{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:09:37Z","timestamp":1776107377136,"version":"3.50.1"},"reference-count":80,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1109\/ijcb48548.2020.9304936","type":"proceedings-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T11:58:35Z","timestamp":1610020715000},"page":"1-10","source":"Crossref","is-referenced-by-count":35,"title":["Leveraging edges and optical flow on faces for deepfake detection"],"prefix":"10.1109","author":[{"given":"Akash","family":"Chintha","sequence":"first","affiliation":[]},{"given":"Aishwarya","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Saniat","family":"Sohrawardi","sequence":"additional","affiliation":[]},{"given":"Kartavya","family":"Bhatt","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Raymond","family":"Ptucha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"Video-to-video synthesis. arxiv 2018","author":"wang","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref72","article-title":"Few-shot video-to-video synthesis","author":"wang","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2279"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00955"},{"key":"ref39","article-title":"Face x-ray for more general face forgery detection","author":"li","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053969"},{"key":"ref38","article-title":"Faceshifter: Towards high fidelity and occlusion aware face swapping","author":"li","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref78","article-title":"Makeittalk: Speaker-aware talking head animation","author":"zhou","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref79","first-page":"2223","author":"zhu","year":"2017","journal-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks"},{"key":"ref33","article-title":"Deepfakes: a new threat to face recognition? assessment and detection","author":"korshunov","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"ref31","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"JMLR"},{"key":"ref30","article-title":"Learning to discover cross-domain relations with generative adversarial networks","author":"kim","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107962"},{"key":"ref36","author":"kowalski","year":"0","journal-title":"Faceswap"},{"key":"ref35","article-title":"Fast face-swan usinz convolutional neural networks","author":"korshunova","year":"2017","journal-title":"ICCV"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_16"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref62","first-page":"7135","article-title":"First order motion model for image animation","author":"siarohin","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref61","article-title":"Interpreting the latent space of gans for semantic face editing","author":"shen","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref28","article-title":"Progressive growing of gans for improved quality, stability, and variation","author":"karras","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref63","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363269"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073640"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref2","article-title":"Detecting deep-fake videos from appearance and behavior","author":"agarwal","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref20","author":"durall lopez","year":"0","journal-title":"Unmasking DeepFakes with Simple Features"},{"key":"ref22","article-title":"Videoforensicshq: Detecting high-quality manipulated face videos","author":"fox","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1353\/tj.2018.0097"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref23","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_6"},{"key":"ref25","article-title":"Marionette: Few-shot face reenactment preserving identity of unseen targets","author":"ha","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref50","article-title":"Capsule-forensics: Using capsule networks to detect forged images and videos","author":"nguyen","year":"2018","journal-title":"arXiv prenrint"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_21"},{"key":"ref58","first-page":"1","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"sabir","year":"2019","journal-title":"Interfaces (GUI)"},{"key":"ref57","article-title":"Disrupting deepfakes: Adversarial attacks against conditional image translation net-works and facial manipulation systems","author":"ruiz","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref55","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2015","journal-title":"arXiv oreorint"},{"key":"ref54","article-title":"Deflecting adversarial attacks","author":"qin","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref53","article-title":"Invertible conditional gans for image editing","author":"perarnau","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref52","article-title":"Reducing malicious use of synthetic media research: Considerations and potential release practices for machine learning","author":"ovadya","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"ref11","article-title":"Manipulated face detector: Joint spatial and frequency domain attention network","author":"chen","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref40","article-title":"In ictu oculi: Exposing ai generated fake face videos by detecting eye blinking","author":"li","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.2999185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref15","article-title":"Fakecatcher: Detection of synthetic portrait videos using biological signals","author":"ciftci","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref16","article-title":"Forensictransfer: Weakly-supervised domain adaptation for forgery detection","author":"cozzolino","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref18","author":"denholtz","year":"0","journal-title":"Deep fake detection Non-facial feature cropping and a novel conditional loss function"},{"key":"ref19","article-title":"The deepfake detection challenge (dfdc) preview dataset","author":"dolhansky","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref4","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"0","journal-title":"CVPR Workshops"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"ref6","author":"bekci","year":"0","journal-title":"Cross-dataset face manipulation detection"},{"key":"ref5","article-title":"Deep-fake video detection through optical flow based cnn","author":"amerini","year":"0","journal-title":"The IEEE International Conference on Computer Vision (ICCV) Workshops"},{"key":"ref8","article-title":"The OpenCV Library","author":"bradski","year":"2000","journal-title":"Dr Dobb's Journal of Software Tools"},{"key":"ref7","article-title":"Video face manipulation detection through ensemble of cnns","author":"bonettini","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref46","article-title":"The creation and detection of deep-fakes: A survey","author":"mirsky","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref48","article-title":"Adversarial deepfakes: Evaluating vulnerability of deepfake detectors to adversarial examples","author":"neekhara","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00342"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01065"},{"key":"ref41","article-title":"Celeb-df: A new dataset for deepfake forensics","author":"li","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref44","author":"lu","year":"0","journal-title":"faceswap-gan"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-28"}],"event":{"name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","location":"Houston, TX, USA","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,1]]}},"container-title":["2020 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9304574\/9304852\/09304936.pdf?arnumber=9304936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:58:09Z","timestamp":1656439089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304936","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}