{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:18:39Z","timestamp":1775081919818,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T00:00:00Z","timestamp":1731110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101481"],"award-info":[{"award-number":["62101481"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002313"],"award-info":[{"award-number":["62002313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62261060"],"award-info":[{"award-number":["62261060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Project of Yunnan Province","award":["202201AU070033"],"award-info":[{"award-number":["202201AU070033"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202201AT070112"],"award-info":[{"award-number":["202201AT070112"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202301AU070210"],"award-info":[{"award-number":["202301AU070210"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202001BB050076"],"award-info":[{"award-number":["202001BB050076"]}]},{"name":"Basic Research Project of Yunnan Province","award":["202005AC160007"],"award-info":[{"award-number":["202005AC160007"]}]},{"name":"Major Scientific and Technological Project of Yunnan Province","award":["202202AD080002"],"award-info":[{"award-number":["202202AD080002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01634-6","type":"journal-article","created":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T07:19:18Z","timestamp":1731136758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection"],"prefix":"10.1007","volume":"11","author":[{"given":"Hanxian","family":"Duan","sequence":"first","affiliation":[]},{"given":"Qian","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6494-5224","authenticated-orcid":false,"given":"Xin","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Wozniak","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Liwen","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shaowen","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,9]]},"reference":[{"key":"1634_CR1","doi-asserted-by":"crossref","unstructured":"Chen L, Zhang Y, Song Y, Liu L, Wang J (2022) Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 18710\u201318719. IEEE","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"1634_CR2","doi-asserted-by":"crossref","unstructured":"Huang B, Wang Z, Yang J, Ai J, Zou Q, Wang Q, Ye D (2023) Implicit identity driven deepfake face swapping detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4490\u20134499. IEEE","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"1634_CR3","doi-asserted-by":"crossref","unstructured":"Zhao Y, Jin X, Gao S, Wu L, Yao S, Jiang Q (2023) Tan-gfd: generalizing face forgery detection based on texture information and adaptive noise mining. In: Applied Intelligence, pp 19007\u201319027. Springer","DOI":"10.1007\/s10489-023-04462-2"},{"key":"1634_CR4","doi-asserted-by":"crossref","unstructured":"Cao J, Ma C, Yao T, Chen S, Ding S, Yang X (2022) End-to-end reconstruction-classification learning for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4113\u20134122. IEEE","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"1634_CR5","doi-asserted-by":"crossref","unstructured":"Shiohara K, Yamasaki T (2022) Detecting deepfakes with self-blended images. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 18720\u201318729. IEEE","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"1634_CR6","doi-asserted-by":"crossref","unstructured":"Yu M, Li H, Yang J, Li X, Li S, Zhang J (2024) Fdml: feature disentangling and multi-view learning for face forgery detection. In: Neurocomputing, pp 127192\u2013127203. Elsevier","DOI":"10.1016\/j.neucom.2023.127192"},{"key":"1634_CR7","doi-asserted-by":"crossref","unstructured":"Tian J, Chen P, Yu C, Fu X, Wang X, Dai J, Han J (2024) Learning to discover forgery cues for face forgery detection. In: IEEE Transactions on Information Forensics and Security, pp 3814\u20133828. IEEE","DOI":"10.1109\/TIFS.2024.3372773"},{"key":"1634_CR8","doi-asserted-by":"crossref","unstructured":"Guo Z, Wang L, Yang W, Yang G, Li K (2024) Ldfnet: lightweight dynamic fusion network for face forgery detection by integrating local artifacts and global texture information. In: IEEE Transactions on Circuits and Systems for Video Technology, pp 1255\u20131265. IEEE","DOI":"10.1109\/TCSVT.2023.3289147"},{"key":"1634_CR9","doi-asserted-by":"crossref","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative adversarial networks. In Communications of the ACM, pp 139\u2013144. ACM","DOI":"10.1145\/3422622"},{"key":"1634_CR10","doi-asserted-by":"crossref","unstructured":"Jiang L, Li R, Wu W, Qian C, Loy CC (2020) Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2889\u20132898. IEEE","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"1634_CR11","doi-asserted-by":"crossref","unstructured":"Bacanin N, Budimirovic N, Venkatachalam K, Strumberger I, Alrasheedi AF, Abouhawwash M (2022) Novel chaotic oppositional fruit fly optimization algorithm for feature selection applied on covid 19 patients\u2019 health prediction. In: PLOS One, page e0275727","DOI":"10.1371\/journal.pone.0275727"},{"key":"1634_CR12","doi-asserted-by":"crossref","unstructured":"Bacanin N, Stoean R, Zivkovic M, Petrovic A, Rashid TA, Bezdan T (2021) Performance of a novel chaotic firefly algorithm with enhanced exploration for tackling global optimization problems: Application for dropout regularization. In: Mathematics, pp 2705. MDPI","DOI":"10.3390\/math9212705"},{"key":"1634_CR13","doi-asserted-by":"crossref","unstructured":"Malakar S, Ghosh M, Bhowmik S, Sarkar R, Nasipuri M (2020) A ga based hierarchical feature selection approach for handwritten word recognition. In: Neural Computing and Applications, pp 2533\u20132552. Springer","DOI":"10.1007\/s00521-018-3937-8"},{"key":"1634_CR14","doi-asserted-by":"crossref","unstructured":"Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. In: IEEE Transactions on signal processing, pp 758\u2013767. IEEE","DOI":"10.1109\/TSP.2004.839932"},{"key":"1634_CR15","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I (2018) Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS), pp 1\u20137. IEEE","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"1634_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Fang F, Yamagishi J, Echizen I (2019) Multi-task learning for detecting and segmenting manipulated facial images and videos. In: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS), pp 1\u20138. IEEE","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"1634_CR17","doi-asserted-by":"crossref","unstructured":"Zhao H, Zhou W, Chen D, Wei T, Zhang W, Yu N (2021) Multi-attentional deepfake detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2185\u20132194. IEEE","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"1634_CR18","doi-asserted-by":"crossref","unstructured":"Qian Y, Yin G, Sheng L, Chen Z, Shao J (2020) Thinking in frequency: Face forgery detection by mining frequency-aware clues. In: European conference on computer vision, pp 86\u2013103. Springer","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"1634_CR19","doi-asserted-by":"crossref","unstructured":"Liu H, Li X, Zhou W, Chen Y, He Y, Xue H, Zhang W, Yu N (2021) Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 772\u2013781. IEEE","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"1634_CR20","unstructured":"Li Y, Lyu S (2018) Exposing deepfake videos by detecting face warping artifacts. arXiv preprint arXiv:1811.00656"},{"key":"1634_CR21","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Yamagishi J, Echizen I (2019) Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"1634_CR22","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang Y, Yan J, Liu W (2021) Generalizing face forgery detection with high-frequency features. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16317\u201316326. IEEE","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"1634_CR23","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) Faceforensics++: Learning to detect manipulated facial images. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 1\u201311. IEEE","DOI":"10.1109\/ICCV.2019.00009"},{"key":"1634_CR24","doi-asserted-by":"crossref","unstructured":"Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-df: a large-scale challenging dataset for deepfake forensics. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 3207\u20133216, IEEE","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"1634_CR25","doi-asserted-by":"crossref","unstructured":"Zi B, Chang M, Chen J, Ma X, Jiang Y-G (2020) Wilddeepfake: a challenging real-world dataset for deepfake detection. In: Proceedings of the 28th ACM international conference on multimedia, pp 2382\u20132390. ACM","DOI":"10.1145\/3394171.3413769"},{"key":"1634_CR26","doi-asserted-by":"crossref","unstructured":"Wang Y, Yu K, Chen C, Hu X, Peng S (2023) Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 7278\u20137287. IEEE","DOI":"10.1109\/CVPR52729.2023.00703"},{"key":"1634_CR27","doi-asserted-by":"crossref","unstructured":"Gu Q, Chen S, Yao T, Chen Y, Ding S, Yi R (2022) Exploiting fine-grained face forgery clues via progressive enhancement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 735\u2013743. ACM","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"1634_CR28","doi-asserted-by":"crossref","unstructured":"Zou Y, Luo C, Zhang J (2023) Difld: domain invariant feature learning to detect low-quality compressed face forgery images. In: Complex & Intelligent Systems, pp 1\u201312. Springer","DOI":"10.1007\/s40747-023-01160-x"},{"key":"1634_CR29","doi-asserted-by":"crossref","unstructured":"Li X, Ni R, Yang P, Fu Z, Zhao Y (2022) Artifacts-disentangled adversarial learning for deepfake detection. In: IEEE Transactions on Circuits and Systems for Video Technology, pp 1658\u20131670. IEEE","DOI":"10.1109\/TCSVT.2022.3217950"},{"key":"1634_CR30","doi-asserted-by":"crossref","unstructured":"Yu P, Fei J, Xia Z, Zhou Z, Weng J (2022) Improving generalization by commonality learning in face forgery detection. In: IEEE Transactions on Information Forensics and Security, pp 547\u2013558. IEEE","DOI":"10.1109\/TIFS.2022.3146781"},{"key":"1634_CR31","doi-asserted-by":"crossref","unstructured":"Yin Q, Wei L, Li B, Huang J (2023) Dynamic difference learning with spatio-temporal correlation for deepfake video detection. In IEEE Transactions on Information Forensics and Security, IEEE","DOI":"10.1109\/TIFS.2023.3290752"},{"key":"1634_CR32","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Verdoliva L (2019) Noiseprint: A cnn-based camera model fingerprint. pp 144\u2013159. IEEE","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"1634_CR33","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2017) Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp 159\u2013164. ACM","DOI":"10.1145\/3082031.3083247"},{"key":"1634_CR34","doi-asserted-by":"crossref","unstructured":"Johnson MK, Farid H (2006) Exposing digital forgeries through chromatic aberration. In: Proceedings of the 8th workshop on Multimedia and security, pp 48\u201355. ACM","DOI":"10.1145\/1161366.1161376"},{"key":"1634_CR35","doi-asserted-by":"crossref","unstructured":"Farid H (2009) Exposing digital forgeries from jpeg ghosts. In: IEEE transactions on information forensics and security, pp 154\u2013160. IEEE","DOI":"10.1109\/TIFS.2008.2012215"},{"key":"1634_CR36","doi-asserted-by":"crossref","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. In: IEEE Transactions on information Forensics and Security, pp 868\u2013882. IEEE","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"1634_CR37","unstructured":"Locatello F, Bauer S, Lucic M, Raetsch G, Gelly S, Sch\u00f6lkopf B, Bachem O (2019) Challenging common assumptions in the unsupervised learning of disentangled representations. In: international conference on machine learning, pp 4114\u20134124. PMLR"},{"key":"1634_CR38","unstructured":"Chen Z, Yang H (2020) Manipulated face detector: Joint spatial and frequency domain attention network. arXiv preprint arXiv:2005.02958"},{"key":"1634_CR39","doi-asserted-by":"crossref","unstructured":"Wu X, Xie Z, Gao Y, Xiao Y (2020) Sstnet: Detecting manipulated faces through spatial, steganalysis and temporal features. In: ICASSP 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 2952\u20132956. IEEE","DOI":"10.1109\/ICASSP40776.2020.9053969"},{"key":"1634_CR40","doi-asserted-by":"crossref","unstructured":"Yan J, Zhang Z, Lei Z, Yi D, Li SZ (2012) Face liveness detection by exploring multiple scenic clues. In: 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV), pp 188\u2013193. IEEE","DOI":"10.1109\/ICARCV.2012.6485156"},{"key":"1634_CR41","doi-asserted-by":"crossref","unstructured":"Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. In: IEEE Transactions on Information Forensics and Security, pp 864\u2013879. IEEE","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"1634_CR42","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG), pp 1\u20137. IEEE"},{"key":"1634_CR43","doi-asserted-by":"crossref","unstructured":"Yang Z, Luo T, Wang D, Hu Z, Gao J, Wang L (2018) Learning to navigate for fine-grained classification. In: Proceedings of the European conference on computer vision (ECCV), pp 420\u2013435. Springer","DOI":"10.1007\/978-3-030-01264-9_26"},{"key":"1634_CR44","doi-asserted-by":"crossref","unstructured":"Du R, Chang D, Bhunia AK, Xie J, Ma Z, Song Y-Z, Guo J (2020) Fine-grained visual classification via progressive multi-granularity training of jigsaw patches. In: European Conference on Computer Vision, pp 153\u2013168. Springer","DOI":"10.1007\/978-3-030-58565-5_10"},{"key":"1634_CR45","doi-asserted-by":"crossref","unstructured":"Fatemifar S, Arashloo SR, Awais M, Kittler J (2021) Client-specific anomaly detection for face presentation attack detection. In: Pattern Recognition, pp 107696. Elsevier","DOI":"10.1016\/j.patcog.2020.107696"},{"key":"1634_CR46","doi-asserted-by":"crossref","unstructured":"Gu Z, Chen Y, Yao T, Ding S, Li J, Ma L (2022) Delving into the local: Dynamic inconsistency learning for deepfake video detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 744\u2013752. ACM","DOI":"10.1609\/aaai.v36i1.19955"},{"key":"1634_CR47","doi-asserted-by":"crossref","unstructured":"Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 9543\u20139552. IEEE","DOI":"10.1109\/CVPR.2019.00977"},{"key":"1634_CR48","doi-asserted-by":"crossref","unstructured":"Zhao T, Xu X, Xu M, Ding H, Xiong Y, Xia W (2021) Learning self-consistency for deepfake detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 15023\u201315033. IEEE","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"1634_CR49","unstructured":"Cozzolino D, Poggi G, Verdoliva L (2019) Extracting camera-based fingerprints for video forensics. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp 130\u2013137. IEEE"},{"key":"1634_CR50","doi-asserted-by":"crossref","unstructured":"Chen S, Yao T, Chen Y, Ding S, Li J, Ji R (2021) Local relation learning for face forgery detection. In: Proceedings of the AAAI conference on artificial intelligence, pp 1081\u20131088. ACM","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"1634_CR51","doi-asserted-by":"crossref","unstructured":"Rahmouni N, Nozick V, Yamagishi J, Echizen I (2017) Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE workshop on information forensics and security (WIFS), pp 1\u20136. IEEE","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"1634_CR52","doi-asserted-by":"crossref","unstructured":"Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face x-ray for more general face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5001\u20135010. IEEE","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"1634_CR53","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258. IEEE","DOI":"10.1109\/CVPR.2017.195"},{"key":"1634_CR54","doi-asserted-by":"crossref","unstructured":"Iacopo M, Aditya K, Royston\u00a0MM, Shenoy\u00a0PG, Wael A (2020) Two-branch recurrent network for isolating deepfakes in videos. In Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VII 16, pages 667\u2013684. Springer","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"1634_CR55","unstructured":"Tan M, Le Q (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: International conference on machine learning, pp 6105\u20136114. PMLR"},{"key":"1634_CR56","doi-asserted-by":"crossref","unstructured":"Wang C, Deng W (2021) Representative forgery mining for fake face detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 14923\u201314932. IEEE","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"1634_CR57","doi-asserted-by":"crossref","unstructured":"Wang G, Jiang Q, Jin X, Li W, Cui X (2022) Mc-lcr: Multimodal contrastive classification by locally correlated representations for effective face forgery detection. In: Knowledge-Based Systems, pp 109114. Elsevier","DOI":"10.1016\/j.knosys.2022.109114"},{"key":"1634_CR58","doi-asserted-by":"crossref","unstructured":"Liu J, Xie J, Wang Y, Zha ZJ (2024) Adaptive texture and spectrum clue mining for generalizable face forgery detection. In: IEEE Transactions on Information Forensics and Security, pp 1922\u20131934. IEEE","DOI":"10.1109\/TIFS.2023.3344293"},{"key":"1634_CR59","doi-asserted-by":"crossref","unstructured":"Li J, Xie H, Li J, Wang Z, Zhang Y (2021) Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6458\u20136467. IEEE","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"1634_CR60","doi-asserted-by":"crossref","unstructured":"Deng J, Guo J, Ververas E, Kotsia I, Zafeiriou S (2020) Retinaface: single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5203\u20135212. IEEE","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"1634_CR61","doi-asserted-by":"crossref","unstructured":"Zhou P, Han X, Morariu VI, Davis LS (2017) Two-stream neural networks for tampered face detection. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 1831\u20131839. IEEE","DOI":"10.1109\/CVPRW.2017.229"},{"key":"1634_CR62","doi-asserted-by":"crossref","unstructured":"Wang J, Wu Z, Ouyang W, Han X, Chen J, Jiang Y-G, Li S-N (2022) M2tr: multi-modal multi-scale transformers for deepfake detection. In: Proceedings of the 2022 international conference on multimedia retrieval, pp 615\u2013623. ACM","DOI":"10.1145\/3512527.3531415"},{"key":"1634_CR63","doi-asserted-by":"crossref","unstructured":"Yang J, Li A, Xiao S, Lu W, Gao X (2021) Mtd-net: learning to detect deepfakes images by multi-scale texture difference. In: IEEE Transactions on Information Forensics and Security, pp 4234\u20134245. IEEE","DOI":"10.1109\/TIFS.2021.3102487"},{"key":"1634_CR64","doi-asserted-by":"crossref","unstructured":"Zhu X, Fei H, Zhang B, Zhang T, Zhang X, Li SZ, Lei Z (2023) Face forgery detection by 3d decomposition and composition search. In: IEEE Transactions on Pattern Analysis and Machine Intelligence, pp 8342\u20138357. IEEE","DOI":"10.1109\/TPAMI.2022.3233586"},{"key":"1634_CR65","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248\u2013255. IEEE","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"1634_CR66","unstructured":"King DE (2009) Dlib-ml: a machine learning toolkit. In: The Journal of Machine Learning Research, pp 1755\u20131758. JMLR"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01634-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01634-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01634-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:19:32Z","timestamp":1738268372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01634-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,9]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1634"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01634-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,9]]},"assertion":[{"value":"30 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"11"}}