{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:18:31Z","timestamp":1773008311103,"version":"3.50.1"},"reference-count":36,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T00:00:00Z","timestamp":1739404800000},"content-version":"vor","delay-in-days":43,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006020"],"award-info":[{"award-number":["62006020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171042"],"award-info":[{"award-number":["62171042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102033"],"award-info":[{"award-number":["62102033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Biometrics"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection. Motivated by this inspiration, we propose a wavelet\u2010based texture mining and enhancement framework for face forgery detection. First, we introduce a frequency\u2010guided texture enhancement (FGTE) module that mining the high\u2010frequency information to improve the network\u2019s extraction of effective texture features. Next, we propose a global\u2013local feature refinement (GLFR) module to enhance the model\u2019s leverage of both global semantic features and local texture features. Moreover, the interactive fusion module (IFM) is designed to fully incorporate the enhanced texture clues with spatial features. The proposed method has been extensively evaluated on five public datasets, such as FaceForensics++ (FF++), deepfake (DF) detection (DFD) challenge (DFDC), Celeb\u2010DFv2, DFDC preview (DFDC\u2010P), and DFD, for face forgery detection, yielding promising performance within and cross dataset experiments.<\/jats:p>","DOI":"10.1049\/bme2\/2217175","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T10:30:07Z","timestamp":1739442607000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Wavelet\u2010Based Texture Mining and Enhancement for Face Forgery Detection"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1190-3535","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9692-4262","authenticated-orcid":false,"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3340-4215","authenticated-orcid":false,"given":"Bingxin","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2314-5272","authenticated-orcid":false,"given":"Hongzhe","family":"Liu","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"crossref","unstructured":"LiL. BaoJ. andZhangT. et al.Face X-Ray for More General Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2020 Seattle WA USA IEEE 5001\u20135010.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_2_11_2_2","doi-asserted-by":"crossref","unstructured":"LiuZ. QiX. andTorrP. H. Global Texture Enhancement for Fake face Detection in the Wild Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition IEEE 2020 Seattle WA USA 8060\u20138069.","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"e_1_2_11_3_2","doi-asserted-by":"crossref","unstructured":"FeiJ. DaiY. YuP. ShenT. XiaZ. andWengJ. Learning Second Order Local Anomaly for General Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2022 New Orleans LA USA {IEEE Computer Society 20270\u201320280.","DOI":"10.1109\/CVPR52688.2022.01963"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"GuillaroF. CozzolinoD. SudA. DufourN. andVerdolivaL. Trufor: Leveraging All-Round Clues For Trustworthy Image Forgery Detection and Localization Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2023 Los Alamitos CA USA IEEE Computer Society 20606\u201320615.","DOI":"10.1109\/CVPR52729.2023.01974"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"ChenP. LiuJ. andLiangT. et al.Dlfmnet: End-to-End Detection and Localization of Face Manipulation Using Multi-Domain Features 2021 IEEE International Conference on Multimedia and Expo (ICME). IEEE 2021 Los Alamitos CA USA IEEE Computer Society 1\u20136.","DOI":"10.1109\/ICME51207.2021.9428450"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169921"},{"key":"e_1_2_11_7_2","unstructured":"FrankJ. EisenhoferT. FischerA. SchonherrL. KolossaD. andHolzT. Leveraging Frequency Analysis for Deep Fake Image Recognition International Conference on Machine Learning 2020 PMLR 3247\u20133258."},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7080128"},{"key":"e_1_2_11_9_2","first-page":"3022","volume-title":"Advances in Neural Information Processing Systems","author":"Dzanic T.","year":"2020"},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","unstructured":"AgarwalA. AgarwalA. SinhaS. VatsaM. andSinghR. MD-CSDnetwork: Multi-Domain Cross Stitched Network for Deepfake Detection 2021 16th IEEE international Conference on Automatic Face and Gesture Recognition (FG 2021) 2021 Jodhpur India IEEE 1\u20138.","DOI":"10.1109\/FG52635.2021.9666937"},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"LiuH. LiX. andZhouW. et al.Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 Nashville TN USA IEEE 772\u2013781.","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"LiJ. XieH. LiJ. WangZ. andZhangY. Frequencyaware Discriminative Feature Learning Supervised by Single-Center Loss for Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 Los Alamitos CA USA IEEE Computer Society 6458\u20136467.","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25658"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198275"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233774"},{"key":"e_1_2_11_17_2","doi-asserted-by":"crossref","unstructured":"LuoY. ZhangY. YanJ. andLiuW. Generalizing Face Forgery Detection With High-Frequency Features Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 Nashville TN USA IEEE 16317\u201316326.","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.62762\/TIS"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.62762\/TSCC.2024.989358"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"ChenH. LinY. andLiB. Exposing Face Forgery Clues Via Retinex-Based Image Enhancement Proceedings of the Asian Conference on Computer Vision 2022 Cham Springer 602\u2013617.","DOI":"10.1007\/978-3-031-26316-3_2"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3186803"},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"KimD.-K.andKimK.-S. Generalized Facial Manipulation Detection With Edge Region Feature Extraction Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision 2022 Waikoloa HI USA IEEE 2828\u20132838.","DOI":"10.1109\/WACV51458.2022.00284"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"DengJ. GuoJ. VerverasE. KotsiaI. andZafeiriouS. Retinaface: Single-Shot Multi-Level Face Localisation in the Wild Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2020 Seattle WA IEEE 5203\u20135212.","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"CholletF. Xception: Deep Learning with Depthwise Separable Convolutions Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition IEEE Computer Society 2017 Los Alamitos CA USA 1251\u20131258.","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_2_11_25_2","unstructured":"TanM.andLeQ. Efficientnet: Rethinking Model Scaling for Convolutional Neural Networks International Conference on Machine learning. PMLR 2019 Long Beach SCIRP 6105\u20136114."},{"key":"e_1_2_11_26_2","unstructured":"TanM.andLeQ. Efficientnetv2: Smaller Models and Faster Training International Conference on Machine Learning 2021 PMLR 10096\u201310106."},{"key":"e_1_2_11_27_2","doi-asserted-by":"crossref","unstructured":"QianY. YinG. ShengL. ChenZ. andShaoJ. Thinking in frequency: Face Forgery Detection by Mining Frequency-Aware Clues European Conference on Computer Vision 2020 Cham Springer 86\u2013103.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3086109"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"ZhaoH. ZhouW. ChenD. WeiT. ZhangW. andYuN. Multi-Attentional Deepfake Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2021 Los Alamitos CA USA IEEE Computer Society 2185\u20132194.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"e_1_2_11_32_2","doi-asserted-by":"crossref","unstructured":"WangJ. WuZ. andOuyangW. et al.M2tr: Multi-Modal Multi-Scale Transformers For Deepfake Detection Proceedings of the 2022 International Conference on Multimedia Retrieval 2022 New York NY USA Association for Computing Machinery 615\u2013623.","DOI":"10.1145\/3512527.3531415"},{"key":"e_1_2_11_33_2","doi-asserted-by":"crossref","unstructured":"CaoJ. MaC. YaoT. ChenS. DingS. andYang End-To-End Reconstruction-Classification Learning for Face Forgery Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2022 Los Alamitos CA USA {IEEE Computer Society 4113\u20134122.","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119361"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3289147"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"WangY. YuK. ChenC. HuX. andPengS. Dynamic Graph Learning with Content-Guided Spatial-Frequency Relation Reasoning for Deepfake Detection Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2023 Vancouver BC Canada IEEE 7278\u20137287.","DOI":"10.1109\/CVPR52729.2023.00703"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2\/2217175","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/bme2\/2217175","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/bme2\/2217175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:19:16Z","timestamp":1773001156000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/bme2\/2217175"}},"subtitle":[],"editor":[{"given":"Vincenzo","family":"Conti","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/bme2\/2217175"],"URL":"https:\/\/doi.org\/10.1049\/bme2\/2217175","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-08-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2217175"}}