{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:08:49Z","timestamp":1769551729406,"version":"3.49.0"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9580031","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"01-08","source":"Crossref","is-referenced-by-count":9,"title":["A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods"],"prefix":"10.1109","author":[{"given":"Manish","family":"Khichi","sequence":"first","affiliation":[]},{"given":"Rajesh","family":"Kumar Yadav","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Deepfakestack: A deep ensemble-based learning technique for deepfake detection","author":"md shohel","year":"0","journal-title":"2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},{"key":"ref38","first-page":"6805","article-title":"ATTS2S-VC: Sequence-to-sequence voice conversion with attention and context preservation mechanisms","author":"kameoka","year":"0","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"key":"ref33","article-title":"Eyebrow Recognition for Identifying Deepfake Videos","author":"hoang mark","year":"0","journal-title":"2020 International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"ref31","article-title":"SDHF: Spotting DeepFakes with Hierarchical Features","author":"tao","year":"0","journal-title":"2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00870"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU46091.2019.9003845"},{"key":"ref36","article-title":"OC-FakeDect: Classifying deep-fakes using one-class variational autoencoder","author":"hasam","year":"0","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035360"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref60","first-page":"1024","article-title":"Recurrent convolutional structures for audio spoof and video deepfake detection","volume":"14 5","author":"akash","year":"2020","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"ref62","first-page":"2304","author":"bonettini","year":"2019","journal-title":"Image anonymization detection with deep handcrafted features"},{"key":"ref61","author":"ciftci","year":"2019","journal-title":"FakeCatcher Detection of Synthetic Portrait Videos using Biological Signals"},{"key":"ref63","article-title":"Fighting Deepfake by Residual Noise Using Convolutional Neural Networks","author":"rai","year":"0","journal-title":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)"},{"key":"ref28","author":"thies","year":"2019","journal-title":"Deferred neural rendering Image synthesis using neural textures"},{"key":"ref64","author":"bt","year":"2019","journal-title":"Towards robust audio spoofing detection A detailed comparison of traditional and learned features"},{"key":"ref27","first-page":"1","article-title":"Deep video portraits","author":"carrido","year":"2018","journal-title":"ACM Trans Graph"},{"key":"ref65","article-title":"A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling","author":"ali","year":"0","journal-title":"2020 International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref66","article-title":"Deepfake Detection with Clustering-based Embedding Regularization","author":"kui","year":"0","journal-title":"2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073640"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref20","year":"0","journal-title":"facebook deepfake detection dataset"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref21","author":"kowalski","year":"0","journal-title":"Faceswap"},{"key":"ref24","author":"park","year":"2017","journal-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks"},{"key":"ref23","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_18"},{"key":"ref25","author":"cha","year":"2017","journal-title":"Learning to discover cross-domain relations with generative adversarial networks"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2505"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref59","author":"dolhansky","year":"0","journal-title":"The Deepfake Detection Challenge (DFDC) Preview Dataset"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref56","first-page":"73","article-title":"Forged facial video detection based on global temporal and local spatial feature","volume":"5","author":"chen","year":"2020","journal-title":"Cyber Security"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref54","first-page":"1","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref52","author":"bonettini","year":"2020","journal-title":"Video face manipulation detection through ensemble of cnns"},{"key":"ref10","year":"0","journal-title":"Reface"},{"key":"ref11","year":"0","journal-title":"Morphing"},{"key":"ref40","article-title":"WaveNet: A generative model for raw audio","volume":"abs 1609 3499","author":"van den oord","year":"2016","journal-title":"CoRR"},{"key":"ref12","year":"0","journal-title":"Fakeapp"},{"key":"ref13","year":"0","journal-title":"Deepnude"},{"key":"ref14","year":"0","journal-title":"Speaking"},{"key":"ref15","year":"0","journal-title":"MyHeritage"},{"key":"ref16","article-title":"FaceForen- sics++: Learning to detect manipulated facial images","author":"r\u00f6ssler","year":"2019","journal-title":"ICCV"},{"key":"ref17","first-page":"3207","article-title":"Celeb-df: A large-scale challenging dataset for deepfake forensics","author":"li","year":"0","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref19","article-title":"A style-based generator architecture for generative adversarial networks","author":"tero","year":"0","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","year":"0","journal-title":"DeepFaceLab"},{"key":"ref5","year":"0","journal-title":"FaceApp"},{"key":"ref8","year":"0","journal-title":"Faceswap"},{"key":"ref7","year":"0","journal-title":"Zao"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref9","year":"0","journal-title":"DeepArt"},{"key":"ref46","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"li","year":"0","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"},{"key":"ref45","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"0","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-3174"},{"key":"ref41","article-title":"Deep-fake detection by analyzing convolutional traces","author":"luca","year":"0","journal-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref43","article-title":"In ictu oculi: Exposing AI generated fake face videos by detecting eye blinking","author":"li","year":"0","journal-title":"IEEE International Workshop on Information Forensics and Security (WIFS)"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2021,7,6]]},"end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09580031.pdf?arnumber=9580031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:44Z","timestamp":1652201744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9580031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9580031","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}