{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:08:43Z","timestamp":1775563723466,"version":"3.50.1"},"reference-count":14,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:00:00Z","timestamp":1772496000000},"content-version":"vor","delay-in-days":61,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.004","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"383-391","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["The Deepfake Litmus Test: A Multimedia Authenticity Mechanism"],"prefix":"10.1016","volume":"278","author":[{"given":"Amna","family":"Alzaabi","sequence":"first","affiliation":[]},{"given":"Hessa","family":"Alqubaisi","sequence":"additional","affiliation":[]},{"given":"Fatima","family":"Alzaabi","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ikuesan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.03.004_bib1","doi-asserted-by":"crossref","unstructured":"D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, \u201cMesoNet: a Compact Facial Video Forgery Detection Network,\u201d 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Dec. 2018, doi: https:\/\/doi.org\/10.1109\/wifs.2018.8630761.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"10.1016\/j.procs.2026.03.004_bib2","doi-asserted-by":"crossref","unstructured":"H. H. Nguyen, J. Yamagishi, and I. Echizen, \u201cCapsule-forensics: Using Capsule Networks to Detect Forged Images and Videos,\u201d ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2019, doi: https:\/\/doi.org\/10.1109\/icassp.2019.8682602.","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"10.1016\/j.procs.2026.03.004_bib3","doi-asserted-by":"crossref","unstructured":"D. Guera and E. J. Delp, \u201cDeepfake Video Detection Using Recurrent Neural Networks,\u201d 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Nov. 2018, doi: https:\/\/doi.org\/10.1109\/avss.2018.8639163.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"10.1016\/j.procs.2026.03.004_bib4","doi-asserted-by":"crossref","unstructured":"P. Zhou, X. Han, V. I. Morariu, and L. S. Davis, \u201cLearning Rich Features for Image Manipulation Detection,\u201d Computer Vision and Pattern Recognition, Jun. 2018, doi: https:\/\/doi.org\/10.1109\/cvpr.2018.00116.","DOI":"10.1109\/CVPR.2018.00116"},{"issue":"3","key":"10.1016\/j.procs.2026.03.004_bib5","doi-asserted-by":"crossref","first-page":"4285","DOI":"10.32604\/cmc.2024.057029","article-title":"\u201cAdvancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media,\u201d","volume":"81","author":"Alkurdi","year":"2024","journal-title":"Computers, Materials & Continua"},{"key":"10.1016\/j.procs.2026.03.004_bib6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","article-title":"\u201cDeepfakes and beyond: A Survey of face manipulation and fake detection,\u201d","volume":"64","author":"Tolosana","year":"2020","journal-title":"Information Fusion"},{"issue":"5","key":"10.1016\/j.procs.2026.03.004_bib7","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"\u201cMedia Forensics and DeepFakes: An Overview,\u201d","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"10.1016\/j.procs.2026.03.004_bib8","doi-asserted-by":"crossref","first-page":"79560","DOI":"10.1109\/ACCESS.2025.3566008","article-title":"\u201cA Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features,\u201d","volume":"13","author":"Zafar","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.03.004_bib9","unstructured":"Y. Li and S. Lyu, \u201cExposing DeepFake Videos By Detecting Face Warping Artifacts,\u201d arXiv:1811.00656 [cs], May 2019, Available: https:\/\/arxiv.org\/abs\/1811.00656"},{"key":"10.1016\/j.procs.2026.03.004_bib10","unstructured":"ISO\/IEC, Information technology\u2014Coding of audio-visual objects\u2014Part 12: ISO base media file format, ISO\/IEC 14496-12:2022, Jan. 2022."},{"key":"10.1016\/j.procs.2026.03.004_bib11","doi-asserted-by":"crossref","unstructured":"Z. Xiang, J\u00e1nos Horv\u00e1th, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, and E. J. Delp, \u201cForensic Analysis of Video Files Using Metadata,\u201d Jun. 2021, doi: https:\/\/doi.org\/10.1109\/cvprw53098.2021.00115.","DOI":"10.1109\/CVPRW53098.2021.00115"},{"key":"10.1016\/j.procs.2026.03.004_bib12","doi-asserted-by":"crossref","unstructured":"Y. Qian, G. Yin, L. Sheng, Z. Chen, and J. Shao, \u201cThinking in Frequency: Face Forgery Detection by Mining Frequency-aware Clues,\u201d arXiv (Cornell University), Jan. 2020, doi: https:\/\/doi.org\/10.48550\/arxiv.2007.09355.","DOI":"10.1007\/978-3-030-58610-2_6"},{"issue":"8","key":"10.1016\/j.procs.2026.03.004_bib13","doi-asserted-by":"crossref","first-page":"128","DOI":"10.3390\/jimaging7080128","article-title":"\u201cFighting deepfakes by detecting GAN DCT anomalies,\u201d","volume":"7","author":"Giudice","year":"2021","journal-title":"Journal of Imaging"},{"key":"10.1016\/j.procs.2026.03.004_bib14","doi-asserted-by":"crossref","unstructured":"Thing, \u201cDeepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers,\u201d Apr. 2023, doi: https:\/\/doi.org\/10.48550\/arxiv.2304.03698.","DOI":"10.1109\/CSR57506.2023.10225004"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600596X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600596X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:27:45Z","timestamp":1775561265000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705092600596X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":14,"alternative-id":["S187705092600596X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.004","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The Deepfake Litmus Test: A Multimedia Authenticity Mechanism","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}