{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:44:30Z","timestamp":1725799470727},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484396","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Practical Face Swapping Detection Based on Identity Spatial Constraints"],"prefix":"10.1109","author":[{"given":"Jun","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, University of Chinese Academy of Sciences,Beijing,China,100049"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences,Beijing,China,100190"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bing","family":"Li","sequence":"additional","affiliation":[{"name":"National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences,Beijing,China,100190"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiming","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, University of Chinese Academy of Sciences,Beijing,China,100049"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00584"},{"key":"ref38","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","author":"sabir","year":"2019","journal-title":"cvprw"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"article-title":"DeepFaceLab: A simple, flexible and extensible face swapping framework","year":"2020","author":"perov","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"ref11","article-title":"How do the hearts of deep fakes beat? deep fake source detection via interpreting residuals with biological signals","author":"ciftci","year":"2020","journal-title":"IJCB"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"article-title":"Google AI Blog: Contributing Data to Deepfake Detection Research","year":"0","author":"dufour","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref17","article-title":"Deep detection for face manipulation","author":"feng","year":"2020","journal-title":"ICONIP"},{"key":"ref18","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"NeurIPS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref27","article-title":"Face X-Ray for more general face forgery detection","author":"li","year":"2020","journal-title":"CVPR"},{"journal-title":"faceswap-gan","year":"0","key":"ref3"},{"key":"ref6","article-title":"FSSPOTTER: Spotting face-swapped video by spatial and temporal clues","author":"chen","year":"2020","journal-title":"ICME"},{"key":"ref29","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"li","year":"2019","journal-title":"cvprw"},{"key":"ref5","article-title":"Protecting world leaders against deep fakes","author":"agarwal","year":"2019","journal-title":"cvprw"},{"key":"ref8","article-title":"Leveraging edges and optical flow on faces for deepfake detection","author":"chintha","year":"2020","journal-title":"IJCB"},{"key":"ref7","article-title":"MobileFaceNets: Efficient CNNs for accurate real-time face verification on mobile devices","author":"chen","year":"2018","journal-title":"CCBR"},{"journal-title":"Faceswap","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"journal-title":"Deepfake","year":"0","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00955"},{"key":"ref22","article-title":"Analyzing and improving the image quality of Style-GAN","author":"karras","year":"2020","journal-title":"CVPR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"ref42","article-title":"Face manipulation detection via auxiliary supervision","author":"wang","year":"2020","journal-title":"ICONIP"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987375"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/34.88573"},{"key":"ref23","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"ICLRE"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.397"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2021,8,4]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484396.pdf?arnumber=9484396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:30:27Z","timestamp":1659483027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484396","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}