{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:20:18Z","timestamp":1764782418856},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T00:00:00Z","timestamp":1709510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T00:00:00Z","timestamp":1709510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02629-3","type":"journal-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T15:01:41Z","timestamp":1709564501000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing DeepFake Detection: Leveraging Mesonet for Video Fraud Identification"],"prefix":"10.1007","volume":"5","author":[{"given":"C.","family":"Shanmuganathan","sequence":"first","affiliation":[]},{"given":"M.","family":"Thamizharasi","sequence":"additional","affiliation":[]},{"given":"T. P.","family":"Anish","sequence":"additional","affiliation":[]},{"given":"K.","family":"Sivasankari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,4]]},"reference":[{"issue":"3","key":"2629_CR1","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.patcog.2010.09.020","volume":"44","author":"M El Ayaadi","year":"2011","unstructured":"El Ayaadi M, Karraeand F, Kamal MS. Survey on emotion recognitions: features, classification scheme, and database. Pattern Recogn. 2011;44(3):572\u201387.","journal-title":"Pattern Recogn"},{"key":"2629_CR2","doi-asserted-by":"crossref","unstructured":"Darius Afchar,VincentNozick,JunichiYamagishi,IsaoEchizen ,MesoNet: a Compact Facial Video Forgery Detection Network, IEEE International Workshop on Information Forensics and Security,(2018).","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"2629_CR3","doi-asserted-by":"crossref","unstructured":"I. Amerini, L. Galteri, R. Caldelli, A. Del Bimbo, Deepfake video detection through optical flow based CNN, International Conference on Computer Vision Workshop, (ICCVW) (Micc) (2019) 1205\u20131207.","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"2629_CR4","doi-asserted-by":"crossref","unstructured":"S. Agarwal, T. El-Gaaly, H. Farid, S. Lim, Detecting deep-fake videos from appearance and behavior, in: IEEE Workshop on Image Forensics and Security, IEEExplore, 2020, pp. 1\u201312.","DOI":"10.1109\/WIFS49906.2020.9360904"},{"key":"2629_CR5","doi-asserted-by":"crossref","unstructured":"U. A. Ciftci, I. Demir, L. Yin, How do the hearts of deep fakes beat? deep fake source detection via interpreting residuals with biological signals (2020).","DOI":"10.1109\/IJCB48548.2020.9304909"},{"key":"2629_CR6","unstructured":"J. Frank, T. Eisenhofer, L. Schonherr, A. Fischer, D. Kolossa, T. Holz, Leveraging frequency analysis for deep fake image recognition (2020)."},{"key":"2629_CR7","doi-asserted-by":"crossref","unstructured":"C.-C. Hsu, C.-Y. Lee, Y.-X. Zhuang, learning to detect fake face images in the wild, in: 2018 International Symposium on Computer, Consumer and Control (IS3C), IEEE, 2018, pp. 388\u2013391 24","DOI":"10.1109\/IS3C.2018.00104"},{"key":"2629_CR8","unstructured":"FaceForensics++: Learning to Detect Manipulated Facial Images-(Jan 2019)-Andreas R\u00f6ssler, DavideCozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, Matthias Nie\u00dfner"},{"key":"2629_CR9","unstructured":"Celeb-DF: A Large-scale Challenging Dataset for DeepFake Forensics- (Aug,2020)-Yuezun Li, Xin Yang, Pu Sun, Honggang Qi, SiweiLyu"},{"key":"2629_CR10","unstructured":"Unmasking DeepFakes with simple Features-(Nov,2019)-Ricard Durall, Margret Keuper, Franz-Josef Pfreundt, Janis Keuper"},{"key":"2629_CR11","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jvcir.2017.09.003","volume":"49","author":"M Barni","year":"2017","unstructured":"Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S. Aligned and nonaligned double jpeg detection using convolutional neural networks. J Vis Commun Image Represent. 2017;49:153\u201363.","journal-title":"J Vis Commun Image Represent"},{"key":"2629_CR12","doi-asserted-by":"crossref","unstructured":"B. Bayar and M. C. Stamm. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pages 5\u201310. ACM, 2016.","DOI":"10.1145\/2909827.2930786"},{"key":"2629_CR13","doi-asserted-by":"crossref","unstructured":"Shobana M, Shanmuganathan C, Challa NP, Ramya S. An optimized hybrid deep neural network architecture for intrusion detection in real-time IoT networks. Transaction on Emerging Telecommunication Technologies, Vol. 33,\u00a0Issue 12, 2022.","DOI":"10.1002\/ett.4609"},{"key":"2629_CR14","doi-asserted-by":"crossref","unstructured":"N. Rahmouni, V. Nozick, J. Yamagishi, and I. Echizen. Distinguishing computer graphics from natural images using convolution neural networks. In IEEE Workshop on Information Forensics and Security, WIFS 2017.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"2629_CR15","doi-asserted-by":"crossref","unstructured":"Chen, B.; Liu, X.; Zheng, Y.; Zhao, G.; Shi, Y.Q. A robust GAN-generated face detection method based on dual-color spaces and an improved Xception.\u00a0IEEE Trans. Circuits Syst. Video Technol.\u00a02021.","DOI":"10.1109\/TCSVT.2021.3116679"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02629-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02629-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02629-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T20:06:59Z","timestamp":1709928419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02629-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,4]]},"references-count":15,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["2629"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02629-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,4]]},"assertion":[{"value":"26 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"301"}}