{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:24:06Z","timestamp":1758273846690},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T00:00:00Z","timestamp":1712793600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T00:00:00Z","timestamp":1712793600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,11]]},"DOI":"10.1109\/iwbf62628.2024.10593873","type":"proceedings-article","created":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T17:31:28Z","timestamp":1721669488000},"page":"01-06","source":"Crossref","is-referenced-by-count":4,"title":["Multi-Channel Cross Modal Detection of Synthetic Face Images"],"prefix":"10.1109","author":[{"given":"M.","family":"Ibsen","sequence":"first","affiliation":[{"name":"Hochschule Darmstadt,Biometrics and Security Research Group,Darmstadt,Germany,64295"}]},{"given":"C.","family":"Rathgeb","sequence":"additional","affiliation":[{"name":"Hochschule Darmstadt,Biometrics and Security Research Group,Darmstadt,Germany,64295"}]},{"given":"S.","family":"Marcel","sequence":"additional","affiliation":[{"name":"Idiap Research Institute,Biometrics Security and Privacy Group,Martigny,Switzerland,1920"}]},{"given":"C.","family":"Busch","sequence":"additional","affiliation":[{"name":"Hochschule Darmstadt,Biometrics and Security Research Group,Darmstadt,Germany,64295"}]}],"member":"263","reference":[{"volume-title":"Flickr-Faces-HQ Dataset (FFHQ)","year":"2024","key":"ref1"},{"key":"ref2","article-title":"Manipulated face detector: Joint spa-tial and frequency domain attention network","author":"Chen","year":"2020","journal-title":"arXiv e-prints"},{"key":"ref3","article-title":"Leveraging frequency analysis for deep fake image recognition","volume-title":"37th Intl Conf. on Machine Learning (ICML)","author":"Frank","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI48845.2019.8965991"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3450626.3459836"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_9"},{"key":"ref8","first-page":"1662","article-title":"Deepfake algorithm using multiple noise modalities with two-branch prediction network","volume-title":"Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","author":"Hsu","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"volume-title":"Information Tech-nology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization","year":"2023","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3362821"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP53989.2022.9922695"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2106.12423"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.11.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.3269"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2120481119"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948526"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335724"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"}],"event":{"name":"2024 12th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2024,4,11]]},"location":"Enschede, Netherlands","end":{"date-parts":[[2024,4,12]]}},"container-title":["2024 12th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10592864\/10592870\/10593873.pdf?arnumber=10593873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T04:35:55Z","timestamp":1721709355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10593873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwbf62628.2024.10593873","relation":{},"subject":[],"published":{"date-parts":[[2024,4,11]]}}}