{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:59:15Z","timestamp":1765357155563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PIMS-IAT, Platform Specialized in Identifying and Evaluating Early Warning Indices for Crisis Management","award":["27SOL\/2021"],"award-info":[{"award-number":["27SOL\/2021"]}]},{"name":"AI4Media, A European Excellence Centre for Media, Society and Democracy, H2020 ICT-48-2020","award":["951911"],"award-info":[{"award-number":["951911"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3512732.3533581","type":"proceedings-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T22:34:13Z","timestamp":1656110053000},"page":"69-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Uncovering the Strength of Capsule Networks in Deepfake Detection"],"prefix":"10.1145","author":[{"given":"Dan-Cristian","family":"Stanciu","sequence":"first","affiliation":[{"name":"Politehnica University of Bucharest, Bucharest, Romania"}]},{"given":"Bogdan","family":"Ionescu","sequence":"additional","affiliation":[{"name":"Politehnica University of Bucharest, Bucharest, Romania"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Retrieved","author":"GAN.","year":"2022","unstructured":"2018. Faceswap- GAN. Retrieved April 30 2022 from https:\/\/github.com\/shaoanlu\/faceswap-GAN 2018. Faceswap-GAN. Retrieved April 30 2022 from https:\/\/github.com\/shaoanlu\/faceswap-GAN"},{"key":"e_1_3_2_2_2_1","volume-title":"Retrieved","author":"FaceSwap DeepFake","year":"2022","unstructured":"2019. DeepFake FaceSwap . Retrieved April 30 2022 from https:\/\/github.com\/deepfakes\/faceswap 2019. DeepFake FaceSwap. Retrieved April 30 2022 from https:\/\/github.com\/deepfakes\/faceswap"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_2_3_1","unstructured":"2019. Faceapp. Retrieved April 30 2022 from https:\/\/www.faceapp.com 2019. Faceapp. Retrieved April 30 2022 from https:\/\/www.faceapp.com"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00019"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_2_6_1","volume-title":"2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1--7.","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska , Andr\u00e9 Anjos , and S\u00e9bastien Marcel . 2012 . On the effectiveness of local binary patterns in face anti-spoofing . In 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1--7. Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, 1--7."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_2_2_9_1","volume-title":"Deepfake detection using spatiotemporal convolutional networks. arXiv preprint arXiv:2006.14749","author":"de Lima Oscar","year":"2020","unstructured":"Oscar de Lima , Sean Franklin , Shreshtha Basu , Blake Karwoski , and Annet George . 2020. Deepfake detection using spatiotemporal convolutional networks. arXiv preprint arXiv:2006.14749 ( 2020 ). Oscar de Lima, Sean Franklin, Shreshtha Basu, Blake Karwoski, and Annet George. 2020. Deepfake detection using spatiotemporal convolutional networks. arXiv preprint arXiv:2006.14749 (2020)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_11_1","volume-title":"The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397","author":"Dolhansky Brian","year":"2020","unstructured":"Brian Dolhansky , Joanna Bitton , Ben Pflaum , Jikuo Lu , Russ Howes , Menglin Wang , and Cristian Canton Ferrer . 2020. The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397 ( 2020 ). Brian Dolhansky, Joanna Bitton, Ben Pflaum, Jikuo Lu, Russ Howes, Menglin Wang, and Cristian Canton Ferrer. 2020. The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397 (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative adversarial nets. Advances in neural information processing systems 27 ( 2014 ). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_2_13_1","volume-title":"Effective and efficient vote attack on capsule networks. arXiv preprint arXiv:2102.10055","author":"Gu Jindong","year":"2021","unstructured":"Jindong Gu , Baoyuan Wu , and Volker Tresp . 2021. Effective and efficient vote attack on capsule networks. arXiv preprint arXiv:2102.10055 ( 2021 ). Jindong Gu, Baoyuan Wu, and Volker Tresp. 2021. Effective and efficient vote attack on capsule networks. arXiv preprint arXiv:2102.10055 (2021)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.373"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_6"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107962"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_2_21_1","volume-title":"Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467","author":"Nguyen Huy H","year":"2019","unstructured":"Huy H Nguyen , Junichi Yamagishi , and Isao Echizen . 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467 ( 2019 ). Huy H Nguyen, Junichi Yamagishi, and Isao Echizen. 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467 (2019)."},{"volume-title":"Handbook of Digital Face Manipulation and Detection","author":"Nguyen Huy H","key":"e_1_3_2_2_22_1","unstructured":"Huy H Nguyen , Junichi Yamagishi , and Isao Echizen . 2022. Capsule-Forensics Networks for Deepfake Detection . In Handbook of Digital Face Manipulation and Detection . Springer , Cham , 275--301. Huy H Nguyen, Junichi Yamagishi, and Isao Echizen. 2022. Capsule-Forensics Networks for Deepfake Detection. In Handbook of Digital Face Manipulation and Detection. Springer, Cham, 275--301."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_25_1","first-page":"80","article-title":"Recurrent convolutional strategies for face manipulation detection in videos","volume":"3","author":"Sabir Ekraam","year":"2019","unstructured":"Ekraam Sabir , Jiaxin Cheng , Ayush Jaiswal , Wael AbdAlmageed , Iacopo Masi , and Prem Natarajan . 2019 . Recurrent convolutional strategies for face manipulation detection in videos . Interfaces (GUI) 3 , 1 (2019), 80 -- 87 . Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, and Prem Natarajan. 2019. Recurrent convolutional strategies for face manipulation detection in videos. Interfaces (GUI) 3, 1 (2019), 80--87.","journal-title":"Interfaces (GUI)"},{"key":"e_1_3_2_2_26_1","volume-title":"Dynamic routing between capsules. Advances in neural information processing systems 30","author":"Sabour Sara","year":"2017","unstructured":"Sara Sabour , Nicholas Frosst , and Geoffrey E Hinton . 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 ( 2017 ). Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton. 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 (2017)."},{"volume-title":"Improved explainability of capsule networks: Relevance path by agreement. In 2018 ieee global conference on signal and information processing (globalsip)","author":"Shahroudnejad Atefeh","key":"e_1_3_2_2_27_1","unstructured":"Atefeh Shahroudnejad , Parnian Afshar , Konstantinos N Plataniotis , and Arash Mohammadi . 2018. Improved explainability of capsule networks: Relevance path by agreement. In 2018 ieee global conference on signal and information processing (globalsip) . IEEE , 549--553. Atefeh Shahroudnejad, Parnian Afshar, Konstantinos N Plataniotis, and Arash Mohammadi. 2018. Improved explainability of capsule networks: Relevance path by agreement. In 2018 ieee global conference on signal and information processing (globalsip). IEEE, 549--553."},{"key":"e_1_3_2_2_28_1","volume-title":"Deepfake Video Detection with Facial Features and Long-Short Term Memory Deep Networks. In 2021 International Symposium on Signals, Circuits and Systems (ISSCS). IEEE, 1--4.","author":"Stanciu Dan-Cristian","year":"2021","unstructured":"Dan-Cristian Stanciu and Bogdan Ionescu . 2021 . Deepfake Video Detection with Facial Features and Long-Short Term Memory Deep Networks. In 2021 International Symposium on Signals, Circuits and Systems (ISSCS). IEEE, 1--4. Dan-Cristian Stanciu and Bogdan Ionescu. 2021. Deepfake Video Detection with Facial Features and Long-Short Term Memory Deep Networks. In 2021 International Symposium on Signals, Circuits and Systems (ISSCS). IEEE, 1--4."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_2_30_1","volume-title":"A convolutional LSTM based residual network for deepfake video detection. arXiv preprint arXiv:2009.07480","author":"Tariq Shahroz","year":"2020","unstructured":"Shahroz Tariq , Sangyup Lee , and Simon S Woo . 2020. A convolutional LSTM based residual network for deepfake video detection. arXiv preprint arXiv:2009.07480 ( 2020 ). Shahroz Tariq, Sangyup Lee, and Simon S Woo. 2020. A convolutional LSTM based residual network for deepfake video detection. arXiv preprint arXiv:2009.07480 (2020)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68821-9_38"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"}],"event":{"name":"ICMR '22: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Newark NJ USA","acronym":"ICMR '22"},"container-title":["Proceedings of the 1st International Workshop on Multimedia AI against Disinformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512732.3533581","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512732.3533581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:28Z","timestamp":1750183768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512732.3533581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":33,"alternative-id":["10.1145\/3512732.3533581","10.1145\/3512732"],"URL":"https:\/\/doi.org\/10.1145\/3512732.3533581","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}