{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T15:40:46Z","timestamp":1774280446134,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3592358","type":"journal-article","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T17:56:37Z","timestamp":1753379797000},"page":"131980-131997","source":"Crossref","is-referenced-by-count":1,"title":["Compression-Aware Hybrid Framework for Deep Fake Detection in Low-Quality Video"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9196-1166","authenticated-orcid":false,"given":"Lagsoun Abdel","family":"Motalib","sequence":"first","affiliation":[{"name":"Department of Computer Sciences, Networks, and Telecoms (GIRT), Laboratory of Mathematics, Informatics, and Communication Systems (MISCOM), National School of Applied Sciences (ENSA), Cadi Ayyad University, Safi, Morocco"}]},{"given":"Oujaoura","family":"Mustapha","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, Networks, and Telecoms (GIRT), Laboratory of Mathematics, Informatics, and Communication Systems (MISCOM), National School of Applied Sciences (ENSA), Cadi Ayyad University, Safi, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7872-4469","authenticated-orcid":false,"given":"Hedabou","family":"Mustapha","sequence":"additional","affiliation":[{"name":"College of Computing, Mohammed VI Polytechnic University (UM6P), Ben Guerir, Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3344653"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3342107"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09288-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3386644"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icassp.2019.8683164"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icdh57206.2022.00046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4976848"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13570"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17586-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-025-01833-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3477257"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10810-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2025.3530402"},{"key":"ref14","article-title":"DeepFaceLab: Integrated, flexible and extensible face-swapping framework","author":"Perov","year":"2020","journal-title":"arXiv:2005.05535"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.54941\/ahfe1003290"},{"key":"ref16","article-title":"FaceShifter: Towards high fidelity and occlusion aware face swapping","author":"Li","year":"2019","journal-title":"arXiv:1912.13457"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref19","article-title":"A style-based generator architecture for generative adversarial networks","author":"Karras","year":"2018","journal-title":"arXiv:1812.04948"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00520"},{"key":"ref21","article-title":"Few-shot face image translation via GAN prior distillation","author":"Zhao","year":"2023","journal-title":"arXiv:2301.12257"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00618"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.01065"},{"key":"ref24","article-title":"Exposing DeepFake videos by detecting face warping artifacts","author":"Li","year":"2018","journal-title":"arXiv:1811.00656"},{"key":"ref25","article-title":"First order motion model for image animation","author":"Siarohin","year":"2020","journal-title":"arXiv:2003.00196"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_37"},{"key":"ref27","article-title":"FaceForensics: A large-scale video dataset for forgery detection in human faces","author":"R\u00f6ssler","year":"2018","journal-title":"arXiv:1803.09179"},{"key":"ref28","article-title":"Detecting deepfake videos: An analysis of three techniques","author":"Pishori","year":"2020","journal-title":"arXiv:2007.08517"},{"key":"ref29","article-title":"Exposing deep fakes using inconsistent head poses","author":"Yang","year":"2018","journal-title":"arXiv:1811.00661"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13010126"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tbiom.2021.3086109"},{"key":"ref32","article-title":"Exploring spatial\u2013temporal features for deepfake detection and localization","author":"Haiwei","year":"2022","journal-title":"arXiv:2210.15872"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2017.243"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_28"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2021.103170"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00222"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122691"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s21217367"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-34629-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301395"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2023.3299894"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109408"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07633-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/icm.2012.6471380"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00325"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-023-00614-z"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3566008"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123732"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.01605"},{"key":"ref54","article-title":"Video face manipulation detection through ensemble of CNNs","author":"Bonettini","year":"2020","journal-title":"arXiv:2004.07676"},{"key":"ref55","volume-title":"Deepfakes GitHub Repository","year":"2018"},{"key":"ref56","volume-title":"Faceswap GitHub Repository","author":"Kowalski","year":"2018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00512"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01468"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW58289.2023.00074"},{"key":"ref62","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"Chollet","year":"2016","journal-title":"arXiv:1610.02357"},{"key":"ref63","article-title":"Combining EfficientNet and vision transformers for video deepfake detection","author":"Coccomini","year":"2021","journal-title":"arXiv:2107.02612"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2016.2603342"},{"key":"ref65","volume-title":"DeepSwap: Online Face-Swapping Tool","year":"2025"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-025-11286-8"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.102993"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3390217"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01160-x"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-024-03567-0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00046"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11095666.pdf?arnumber=11095666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T04:43:33Z","timestamp":1754023413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11095666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3592358","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}