-based generative adversarial network with internal damage segmentation using thermography. Autom. Constr. 141, 104412 (2022). https:\/\/doi.org\/10.1016\/j.autcon.2022.104412","journal-title":"Autom. Constr."},{"key":"5275_CR4","doi-asserted-by":"crossref","unstructured":"Joe Attardi. Modern CSS. Apress, 2020. isbn: 9781484262931","DOI":"10.1007\/978-1-4842-6294-8"},{"issue":"5","key":"5275_CR5","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.3390\/app13053095","volume":"13","author":"N Bansal","year":"2023","unstructured":"Bansal, N., et al.: Real-time advanced computational intelligence for deep fake video detection. Appl. Sci. 13(5), 3095 (2023). https:\/\/doi.org\/10.3390\/app13053095","journal-title":"Appl. Sci."},{"issue":"1","key":"5275_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/jimaging9010003","volume":"9","author":"M Bhandari","year":"2022","unstructured":"Bhandari, M., et al.: Auguring fake face images using dual input convolution neural network. Journal of Imaging 9(1), 3 (2022). https:\/\/doi.org\/10.3390\/jimaging9010003","journal-title":"Journal of Imaging"},{"issue":"5","key":"5275_CR7","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/TPAMI.2012.199","volume":"35","author":"C-H Chan","year":"2013","unstructured":"Chan, C.-H., et al.: Multiscale Local Phase Quantization for Robust Component-Based Face Recognition Using Kernel Fusion of Multiple Descriptors. IEEE Trans. Pattern Anal. Mach. Intell. 35(5), 1164\u20131177 (2013). https:\/\/doi.org\/10.1109\/TPAMI.2012.199","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5275_CR8","doi-asserted-by":"publisher","unstructured":"Chen, et al J.: \u201cSemi-supervised generative adversarial network for face anti-spoofing\u201d. In: International Conference on Image, Vision and Intelligent Systems (ICIVIS 2021). Springer, (2022), pp.\u00a0121\u2013130. https:\/\/doi.org\/10.1007\/978-981-19-1589-9_11","DOI":"10.1007\/978-981-19-1589-9_11"},{"key":"5275_CR9","unstructured":"John Dean. Web Programming with HTML, CSS, and JavaScript. Jones & Bartlett Learning, (2025). isbn: 9781284302974"},{"key":"5275_CR10","doi-asserted-by":"publisher","first-page":"9848","DOI":"10.1109\/ACCESS.2019.2891668","volume":"7","author":"J Deng","year":"2019","unstructured":"Deng, J., et al.: cGAN Based Facial Expression Recognition for Human-Robot Interaction. IEEE Access 7, 9848\u20139859 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2891668","journal-title":"IEEE Access"},{"issue":"2s","key":"5275_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3536426","volume":"18","author":"S Ge","year":"2022","unstructured":"Ge, S., et al.: Deepfake video detection via predictive representation learning. ACM Trans. Multimed. Comput. Commun. Appl. 18(2s), 1\u201321 (2022)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"5275_CR12","doi-asserted-by":"publisher","unstructured":"Gerstner, Candice R., Farid, Hany: \u201cDetecting Real-Time Deep-Fake Videos Using Active Illumination\u201d. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 2022, pp.\u00a053\u201360. https:\/\/doi.org\/10.1109\/CVPRW56347.2022.00015","DOI":"10.1109\/CVPRW56347.2022.00015"},{"key":"5275_CR13","doi-asserted-by":"publisher","unstructured":"Hariharan, et al. B.: \u201cHybrid deep convolutional generative adversarial networks (dcgans) and style generative adversarial network (stylegans) algorithms to improve image quality\u201d. In: 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2022, pp.\u00a01182\u20131186. https:\/\/doi.org\/10.1109\/ICESC54411.2022.9885611","DOI":"10.1109\/ICESC54411.2022.9885611"},{"issue":"3","key":"5275_CR14","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari, A., et al.: A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn. Comput. 16(3), 1073\u20131091 (2024). https:\/\/doi.org\/10.1007\/s12559-024-10255-7","journal-title":"Cogn. Comput."},{"key":"5275_CR15","doi-asserted-by":"publisher","unstructured":"Huang, et al. Q.: \u201cNon-intrusive load monitoring based on deep convolutional generative adversarial network prediction\u201d. In: 2022 IEEE 5th International Conference on Electronics Technology (ICET). IEEE, (2022), pp.\u00a01050\u20131054. https:\/\/doi.org\/10.1109\/ICET55416.2022.9818818","DOI":"10.1109\/ICET55416.2022.9818818"},{"issue":"4","key":"5275_CR16","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s13735-022-00262-5","volume":"11","author":"M Kas","year":"2022","unstructured":"Kas, M., et al.: Generative adversarial networks for 2d-based cnn pose-invariant face recognition. International Journal of Multimedia Information Retrieval 11(4), 639\u2013651 (2022). https:\/\/doi.org\/10.1007\/s13735-022-00262-5","journal-title":"International Journal of Multimedia Information Retrieval"},{"issue":"22","key":"5275_CR17","doi-asserted-by":"publisher","first-page":"31391","DOI":"10.1007\/s11042-022-12778-3","volume":"81","author":"A Kohli","year":"2022","unstructured":"Kohli, A., Gupta, A.: Light-weight 3dcnn for deepfakes, faceswap and face2face facial forgery detection. Multimedia Tools and Applications 81(22), 31391\u201331403 (2022)","journal-title":"Multimedia Tools and Applications"},{"key":"5275_CR18","doi-asserted-by":"publisher","unstructured":"Liu, W., Sun, J.: \u201cGeneral forgery face detection: Against generative adversarial networks using knowledge distillation\u201d. In: 2022 5th International Conference on Data Science and Information Technology (DSIT). 2022, pp.\u00a01\u20135. https:\/\/doi.org\/10.1109\/DSIT55514.2022.9943841","DOI":"10.1109\/DSIT55514.2022.9943841"},{"key":"5275_CR19","unstructured":"Salvatore Loreto and Simon Pietro Romano. Real-Time Communication with WebRTC: Peer-to-Peer in the Browser. O\u2019Reilly Media, 2014. isbn: 9781449371876"},{"issue":"1","key":"5275_CR20","doi-asserted-by":"publisher","first-page":"601","DOI":"10.32604\/cmc.2023.036074","volume":"77","author":"F Majeed","year":"2023","unstructured":"Majeed, F., et al.: Ontology-based crime news semantic retrieval system. CMC-Computers, Materials and Continua 77(1), 601\u2013614 (2023). https:\/\/doi.org\/10.32604\/cmc.2023.036074","journal-title":"CMC-Computers, Materials and Continua"},{"key":"5275_CR21","doi-asserted-by":"crossref","unstructured":"Azat Mardan. Practical Node.js: Building Real-World Scalable Web Apps. Apress, (2018). isbn: 9781484201381","DOI":"10.1007\/978-1-4842-3039-8"},{"issue":"23","key":"5275_CR22","doi-asserted-by":"publisher","first-page":"3989","DOI":"10.3390\/electronics11233989","volume":"11","author":"T Mazhar","year":"2022","unstructured":"Mazhar, T., et al.: A novel expert system for the diagnosis and treatment of heart disease. Electronics 11(23), 3989 (2022). https:\/\/doi.org\/10.3390\/electronics11233989","journal-title":"Electronics"},{"key":"5275_CR23","doi-asserted-by":"publisher","first-page":"415","DOI":"10.3390\/healthcare11040415","volume":"11","author":"T Mazhar","year":"2023","unstructured":"Mazhar, T., et al.: The role of machine learning and deep learning approaches for the detection of skin cancer. Healthcare 11, 415 (2023). https:\/\/doi.org\/10.3390\/healthcare11040415","journal-title":"Healthcare"},{"key":"5275_CR24","unstructured":"McBain, B.: Polar Codes in Python: Main Reference. Reference document for a software library available on GitHub. (2019)"},{"key":"5275_CR25","doi-asserted-by":"publisher","unstructured":"McKinney, Wes: \u201cData structures for statistical computing in python\u201d. In: Proceedings of the 9th Python in Science Conference. (2010), pp.\u00a051\u201356. https:\/\/doi.org\/10.25080\/Majora-92bf1922-00a","DOI":"10.25080\/Majora-92bf1922-00a"},{"issue":"6","key":"5275_CR26","first-page":"469","volume":"20","author":"HT Nguyen","year":"2022","unstructured":"Nguyen, H.T., et al.: Fake face detection in video using shallow deep learning architectures. Int. J. Intell. Syst. Technol. Appl. 20(6), 469\u2013486 (2022)","journal-title":"Int. J. Intell. Syst. Technol. Appl."},{"key":"5275_CR27","volume-title":"A Guide to NumPy","author":"TE Oliphant","year":"2006","unstructured":"Oliphant, T.E.: A Guide to NumPy. Trelgol Publishing, USA (2006)"},{"key":"5275_CR28","unstructured":"Serr, S.M.: Nodeman: A node management tool for hpc clusters. Tech. rep. Technical report. Idaho Falls, ID, United States: Idaho National Laboratory (INL), (2024)"},{"key":"5275_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e31464","author":"SK Sharma","year":"2024","unstructured":"Sharma, S.K., et al.: Detection of real-time deep fakes and face forgery in video conferencing employing generative adversarial networks. Heliyon (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e31464","journal-title":"Heliyon"},{"issue":"1","key":"5275_CR30","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/jcp2010007","volume":"2","author":"M Taeb","year":"2022","unstructured":"Taeb, M., Chi, H.: Comparison of deepfake detection techniques through deep learning. Journal of Cybersecurity and Privacy 2(1), 89\u2013106 (2022). https:\/\/doi.org\/10.3390\/jcp2010007","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"5275_CR31","volume-title":"Deep Fake Detection (DFD) Entire Original Dataset","author":"S Tiwarekar","year":"2021","unstructured":"Tiwarekar, S.: Deep Fake Detection (DFD) Entire Original Dataset. Kaggle, Dataset licensed under the MIT License (2021)"},{"key":"5275_CR32","doi-asserted-by":"publisher","unstructured":"Wijaya, N.: Mulyani, Sri Hasta, Prabowo, Albertus Christian Noviadi: Deepdrive: effective distracted driver detection using generative adversarial networks (gan) algorithm. Iran Journal of Computer Science 5(3), 221\u2013227 (2022). https:\/\/doi.org\/10.1007\/s42044-022-00103-y","DOI":"10.1007\/s42044-022-00103-y"},{"issue":"2","key":"5275_CR33","doi-asserted-by":"publisher","first-page":"616","DOI":"10.3390\/s23020616","volume":"23","author":"Z Xue","year":"2023","unstructured":"Xue, Z., et al.: Global-Local Facial Fusion Based GAN Generated Fake Face Detection. Sensors 23(2), 616 (2023). https:\/\/doi.org\/10.3390\/s23020616","journal-title":"Sensors"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-026-05275-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-026-05275-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-026-05275-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:32:07Z","timestamp":1776976327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-026-05275-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,24]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5275"],"URL":"https:\/\/doi.org\/10.1007\/s11760-026-05275-9","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,24]]},"assertion":[{"value":"29 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This research was conducted in accordance with ethical guidelines for AI research and deepfake detection.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"205"}}