{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:11:08Z","timestamp":1772233868450,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s42979-020-00225-9","type":"journal-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T15:03:48Z","timestamp":1592924628000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["DeepFake Video Detection: A Time-Distributed Approach"],"prefix":"10.1007","volume":"1","author":[{"given":"Amritpal","family":"Singh","sequence":"first","affiliation":[]},{"given":"Amanpreet Singh","family":"Saimbhi","sequence":"additional","affiliation":[]},{"given":"Navjot","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0490-4413","authenticated-orcid":false,"given":"Mamta","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"key":"225_CR1","doi-asserted-by":"crossref","unstructured":"Duhan N, Mittal M. Opinion mining using ontological spam detection. In: 2017 international conference on Infocom technologies and unmanned systems (trends and future directions) (ICTUS). IEEE; 2017. p. 557\u201362.","DOI":"10.1109\/ICTUS.2017.8286071"},{"key":"225_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00165-4","volume":"1","author":"A Agarwal","year":"2020","unstructured":"Agarwal A, Mittal M, Pathak A, Goyal LM. Fake news detection using a blend of neural networks: an application of deep learning. SN Comput Sci. 2020;1:1\u20139.","journal-title":"SN Comput Sci"},{"key":"225_CR3","volume-title":"Classification of Fake News by Fine-tuning Deep Bidirectional Transformers based Language Model","author":"A Aggarwal","year":"2020","unstructured":"Aggarwal A, Chauhan A, Kumar D, Mittal M, Verma S. Classification of Fake News by Fine-tuning Deep Bidirectional Transformers based Language Model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium; 2020."},{"key":"225_CR4","unstructured":"https:\/\/www.businessinsider.in\/tech\/welcome-to-deepfake-hell-how-realistic-looking-fake-videos-left-the-uncanny-valley-and-entered-the-mainstream\/articleshow\/69906413.cms. Accessed 16 Apr 2020."},{"key":"225_CR5","unstructured":"https:\/\/www.theguardian.com\/technology\/ng-interactive\/2019\/jun\/22\/the-rise-of-the-deepfake-and-the-threat-to-democracy. Accessed 17 Apr 2020."},{"key":"225_CR6","unstructured":"https:\/\/www.github.com\/deepfakes\/faceswap. Accessed 20 Apr 2020."},{"key":"225_CR7","unstructured":"https:\/\/www.malavida.com\/en\/soft\/fakeapp. Accessed 20 Apr 2020."},{"key":"225_CR8","doi-asserted-by":"crossref","unstructured":"Li Y, Chang MC, Lyu S. In ictu oculi: Exposing ai created fake videos by detecting eye blinking. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE; 2018. p. 1\u20137.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"225_CR9","doi-asserted-by":"crossref","unstructured":"Dale K, Sunkavalli K, Johnson MK, Vlasic D, Matusik W, Pfister H. Video face replacement. In: Proceedings of the 2011 SIGGRAPH Asia conference. 2011. p. 1\u201310.","DOI":"10.1145\/2070781.2024164"},{"key":"225_CR10","doi-asserted-by":"crossref","unstructured":"Garrido P, Valgaerts L, Rehmsen O, Thormahlen T, Perez P, Theobalt C. Automatic face reenactment. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2014. p. 4217\u201324.","DOI":"10.1109\/CVPR.2014.537"},{"key":"225_CR11","doi-asserted-by":"crossref","unstructured":"Thies J, Zollhofer M, Stamminger M, Theobalt C, Nie\u00dfner M. Face2face: Real-time face capture and reenactment of rgb videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. p. 2387\u201395.","DOI":"10.1109\/CVPR.2016.262"},{"key":"225_CR12","doi-asserted-by":"crossref","unstructured":"Tolosana R, Vera-Rodriguez R, Fierrez J, Morales A, Ortega-Garcia J. DeepFakes and beyond: a survey of face manipulation and fake detection. arXiv preprint arXiv:2001.00179 (2020).","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"225_CR13","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial nets. In: Advances in neural information processing systems. 2014. p. 2672\u201380."},{"key":"225_CR14","doi-asserted-by":"crossref","unstructured":"Korshunova I, Shi W, Dambre J, Theis L. Fast face-swap using convolutional neural networks. In: Proceedings of the IEEE international conference on computer vision. 2017. p. 3677\u201385.","DOI":"10.1109\/ICCV.2017.397"},{"key":"225_CR15","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M. Faceforensics: a large-scale video dataset for forgery detection in human faces. arXiv preprint. arXiv:1803.09179 (2018)."},{"key":"225_CR16","doi-asserted-by":"crossref","unstructured":"Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M. Faceforensics++: learning to detect manipulated facial images. In: Proceedings of the IEEE international conference on computer vision. 2019. p. 1\u201311.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"225_CR17","unstructured":"https:\/\/www.kaggle.com\/c\/deepfake-detection-challenge\/data. Accessed 5 Feb 2020."},{"key":"225_CR18","unstructured":"Dolhansky B, Howes R, Pflaum B, Baram N, Ferrer CC. The Deepfake Detection Challenge (DFDC) preview dataset. arXiv preprint. arXiv:1910.08854 (2019)."},{"key":"225_CR19","doi-asserted-by":"crossref","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G. Do gans leave artificial fingerprints? In: 2019 IEEE conference on multimedia information processing and retrieval (MIPR). IEEE; 2019. p. 506\u201311.","DOI":"10.1109\/MIPR.2019.00103"},{"issue":"7","key":"225_CR20","doi-asserted-by":"publisher","first-page":"33240","DOI":"10.1109\/ACCESS.2019.2902579","volume":"13","author":"M Mittal","year":"2019","unstructured":"Mittal M, Verma A, Kaur I, Kaur B, Sharma M, Goyal LM, Roy S, Kim TH. An efficient edge detection approach to provide better edge connectivity for image analysis. IEEE Access. 2019;13(7):33240\u201355.","journal-title":"IEEE Access"},{"key":"225_CR21","doi-asserted-by":"crossref","unstructured":"Afchar D, Nozick V, Yamagishi J, Echizen I. Mesonet: a compact facial video forgery detection network. In: 2018 IEEE international workshop on information forensics and security (WIFS). IEEE; 2018. p. 1\u20137.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"225_CR22","unstructured":"Yu CM, Chang CT, Ti YW. Detecting Deepfake-forged contents with separable convolutional neural network and image segmentation. arXiv preprint. arXiv:1912.12184 (2019)."},{"issue":"78","key":"225_CR23","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.asoc.2019.02.036","volume":"1","author":"M Mittal","year":"2019","unstructured":"Mittal M, Goyal LM, Kaur S, Kaur I, Verma A, Hemanth DJ. Deep learning based enhanced tumor segmentation approach for MR brain images. Appl Soft Comput. 2019;1(78):346\u201354.","journal-title":"Appl Soft Comput"},{"key":"225_CR24","doi-asserted-by":"crossref","unstructured":"Mittal M, Arora M, Pandey T, Goyal LM. Image segmentation using deep learning techniques in medical images. In: Advancement of machine intelligence in interactive medical image analysis. Singapore: Springer; 2020. p. 41\u201363.","DOI":"10.1007\/978-981-15-1100-4_3"},{"issue":"4","key":"225_CR25","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.3390\/s20041068","volume":"20","author":"A Mittal","year":"2020","unstructured":"Mittal A, Kumar D, Mittal M, Saba T, Abunadi I, Rehman A, Roy S. Detecting pneumonia using convolutions and dynamic capsule routing for chest X-ray images. Sensors. 2020;20(4):1068.","journal-title":"Sensors"},{"key":"225_CR26","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.3390\/s20102941","volume":"20","author":"LM Goyal","year":"2020","unstructured":"Goyal LM, Mittal M, Kaushik R, Verma A, Kaur I, Roy S, Kim T-H. Improved ECG watermarking technique using curvelet transform. Sensors. 2020;20:2941.","journal-title":"Sensors"},{"issue":"5","key":"225_CR27","doi-asserted-by":"publisher","first-page":"822","DOI":"10.3390\/sym12050822","volume":"12","author":"M Mittal","year":"2020","unstructured":"Mittal M, Kaushik R, Verma A, Kaur I, Goyal LM, Roy S, Kim TH. Image watermarking in curvelet domain using edge surface blocks. Symmetry. 2020;12(5):822.","journal-title":"Symmetry"},{"key":"225_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Yamagishi J, Echizen I. Capsule-forensics: using capsule networks to detect forged images and videos. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE; p. 2307\u201311.","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"225_CR29","unstructured":"Stehouwer J, Dang H, Liu F, Liu X, Jain A. On the detection of digital face manipulation. arXiv preprint. arXiv:1910.01717 (2019)."},{"key":"225_CR30","doi-asserted-by":"crossref","unstructured":"Tran D, Bourdev L, Fergus R, Torresani L, Paluri M. Learning spatiotemporal features with 3d convolutional networks. In: Proceedings of the IEEE international conference on computer vision. 2015. p. 4489\u201397.","DOI":"10.1109\/ICCV.2015.510"},{"key":"225_CR31","doi-asserted-by":"crossref","unstructured":"Chollet F. Xception: Deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2017. p. 1251\u20138.","DOI":"10.1109\/CVPR.2017.195"},{"key":"225_CR32","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z. Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. p. 2818\u201326.","DOI":"10.1109\/CVPR.2016.308"},{"key":"225_CR33","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G. Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2018. p. 7132\u201341.","DOI":"10.1109\/CVPR.2018.00745"},{"key":"225_CR34","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. p. 770\u20138.","DOI":"10.1109\/CVPR.2016.90"},{"key":"225_CR35","doi-asserted-by":"crossref","unstructured":"Rahmouni N, Nozick V, Yamagishi J, Echizen I. Distinguishing computer graphics from natural images using convolution neural networks. In: 2017 IEEE workshop on information forensics and security (WIFS). IEEE; 2017. p. 1\u20136.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"225_CR36","doi-asserted-by":"crossref","unstructured":"Soviany P, Ionescu RT. Continuous trade-off optimization between fast and accurate deep face detectors. In: International conference on neural information processing. Cham: Springer; 2018. p. 473\u201385.","DOI":"10.1007\/978-3-030-04179-3_42"},{"key":"225_CR37","unstructured":"https:\/\/github.com\/yeephycho\/tensorflow-face-detection. Accessed 13 Feb 2020."},{"key":"225_CR38","unstructured":"Tan M, Le QV. Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint. arXiv:1905.11946 (2019)."},{"key":"225_CR39","unstructured":"He X, Zhao K, Chu X. AutoML: A Survey of the state-of-the-art. arXiv preprint. arXiv:1908.00709 (2019)."},{"key":"225_CR40","doi-asserted-by":"crossref","unstructured":"Mittal M, Arora M, Pandey T. Emoticon prediction on textual data using stacked LSTM model. In: International conference on communication and intelligent systems. Singapore: Springer; 2019. p. 259\u201369.","DOI":"10.1007\/978-981-15-3325-9_20"},{"key":"225_CR41","unstructured":"Courtney L, Sreenivas R. Learning from videos with deep convolutional LSTM networks. arXiv preprint. arXiv:1904.04817 (2019)."},{"issue":"10","key":"225_CR42","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff K, Srivastava RK, Koutn\u00edk J, Steunebrink BR, Schmidhuber J. LSTM: a search space odyssey. IEEE Trans Neural Netw Learn Syst. 2016;28(10):2222\u201332.","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"225_CR43","unstructured":"https:\/\/www.keras.io\/layers\/wrappers. Accessed 13 Feb 2020."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00225-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-00225-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00225-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T03:12:30Z","timestamp":1667099550000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-00225-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["225"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00225-9","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"15 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"212"}}