{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T07:31:01Z","timestamp":1767079861002,"version":"3.48.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Project of the Military University of Technology Titled: \u201cNew Neural Network Architectures for Signal and Data Processing in Radiocommunications and Multimedia.\u201d","award":["22-054\/2025"],"award-info":[{"award-number":["22-054\/2025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3638457","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:44:00Z","timestamp":1764355440000},"page":"215911-215928","source":"Crossref","is-referenced-by-count":0,"title":["RE-Mark: An Identity-Recovery Watermarking Method for Undoing Deepfake Face-Swap"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1726-7804","authenticated-orcid":false,"given":"Tomasz","family":"Walczyna","sequence":"first","affiliation":[{"name":"Electronics and Telecommunications Faculty, Military University of Technology, Warsaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6622-534X","authenticated-orcid":false,"given":"Jacek M.","family":"Zurada","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, University of Louisville, Louisville, KY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3556-0297","authenticated-orcid":false,"given":"Zbigniew","family":"Piotrowski","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Faculty, Military University of Technology, Warsaw, Poland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Deep insights of deepfake technology: A review","author":"Mahmud","year":"2021","journal-title":"arXiv:2105.00192"},{"volume-title":"U.S. Special Forces Want to Use Deepfakes for PSY-OPS","year":"2023","author":"Biddle","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-021-00459-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1520"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11733-y"},{"key":"ref6","article-title":"The coding limits of robust watermarking for generative models","author":"Francati","year":"2025","journal-title":"arXiv:2509.10577"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake detection: A systematic literature review","volume":"10","author":"Rana","year":"2022","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"issue":"11","key":"ref9","doi-asserted-by":"crossref","first-page":"6711","DOI":"10.3390\/app13116711","article-title":"Quick overview of face swap deep fakes","volume":"13","author":"Walczyna","year":"2023","journal-title":"Appl. Sci."},{"key":"ref10","article-title":"FaceGuard: Proactive deepfake detection","author":"Yang","year":"2021","journal-title":"arXiv:2109.05673"},{"key":"ref11","article-title":"FaceSigns: Semi-fragile neural watermarks for media authentication and countering deepfakes","author":"Neekhara","year":"2022","journal-title":"arXiv:2204.01960"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475518"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3700146"},{"key":"ref14","article-title":"StarGAN v2: Diverse image synthesis for multiple domains","author":"Choi","year":"2019","journal-title":"arXiv:1912.01865"},{"key":"ref15","article-title":"Diffusion models beat GANs on image synthesis","author":"Dhariwal","year":"2021","journal-title":"arXiv:2105.05233"},{"issue":"22","key":"ref16","doi-asserted-by":"crossref","first-page":"10681","DOI":"10.3390\/app142210681","article-title":"Change and detection of emotions expressed on people\u2019s faces in photos","volume":"14","author":"Piotrowski","year":"2024","journal-title":"Appl. Sci."},{"issue":"5","key":"ref17","doi-asserted-by":"crossref","first-page":"3100","DOI":"10.3390\/app13053100","article-title":"Overview of voice conversion methods based on deep learning","volume":"13","author":"Walczyna","year":"2023","journal-title":"Appl. Sci."},{"issue":"2","key":"ref18","doi-asserted-by":"crossref","first-page":"881","DOI":"10.3390\/app15020881","article-title":"Detection of manipulations in digital images: A review of passive and active methods utilizing deep learning","volume":"15","author":"Duszejko","year":"2025","journal-title":"Appl. Sci."},{"key":"ref19","article-title":"How generalizable are deepfake image detectors? An empirical study","author":"Li","year":"2023","journal-title":"arXiv:2308.04177"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","article-title":"DeepFake detection for human face images and videos: A survey","volume":"10","author":"Malik","year":"2022","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09974-4"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1109\/WACV56688.2023.00458","volume-title":"Proactive Deepfake Defence Via Identity Watermarking","author":"Zhao","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"ref24","first-page":"1786","article-title":"Detecting deepfake videos using digital watermarking","volume-title":"Proc. Asia\u2013Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA ASC)","author":"Qureshi"},{"key":"ref25","article-title":"Densely connected convolutional networks","author":"Huang","year":"2016","journal-title":"arXiv:1608.06993"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1908.08681"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3196668"},{"key":"ref31","article-title":"FaceShifter: Towards high fidelity and occlusion aware face swapping","author":"Li","year":"2019","journal-title":"arXiv:1912.13457"},{"issue":"5","key":"ref32","doi-asserted-by":"crossref","first-page":"2149","DOI":"10.3390\/app14052149","article-title":"Fast fake: Easy-to-train face swap model","volume":"14","author":"Walczyna","year":"2024","journal-title":"Appl. Sci."},{"key":"ref33","article-title":"Denoising diffusion probabilistic models","author":"Ho","year":"2020","journal-title":"arXiv:2006.11239"},{"key":"ref34","article-title":"VGGFace2: A dataset for recognising faces across pose and age","author":"Cao","year":"2017","journal-title":"arXiv:1710.08092"},{"volume-title":"Deepinsight\/Insightface","year":"2025","key":"ref35"},{"key":"ref36","first-page":"2366","article-title":"Image quality metrics: PSNR vs. SSIM","volume-title":"Proc. 20th Int. Conf. Pattern Recognit.","author":"Hor\u00e9"},{"issue":"4","key":"ref37","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3087709"},{"volume-title":"Hacksider\/Deep-Live-Cam","year":"2025","author":"Estanislao","key":"ref39"},{"volume-title":"WaterLo: Protect Images From Deepfakes Using Localized Semi-Fragile Watermark","year":"2023","author":"Beuve","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18280\/mmep.110920"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11271225.pdf?arnumber=11271225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T07:27:07Z","timestamp":1767079627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11271225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3638457","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}