{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:30Z","timestamp":1750220010179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,25]]},"DOI":"10.1145\/3577164.3577170","type":"proceedings-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T22:10:10Z","timestamp":1680646210000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Recapture Detection to Fight Deep Identity Theft"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0187-3343","authenticated-orcid":false,"given":"Anis","family":"Trabelsi","sequence":"first","affiliation":[{"name":"Digital Security Department, EURECOM, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2535-1483","authenticated-orcid":false,"given":"Marc","family":"Pic","sequence":"additional","affiliation":[{"name":"Digital Labs, SURYS, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3151-4330","authenticated-orcid":false,"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[{"name":"Digital Security Department, EURECOM, France"}]}],"member":"320","published-online":{"date-parts":[[2023,4,4]]},"reference":[{"unstructured":"Changsha \u200eZAO. 2019.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"ArXiv200505535 Cs Eess","author":"Perov I.","year":"2020","unstructured":"I. Perov , \u00ab\u00a0DeepFaceLab: A simple, flexible and extensible face swapping framework\u00a0\u00bb, ArXiv200505535 Cs Eess, 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"\u00ab\u00a0First Order Motion Model for Image Animation\u00a0\u00bb","author":"Siarohin A.","year":"2019","unstructured":"A. Siarohin , \u00ab\u00a0First Order Motion Model for Image Animation\u00a0\u00bb, 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"\u00ab\u00a0Biometric Antispoofing Methods: A Survey in Face Recognition\u00a0\u00bb","author":"Galbally J.","year":"2014","unstructured":"J. Galbally , \u00ab\u00a0Biometric Antispoofing Methods: A Survey in Face Recognition\u00a0\u00bb, IEEE Access, vol. 2, 2014."},{"key":"e_1_3_2_1_5_1","volume-title":"ArXiv14043840","author":"Lu C.","year":"2014","unstructured":"C. Lu and X. Tang, \u00ab\u00a0Surpassing Human-Level Face Verification Performance on LFW with GaussianFace\u00a0\u00bb, ArXiv14043840, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_7_1","author":"Patil G.G.","year":"2020","unstructured":"G.G. Patil and R.K. Banyal, \u00ab\u00a0A Dynamic Unconstrained Feature Matching Algorithm for Face Recognition\u00a0\u00bb, in Journal of Advances in Information Technology, 2020.","journal-title":"\u00ab\u00a0A Dynamic Unconstrained Feature Matching Algorithm for Face Recognition\u00a0\u00bb, in Journal of Advances in Information Technology"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.12720\/jait.11.3.143-148"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.12720\/jait.13.2.198-202"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on ICT for Smart Society","author":"Chandra","year":"2020","unstructured":"Chandra ., \u00ab\u00a0Application of \"Face Recognition\" Technology for Class Room Electronic Attendance Management System\u00a0\u00bb, in International Conference on ICT for Smart Society, 2020."},{"key":"e_1_3_2_1_11_1","volume-title":"\u00ab\u00a0OLED Versus LCD: Who Wins?\u00a0\u00bb","author":"Luo Z.","year":"2015","unstructured":"Z. Luo and S.-T. Wu, \u00ab\u00a0OLED Versus LCD: Who Wins?\u00a0\u00bb, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ICASSP.2010.5495419"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Acoustics, Speech and Signal Processing","author":"Muammar H.","year":"2013","unstructured":"H. Muammar and P. L. Dragotti, \u00ab\u00a0An investigation into aliasing in images recaptured from an LCD monitor using a digital camera\u00a0\u00bb, in International Conference on Acoustics, Speech and Signal Processing, Canada, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.4172\/2157-7145.1000294"},{"issue":"5","key":"e_1_3_2_1_15_1","volume":"8","author":"Y. Ke","year":"2013","unstructured":"Y. Ke , \u00ab\u00a0Image Recapture Detection Using Multiple Features\u00a0\u00bb, Int. J. Multimed. Ubiquitous Eng., vol. 8, no 5, 2013.","journal-title":"Int. J. Multimed. Ubiquitous Eng."},{"key":"e_1_3_2_1_16_1","volume-title":"IWDW","author":"P. Yang","year":"2017","unstructured":"P. Yang , \u00ab\u00a0Recapture Image Forensics Based on Laplacian Convolutional Neural Networks\u00a0\u00bb, in IWDW, 2017."},{"volume-title":"Electron. Imaging","author":"Li H.","unstructured":"H. Li , \u00ab\u00a0Image Recapture Detection with Convolutional and Recurrent Neural Networks\u00a0\u00bb, Electron. Imaging, vol. 2017, no 7, 2017.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","volume-title":"Symposium Series on Computational Intelligence (SSCI)","author":"Abraham E.","year":"2018","unstructured":"E. Abraham, \u00ab\u00a0Moir\u00e9 Pattern Detection using Wavelet Decomposition and Convolutional Neural Network\u00a0\u00bb, in Symposium Series on Computational Intelligence (SSCI), India, 2018."},{"key":"e_1_3_2_1_19_1","volume-title":"Digital Watermarking","volume":"6526","author":"X. Gao","year":"2011","unstructured":"X. Gao , \u00ab\u00a0A Smart Phone Image Database for Single Image Recapture Detection\u00a0\u00bb, in Digital Watermarking, vol. 6526, 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"S. Agarwal","year":"2018","unstructured":"S. Agarwal , \u00ab\u00a0A Diverse Large-Scale Dataset for Evaluating Rebroadcast Attacks\u00a0\u00bb, in International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/TIFS.2015.2392566"},{"key":"e_1_3_2_1_22_1","volume-title":"ArXiv14050312 Cs","author":"Lin T.-Y.","year":"2015","unstructured":"T.-Y. Lin , \u00ab\u00a0Microsoft COCO: Common Objects in Context\u00a0\u00bb, ArXiv14050312 Cs, 2015."},{"key":"e_1_3_2_1_23_1","volume-title":"ArXiv190511946 Cs Stat","author":"Le M. Tan","year":"2020","unstructured":"M. Tan et Q. V. Le, \u00ab\u00a0EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks\u00a0\u00bb, ArXiv190511946 Cs Stat, 2020."}],"event":{"acronym":"VSIP 2022","name":"VSIP 2022: 2022 4th International Conference on Video, Signal and Image Processing","location":"Shanghai China"},"container-title":["Proceedings of the 2022 4th International Conference on Video, Signal and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577164.3577170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577164.3577170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:10Z","timestamp":1750182670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577164.3577170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,25]]},"references-count":23,"alternative-id":["10.1145\/3577164.3577170","10.1145\/3577164"],"URL":"https:\/\/doi.org\/10.1145\/3577164.3577170","relation":{},"subject":[],"published":{"date-parts":[[2022,11,25]]},"assertion":[{"value":"2023-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}