{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:08:02Z","timestamp":1754161682232,"version":"3.41.2"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031995644"},{"type":"electronic","value":"9783031995651"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99565-1_18","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:34Z","timestamp":1753771354000},"page":"227-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Use of\u00a0Implicit Representations for\u00a0Deepfake Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6842-8009","authenticated-orcid":false,"given":"Miguel","family":"Le\u00e3o","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1854-049X","authenticated-orcid":false,"given":"Nuno","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., Echizen, I.: Mesonet: a compact facial video forgery detection network. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20137 (2018). https:\/\/doi.org\/10.1109\/WIFS.2018.8630761","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? A new model and the kinetics dataset. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4724\u20134733 (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.502","DOI":"10.1109\/CVPR.2017.502"},{"key":"18_CR3","unstructured":"Dolhansky, B., et al.: The deepfake detection challenge dataset. arXiv abs\/2006.07397 (2020)"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Dong, S., Wang, J., Ji, R., Liang, J., Fan, H., Ge, Z.: Implicit identity leakage: the stumbling block to improving deepfake detection generalization. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3994\u20134004 (2023). https:\/\/doi.org\/10.1109\/CVPR52729.2023.00389","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Gafni, G., Thies, J., Zollhofer, M., Niesner, M.: Dynamic neural radiance fields for monocular 4D facial avatar reconstruction. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8645\u20138654. IEEE Computer Society, Los Alamitos, CA, USA (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00854","DOI":"10.1109\/CVPR46437.2021.00854"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Ge, S., Mahapatra, A., Parmar, G., Zhu, J.Y., Huang, J.B.: On the content bias in Fr\u00e9chet video distance. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7277\u20137288. IEEE Computer Society, Los Alamitos, CA, USA (2024). https:\/\/doi.org\/10.1109\/CVPR52733.2024.00695","DOI":"10.1109\/CVPR52733.2024.00695"},{"key":"18_CR7","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014)"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Guo, Y., Chen, K., Liang, S., Liu, Y.J., Bao, H., Zhang, J.: Ad-nerf: audio driven neural radiance fields for talking head synthesis. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 5764\u20135774 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00573","DOI":"10.1109\/ICCV48922.2021.00573"},{"key":"18_CR9","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017)"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Huang, B., et al.: Implicit identity driven deepfake face swapping detection. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4490\u20134499 (2023). https:\/\/doi.org\/10.1109\/CVPR52729.2023.00436","DOI":"10.1109\/CVPR52729.2023.00436"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4396\u20134405 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00453","DOI":"10.1109\/CVPR.2019.00453"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of StyleGAN . In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8107\u20138116. IEEE Computer Society, Los Alamitos, CA, USA (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00813","DOI":"10.1109\/CVPR42600.2020.00813"},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TBIOM.2024.3407650","volume":"6","author":"F Khalid","year":"2024","unstructured":"Khalid, F., Javed, A., Malik, K.M., Irtaza, A.: Explanet: a descriptive framework for detecting deepfakes with interpretable prototypes. IEEE Trans. Biometrics Behav. Identity Sci. 6(4), 486\u2013497 (2024). https:\/\/doi.org\/10.1109\/TBIOM.2024.3407650","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1109\/TIFS.2023.3344293","volume":"19","author":"J Liu","year":"2024","unstructured":"Liu, J., Xie, J., Wang, Y., Zha, Z.J.: Adaptive texture and spectrum clue mining for generalizable face forgery detection. IEEE Trans. Inf. Forensics Secur. 19, 1922\u20131934 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3344293","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1109\/TIFS.2023.3332218","volume":"19","author":"A Luo","year":"2024","unstructured":"Luo, A., Kong, C., Huang, J., Hu, Y., Kang, X., Kot, A.C.: Beyond the prior forgery knowledge: mining critical clues for general face forgery detection. IEEE Trans. Inf. Forensics Secur. 19, 1168\u20131182 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3332218","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Melzi, P., et al.: Gandiffface: controllable generation of synthetic datasets for face recognition with realistic variations. In: 2023 IEEE\/CVF International Conference on Computer Vision Workshops (ICCVW), pp. 3078\u20133087 (2023). https:\/\/doi.org\/10.1109\/ICCVW60793.2023.00333","DOI":"10.1109\/ICCVW60793.2023.00333"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/3503250","volume":"65","author":"B Mildenhall","year":"2021","unstructured":"Mildenhall, B., Srinivasan, P.P., Tancik, M., Barron, J.T., Ramamoorthi, R., Ng, R.: Nerf: representing scenes as neural radiance fields for view synthesis. Commun. ACM 65(1), 99\u2013106 (2021). https:\/\/doi.org\/10.1145\/3503250","journal-title":"Commun. ACM"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Nirkin, Y., Keller, Y., Hassner, T.: Fsgan: subject agnostic face swapping and reenactment. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7183\u20137192 (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00728","DOI":"10.1109\/ICCV.2019.00728"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Oorloff, T., Yacoob, Y.: Robust one-shot face video re-enactment using hybrid latent spaces of stylegan2. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 20890\u201320900 (2023). https:\/\/doi.org\/10.1109\/ICCV51070.2023.01915","DOI":"10.1109\/ICCV51070.2023.01915"},{"issue":"3","key":"18_CR20","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TBIOM.2024.3391759","volume":"6","author":"H Otroshi Shahreza","year":"2024","unstructured":"Otroshi Shahreza, H., Marcel, S.: Template inversion attack using synthetic face images against real face recognition systems. IEEE Trans. Biometrics Behav. Identity Sci. 6(3), 374\u2013384 (2024). https:\/\/doi.org\/10.1109\/TBIOM.2024.3391759","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.1109\/TIFS.2024.3381823","volume":"19","author":"C Peng","year":"2024","unstructured":"Peng, C., Miao, Z., Liu, D., Wang, N., Hu, R., Gao, X.: Where deepfakes gaze at? Spatial-temporal gaze inconsistency analysis for video face forgery detection. IEEE Trans. Inf. Forensics Secur. 19, 4507\u20134517 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3381823","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Polyak, A., Wolf, L., Taigman, Y.: TTS skins: speaker conversion via ASR. In: Interspeech (2019)","DOI":"10.21437\/Interspeech.2020-1416"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1109\/TIFS.2024.3372803","volume":"19","author":"Z Qu","year":"2024","unstructured":"Qu, Z., Xi, Z., Lu, W., Luo, X., Wang, Q., Li, B.: DF-rap: a robust adversarial perturbation for defending against deepfakes in real-world social network scenarios. IEEE Trans. Inf. Forensics Secur. 19, 3943\u20133957 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3372803","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Ren, X., Chen, X., Yao, P., Shum, H.Y., Wang, B.: Reinforced disentanglement for face swapping without skip connection. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 20608\u201320618 (2023). https:\/\/doi.org\/10.1109\/ICCV51070.2023.01889","DOI":"10.1109\/ICCV51070.2023.01889"},{"key":"18_CR25","doi-asserted-by":"publisher","unstructured":"Schardong, G., et al.: Neural implicit morphing of face images. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7321\u20137330. IEEE Computer Society, Los Alamitos, CA, USA (2024). https:\/\/doi.org\/10.1109\/CVPR52733.2024.00699","DOI":"10.1109\/CVPR52733.2024.00699"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Shiohara, K., Yang, X., Taketomi, T.: Blendface: re-designing identity encoders for face-swapping. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7600\u20137610 (2023). https:\/\/doi.org\/10.1109\/ICCV51070.2023.00702","DOI":"10.1109\/ICCV51070.2023.00702"},{"key":"18_CR27","unstructured":"Sitzmann, V., Martel, J., Bergman, A., Lindell, D., Wetzstein, G.: Implicit neural representations with periodic activation functions. In: Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H. (eds.) Advances in Neural Information Processing Systems, vol.\u00a033, pp. 7462\u20137473. Curran Associates, Inc. (2020)"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Tan, C., Zhao, Y., Wei, S., Gu, G., Wei, Y.: Learning on gradients: generalized artifacts representation for GAN-generated images detection. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 12105\u201312114 (2023). https:\/\/doi.org\/10.1109\/CVPR52729.2023.01165","DOI":"10.1109\/CVPR52729.2023.01165"},{"key":"18_CR29","unstructured":"Unterthiner, T., van Steenkiste, S., Kurach, K., Marinier, R., Michalski, M., Gelly, S.: FVD: a new metric for video generation. In: DGS@ICLR (2019)"},{"key":"18_CR30","doi-asserted-by":"publisher","unstructured":"Wang, Y., Yu, K., Chen, C., Hu, X., Peng, S.: Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7278\u20137287 (2023). https:\/\/doi.org\/10.1109\/CVPR52729.2023.00703","DOI":"10.1109\/CVPR52729.2023.00703"},{"issue":"4","key":"18_CR31","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"key":"18_CR32","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TIFS.2022.3144878","volume":"17","author":"H Wu","year":"2022","unstructured":"Wu, H., Zhou, J., Tian, J., Liu, J., Qiao, Y.: Robust image forgery detection against transmission over online social networks. IEEE Trans. Inf. Forensics Secur. 17, 443\u2013456 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3144878","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"18_CR33","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1007\/s00371-023-02833-x","volume":"40","author":"J Wu","year":"2024","unstructured":"Wu, J., Zhu, Y., Jiang, X., Liu, Y., Lin, J.: Local attention and long-distance interaction of RPPG for deepfake detection. Vis. Comput. 40(2), 1083\u20131094 (2024). https:\/\/doi.org\/10.1007\/s00371-023-02833-x","journal-title":"Vis. Comput."},{"key":"18_CR34","doi-asserted-by":"publisher","first-page":"4046","DOI":"10.1109\/TIFS.2023.3290752","volume":"18","author":"Q Yin","year":"2023","unstructured":"Yin, Q., Lu, W., Li, B., Huang, J.: Dynamic difference learning with spatio-temporal correlation for deepfake video detection. IEEE Trans. Inf. Forensics Secur. 18, 4046\u20134058 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3290752","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Zakharov, E., Shysheya, A., Burkov, E., Lempitsky, V.: Few-shot adversarial learning of realistic neural talking head models. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 9458\u20139467 (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00955","DOI":"10.1109\/ICCV.2019.00955"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, W., Zhou, X., Cao, Y., Feng, W., Yuan, C.: Ma-nerf: motion-assisted neural radiance fields for face synthesis from sparse images. In: 2023 IEEE International Conference on Multimedia and Expo (ICME), pp. 1757\u20131762 (2023)","DOI":"10.1109\/ICME55011.2023.00302"},{"key":"18_CR37","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1109\/TIFS.2024.3461958","volume":"19","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., et al.: Genface: a large-scale fine-grained face forgery benchmark and cross appearance-edge learning. IEEE Trans. Inf. Forensics Secur. 19, 8559\u20138572 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3461958","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2023.3262156","volume":"18","author":"Y Zhu","year":"2023","unstructured":"Zhu, Y., et al.: Information-containing adversarial perturbation for combating facial manipulation systems. IEEE Trans. Inf. Forensics Secur. 18, 2046\u20132059 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3262156","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99565-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:38Z","timestamp":1753771358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99565-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031995644","9783031995651"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99565-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IbPRIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberian Conference on Pattern Recognition and Image Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibpria2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ibpria.org\/2025\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}