{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T15:40:35Z","timestamp":1771861235454,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","award":["100l\/PELECT\/8014111"],"award-info":[{"award-number":["100l\/PELECT\/8014111"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,13]]},"DOI":"10.1109\/iicaiet55139.2022.9936838","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:44:15Z","timestamp":1668026655000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["A new face image manipulation reveal scheme based on face detection and image watermarking"],"prefix":"10.1109","author":[{"given":"Zahraa Aqeel","family":"Salih","sequence":"first","affiliation":[{"name":"Al-Iraqia University,Computer Engineering,Baghdad,Iraq"}]},{"given":"Rasha","family":"Thabit","sequence":"additional","affiliation":[{"name":"Dijlah University College,Computer Techniques Engineering,Baghdad,Iraq"}]},{"given":"Khamis A.","family":"Zidan","sequence":"additional","affiliation":[{"name":"Vice Rector of Al-Iraqia University for Scientific Affairs, Al-Iraqia University,Baghdad,Iraq"}]},{"given":"Bee Ee","family":"Khoo","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Engineering Campus Universiti Sains Malaysia,Nibong Tebal Penang,Malaysia,14300"}]}],"member":"263","reference":[{"key":"ref10","author":"papastratis","year":"2020","journal-title":"Deepfakes Face synthesis with GANs and Autoencoders"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_1"},{"key":"ref13","first-page":"154","volume":"9","author":"rathgeb","year":"2020","journal-title":"PRNU-based detection of facial retouching"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app11073207"},{"key":"ref15","first-page":"444","author":"scherhag","year":"2018","journal-title":"Detecting Morphed Face Images Using Facial Landmarks BT - Image and Signal Processing"},{"key":"ref16","volume":"abs l910 0","author":"korshunov","year":"2019","journal-title":"Vulnerability of face recognition to deep morphing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026072"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"ref6","article-title":"Deepfake videos double in nine months","author":"cellan-jones","year":"2019","journal-title":"BBC News Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.11.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100054"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsisyn.2022.100217"},{"key":"ref2","author":"bitesize","year":"2019","journal-title":"Deepfakes What are They and Why Would i Make One"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.03.026"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3055-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6020-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10421-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-4585-42-2_19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.12.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.09.033"}],"event":{"name":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","location":"Kota Kinabalu, Malaysia","start":{"date-parts":[[2022,9,13]]},"end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9936688\/9936734\/09936838.pdf?arnumber=9936838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T20:21:36Z","timestamp":1669666896000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9936838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iicaiet55139.2022.9936838","relation":{},"subject":[],"published":{"date-parts":[[2022,9,13]]}}}