{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:32:35Z","timestamp":1769751155201,"version":"3.49.0"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR202208310038"],"award-info":[{"award-number":["ZR202208310038"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62120106009"],"award-info":[{"award-number":["62120106009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19361212"],"award-info":[{"award-number":["U19361212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1016\/j.image.2023.117010","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T11:34:17Z","timestamp":1688729657000},"page":"117010","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Magnifying multimodal forgery clues for Deepfake detection"],"prefix":"10.1016","volume":"118","author":[{"given":"Xiaolong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.image.2023.117010_b1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","article-title":"Deepfakes and beyond: A survey of face manipulation and fake detection","volume":"64","author":"Tolosana","year":"2020","journal-title":"Inf. Fusion"},{"issue":"5","key":"10.1016\/j.image.2023.117010_b2","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Sign. Proces."},{"key":"10.1016\/j.image.2023.117010_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2022.116695","article-title":"Hybrid deep-learning framework for object-based forgery detection in video","volume":"105","author":"Tan","year":"2022","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2023.117010_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2022.116756","article-title":"Autoregressive-elephant herding optimization based generative adversarial network for copy-move forgery detection with interval type-2 fuzzy clustering","author":"Ganeshan","year":"2022","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2023.117010_b5","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.image.2018.07.012","article-title":"Blind image splicing detection via noise level function","volume":"68","author":"Zhu","year":"2018","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2023.117010_b6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.image.2018.04.011","article-title":"Locating splicing forgery by fully convolutional networks and conditional random field","volume":"66","author":"Liu","year":"2018","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.image.2023.117010_b7","series-title":"The deepfake detection challenge dataset","author":"Dolhansky","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b8","series-title":"FakeAVCeleb: a novel audio-video multimodal deepfake dataset","author":"Khalid","year":"2021"},{"key":"10.1016\/j.image.2023.117010_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2022.108558","article-title":"Evading generated-image detectors: A deep dithering approach","volume":"197","author":"Xie","year":"2022","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2023.117010_b10","series-title":"Exposing deepfake videos by detecting face warping artifacts","author":"Li","year":"2018"},{"key":"10.1016\/j.image.2023.117010_b11","series-title":"IEEE WACVW","first-page":"83","article-title":"Exploiting visual artifacts to expose deepfakes and face manipulations","author":"Matern","year":"2019"},{"key":"10.1016\/j.image.2023.117010_b12","series-title":"IEEE WIFS","first-page":"1","article-title":"Mesonet: a compact facial video forgery detection network","author":"Afchar","year":"2018"},{"key":"10.1016\/j.image.2023.117010_b13","series-title":"Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces","author":"Wang","year":"2019"},{"key":"10.1016\/j.image.2023.117010_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107616","article-title":"Identification of deep network generated images using disparities in color components","volume":"174","author":"Li","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.image.2023.117010_b15","series-title":"European Conference on Computer Vision","first-page":"86","article-title":"Thinking in frequency: Face forgery detection by mining frequency-aware clues","author":"Qian","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b16","series-title":"International Conference on Machine Learning","first-page":"3247","article-title":"Leveraging frequency analysis for deep fake image recognition","author":"Frank","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b17","doi-asserted-by":"crossref","unstructured":"Y. Luo, Y. Zhang, J. Yan, W. Liu, Generalizing Face Forgery Detection with High-frequency Features, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 16317\u201316326.","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"10.1016\/j.image.2023.117010_b18","doi-asserted-by":"crossref","unstructured":"H. Zhao, W. Zhou, D. Chen, T. Wei, W. Zhang, N. Yu, Multi-attentional deepfake detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2185\u20132194.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"10.1016\/j.image.2023.117010_b19","series-title":"IEEE CVPR","first-page":"772","article-title":"Spatial-phase shallow learning: rethinking face forgery detection in frequency domain","author":"Liu","year":"2021"},{"key":"10.1016\/j.image.2023.117010_b20","doi-asserted-by":"crossref","unstructured":"X. Zhu, H. Wang, H. Fei, Z. Lei, S.Z. Li, Face Forgery Detection by 3D Decomposition, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2929\u20132939.","DOI":"10.1109\/CVPR46437.2021.00295"},{"key":"10.1016\/j.image.2023.117010_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2021.107950","article-title":"PRRNet: Pixel-Region relation network for face forgery detection","volume":"116","author":"Shang","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.image.2023.117010_b22","series-title":"IEEE WIFS","first-page":"1","article-title":"In ictu oculi: Exposing ai created fake videos by detecting eye blinking","author":"Li","year":"2018"},{"key":"10.1016\/j.image.2023.117010_b23","article-title":"Fakecatcher: Detection of synthetic portrait videos using biological signals","author":"Ciftci","year":"2020","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.image.2023.117010_b24","doi-asserted-by":"crossref","unstructured":"H. Qi, Q. Guo, F. Juefei-Xu, X. Xie, L. Ma, W. Feng, Y. Liu, J. Zhao, DeepRhythm: exposing deepfakes with attentional visual heartbeat rhythms, in: Proceedings of the 28th ACM International Conference on Multimedia, 2020, pp. 4318\u20134327.","DOI":"10.1145\/3394171.3413707"},{"key":"10.1016\/j.image.2023.117010_b25","series-title":"ACM MM","first-page":"1864","article-title":"Sharp multiple instance learning for deepfake video detection","author":"Li","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b26","series-title":"IEEE AVSS","first-page":"1","article-title":"Deepfake video detection using recurrent neural networks","author":"G\u00fcera","year":"2018"},{"key":"10.1016\/j.image.2023.117010_b27","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.neucom.2021.06.061","article-title":"Unnoticeable synthetic face replacement for image privacy protection","volume":"457","author":"Kuang","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.image.2023.117010_b28","doi-asserted-by":"crossref","unstructured":"A. Haliassos, K. Vougioukas, S. Petridis, M. Pantic, Lips Don\u2019t Lie: A Generalisable and Robust Approach To Face Forgery Detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 5039\u20135049.","DOI":"10.1109\/CVPR46437.2021.00500"},{"key":"10.1016\/j.image.2023.117010_b29","doi-asserted-by":"crossref","unstructured":"Y. Zheng, J. Bao, D. Chen, M. Zeng, F. Wen, Exploring Temporal Coherence for More General Video Face Forgery Detection, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 15044\u201315054.","DOI":"10.1109\/ICCV48922.2021.01477"},{"key":"10.1016\/j.image.2023.117010_b30","doi-asserted-by":"crossref","unstructured":"S.A. Khan, H. Dai, Video Transformer for Deepfake Detection with Incremental Learning, in: Proceedings of the 29th ACM International Conference on Multimedia, 2021, pp. 1821\u20131828.","DOI":"10.1145\/3474085.3475332"},{"key":"10.1016\/j.image.2023.117010_b31","series-title":"M2TR: Multi-modal multi-scale transformers for deepfake detection","author":"Wang","year":"2021"},{"key":"10.1016\/j.image.2023.117010_b32","doi-asserted-by":"crossref","unstructured":"Z. Gu, Y. Chen, T. Yao, S. Ding, J. Li, F. Huang, L. Ma, Spatiotemporal Inconsistency Learning for DeepFake Video Detection, in: Proceedings of the 29th ACM International Conference on Multimedia, 2021, pp. 3473\u20133481.","DOI":"10.1145\/3474085.3475508"},{"key":"10.1016\/j.image.2023.117010_b33","series-title":"ACM MM","first-page":"439","article-title":"Not made for each other-audio-visual dissonance-based deepfake detection and localization","author":"Chugh","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b34","series-title":"ACM MM","first-page":"2823","article-title":"Emotions don\u2019t Lie: An audio-visual deepfake detection method using affective cues","author":"Mittal","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b35","series-title":"Self-supervised transformer for deepfake detection","author":"Zhao","year":"2022"},{"key":"10.1016\/j.image.2023.117010_b36","doi-asserted-by":"crossref","unstructured":"Y. Zhou, S.-N. Lim, Joint Audio-Visual Deepfake Detection, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2021, pp. 14800\u201314809.","DOI":"10.1109\/ICCV48922.2021.01453"},{"key":"10.1016\/j.image.2023.117010_b37","doi-asserted-by":"crossref","unstructured":"A. Haliassos, R. Mira, S. Petridis, M. Pantic, Leveraging Real Talking Faces via Self-Supervision for Robust Forgery Detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 14950\u201314962.","DOI":"10.1109\/CVPR52688.2022.01453"},{"key":"10.1016\/j.image.2023.117010_b38","series-title":"Deepfakes: a new threat to face recognition? assessment and detection","author":"Korshunov","year":"2018"},{"key":"10.1016\/j.image.2023.117010_b39","series-title":"IEEE ICCV","first-page":"1","article-title":"Faceforensics++: Learning to detect manipulated facial images","author":"Rossler","year":"2019"},{"key":"10.1016\/j.image.2023.117010_b40","doi-asserted-by":"crossref","unstructured":"Y. Li, X. Yang, P. Sun, H. Qi, S. Lyu, Celeb-df: A large-scale challenging dataset for deepfake forensics, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 3207\u20133216.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"10.1016\/j.image.2023.117010_b41","doi-asserted-by":"crossref","unstructured":"L. Jiang, R. Li, W. Wu, C. Qian, C.C. Loy, Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 2889\u20132898.","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"10.1016\/j.image.2023.117010_b42","doi-asserted-by":"crossref","unstructured":"B. Zi, M. Chang, J. Chen, X. Ma, Y.-G. Jiang, WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection, in: Proceedings of the 28th ACM International Conference on Multimedia, 2020, pp. 2382\u20132390.","DOI":"10.1145\/3394171.3413769"},{"key":"10.1016\/j.image.2023.117010_b43","doi-asserted-by":"crossref","unstructured":"J. Pu, N. Mangaokar, L. Kelly, P. Bhattacharya, K. Sundaram, M. Javed, B. Wang, B. Viswanath, Deepfake videos in the wild: Analysis and detection, in: Proceedings of the Web Conference 2021, 2021, pp. 981\u2013992.","DOI":"10.1145\/3442381.3449978"},{"key":"10.1016\/j.image.2023.117010_b44","doi-asserted-by":"crossref","unstructured":"T. Zhou, W. Wang, Z. Liang, J. Shen, Face forensics in the wild, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 5778\u20135788.","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"10.1016\/j.image.2023.117010_b45","doi-asserted-by":"crossref","unstructured":"Y. He, B. Gan, S. Chen, Y. Zhou, G. Yin, L. Song, L. Sheng, J. Shao, Z. Liu, Forgerynet: A versatile benchmark for comprehensive forgery analysis, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 4360\u20134369.","DOI":"10.1109\/CVPR46437.2021.00434"},{"key":"10.1016\/j.image.2023.117010_b46","series-title":"IEEE CVPRW","article-title":"Faketalkerdetect: Effective and practical realistic neural talking head detection with a highly unbalanced dataset","author":"Jeon","year":"2019"},{"key":"10.1016\/j.image.2023.117010_b47","doi-asserted-by":"crossref","unstructured":"P. Kwon, J. You, G. Nam, S. Park, G. Chae, Kodf: A large-scale korean deepfake detection dataset, in: Proceedings of the IEEE\/CVF ICCV, 2021, pp. 10744\u201310753.","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"10.1016\/j.image.2023.117010_b48","series-title":"Faceswap","author":"MarekKowalski","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b49","series-title":"DeepFaceLab: A simple, flexible and extensible face swapping framework","author":"Perov","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b50","doi-asserted-by":"crossref","unstructured":"Y. Nirkin, Y. Keller, T. Hassner, Fsgan: Subject agnostic face swapping and reenactment, in: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2019, pp. 7184\u20137193.","DOI":"10.1109\/ICCV.2019.00728"},{"key":"10.1016\/j.image.2023.117010_b51","article-title":"First order motion model for image animation","volume":"32","author":"Siarohin","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.image.2023.117010_b52","series-title":"Audio-driven talking face video generation with learning-based personalized head pose","author":"Yi","year":"2020"},{"key":"10.1016\/j.image.2023.117010_b53","doi-asserted-by":"crossref","unstructured":"K. Prajwal, R. Mukhopadhyay, V.P. Namboodiri, C. Jawahar, A lip sync expert is all you need for speech to lip generation in the wild, in: Proceedings of the 28th ACMMM, 2020, pp. 484\u2013492.","DOI":"10.1145\/3394171.3413532"},{"key":"10.1016\/j.image.2023.117010_b54","series-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596523000929?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596523000929?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T05:40:26Z","timestamp":1760334026000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596523000929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":54,"alternative-id":["S0923596523000929"],"URL":"https:\/\/doi.org\/10.1016\/j.image.2023.117010","relation":{},"ISSN":["0923-5965"],"issn-type":[{"value":"0923-5965","type":"print"}],"subject":[],"published":{"date-parts":[[2023,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Magnifying multimodal forgery clues for Deepfake detection","name":"articletitle","label":"Article Title"},{"value":"Signal Processing: Image Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.image.2023.117010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"117010"}}