{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:21:14Z","timestamp":1763533274933,"version":"3.45.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1109\/euvip66349.2025.11238824","type":"proceedings-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T18:43:00Z","timestamp":1763491380000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards Secure Authentication: Detecting Replay Attacks Via Compression Artifacts"],"prefix":"10.1109","author":[{"given":"Sahar","family":"Husseini","sequence":"first","affiliation":[{"name":"EURECOM,Department of Digital Security,Sophia Antipolis,France"}]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[{"name":"EURECOM,Department of Digital Security,Sophia Antipolis,France"}]}],"member":"263","reference":[{"key":"ref1","article-title":"On the pitfalls of videoconferences for challenge-based face liveness detection","volume-title":"proceedings of World Multi-Conference on Systemics, Cybernetics and Informatics","volume":"2021","author":"Carta","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.54808\/imcic2022.02.92"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"ref4","article-title":"Exploiting style latent flows for generalizing deepfake detection video detection","author":"Choi","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419206"},{"volume-title":"Exploring factors influencing internet users\u2019 susceptibility to deepfake phishing","year":"2024","author":"Gal","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1520"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP50544.2021.9484046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00044"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP51287.2024.10647245"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49660.2025.10887800"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2251632"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP49359.2023.10222775"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icpr48806.2021.9413139"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2025.3608643"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF62628.2024.10593932"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155400"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-024-00621-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3339825.3394937"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2012.6343425"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref29","first-page":"100","article-title":"The sjtu hdr video sequence dataset","volume-title":"Proceedings of International Conference on Quality of Multimedia Experience (QoMEX 2016)","author":"Song","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX.2013.6603201"},{"key":"ref31","article-title":"Striving for simplicity: The all convolutional net","author":"Springenberg","year":"2014","journal-title":"arXiv preprint arXiv"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23176"},{"issue":"146","key":"ref33","first-page":"10","article-title":"Converting video formats with ffmpeg","volume":"2006","author":"Tomar","year":"2006","journal-title":"Linux journal"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412641"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532610"},{"volume-title":"Video test media","year":"2024","key":"ref36"},{"key":"ref37","article-title":"Principles of designing robust remote face anti-spoofing systems","author":"Xu","year":"2024","journal-title":"arXiv preprint arXiv"}],"event":{"name":"2025 13th European Workshop on Visual Information Processing (EUVIP)","start":{"date-parts":[[2025,10,13]]},"location":"Valletta, Malta","end":{"date-parts":[[2025,10,16]]}},"container-title":["2025 13th European Workshop on Visual Information Processing (EUVIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11238262\/11238380\/11238824.pdf?arnumber=11238824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:19:47Z","timestamp":1763533187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11238824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/euvip66349.2025.11238824","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]}}}