{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:35Z","timestamp":1773511175893,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833860","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"59-65","source":"Crossref","is-referenced-by-count":17,"title":["Misleading Deep-Fake Detection with GAN Fingerprints"],"prefix":"10.1109","author":[{"given":"Vera","family":"Wesselkamp","sequence":"first","affiliation":[{"name":"Technische Universit&#x00E4;t Braunschweig,Germany"}]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t Braunschweig,Germany"}]},{"given":"Daniel","family":"Arp","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t Berlin,Germany"}]},{"given":"Erwin","family":"Quiring","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t Braunschweig,Germany"}]}],"member":"263","reference":[{"key":"ref38","article-title":"Making GAN-generated images difficult to spot: A new attack against synthetic image detectors","author":"zhao","year":"2021","journal-title":"arXiv 2104 12069"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"ref32","article-title":"Nvidia has created the first video game demo using AI-generated graphics","author":"vincent","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref30","article-title":"Deepfake bots create fake nudes of women, aid public shaming and extortion","author":"vahia","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref35","article-title":"LSUN: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"yu","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506273"},{"key":"ref10","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in Neural Information Proccessing Systems (NIPS)"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT50178.2020.9241108"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413732"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00019"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v35i2.16267","article-title":"Spectral distribution aware image generation","author":"jung","year":"2021","journal-title":"Proc of the AAAI Conference on Artificial Intelligence"},{"key":"ref16","article-title":"Progressive growing of GANs for improved quality, stability, and variation","author":"karras","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref18","article-title":"Deepfake Salvador Da?? takes selfies with museum visitors","author":"lee","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506775"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"ref27","article-title":"A high school student created a fake 2020 candidate","author":"o\u2019sullivan","year":"2020"},{"key":"ref3","article-title":"Demystifying MMD GANs","author":"bi?kowski","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref6","article-title":"SpoC: Spoofing camera fingerprints","author":"cozzolino","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7"},{"key":"ref5","article-title":"Facebook wouldn&#x2019;t delete an altered video of Nancy Pelosi. What about one of Mark Zuckerberg?","author":"chiu","year":"2019","journal-title":"Washington Post"},{"key":"ref8","article-title":"Unmasking deepfakes with simple features","author":"durall","year":"2020","journal-title":"arXiv 1911 00686"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref2","article-title":"The cramer distance as a solution to biased wasserstein gradients","author":"bellemare","year":"2017"},{"key":"ref9","article-title":"Leveraging frequency analysis for deep fake image recognition","author":"frank","year":"2020","journal-title":"Proc of International Conference on Machine Learning (ICML-05)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref20","article-title":"Large-scale celebfaces attributes (CelebA) dataset","author":"liu","year":"2015"},{"key":"ref22","article-title":"Spectral normalization for generative adversarial networks","author":"miyato","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3007250"},{"key":"ref23","article-title":"Adversarial threats to deepfake detection: A practical perspective","author":"neekhara","year":"2020","journal-title":"Proc of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00003"},{"key":"ref25","article-title":"&#x2019;Deepfake&#x2019; voice tech used for good in David Beckham malaria campaign","author":"oakes","year":"2019"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833860.pdf?arnumber=9833860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T15:03:06Z","timestamp":1676214186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833860","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}