{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T15:51:30Z","timestamp":1778860290051,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680869","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"10515-10524","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual Watermarks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2920-6099","authenticated-orcid":false,"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9527-3457","authenticated-orcid":false,"given":"Mengxiao","family":"Huang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology, Jinan, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7436-0162","authenticated-orcid":false,"given":"Harry","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3631-1427","authenticated-orcid":false,"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology, Jinan, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7626-7295","authenticated-orcid":false,"given":"Zhiqi","family":"Shen","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 7115--7125","author":"Bounareli S.","unstructured":"S. Bounareli, C. Tzelepis, V. Argyriou, I. Patras, and G. Tzimiropoulos. 2023. HyperReenact: One-Shot Reenactment via Jointly Learning to Refine and Retarget Faces. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 7115--7125."},{"key":"e_1_3_2_1_3_1","volume-title":"2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition. 1--8.","author":"Bounareli S.","unstructured":"S. Bounareli, C. Tzelepis, V. Argyriou, I. Patras, and G. Tzimiropoulos. 2023. StyleMask: Disentangling the Style Space of StyleGAN2 for Neural Face Reenactment. In 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition. 1--8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Neural Information Processing Systems","volume":"27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems, Vol. 27."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00072"},{"key":"e_1_3_2_1_12_1","volume-title":"Squeeze-and-Excitation Networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7132--7141","author":"Hu Jie","year":"2018","unstructured":"Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-Excitation Networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7132--7141."},{"key":"e_1_3_2_1_13_1","unstructured":"Gary B. Huang Marwan Mattar Honglak Lee and Erik Learned-Miller. 2012. Learning to Align from Scratch. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3285981"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16254"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Learning Representations.","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_19_1","volume-title":"Fast Face-Swap Using Convolutional Neural Networks. In 2017 IEEE International Conference on Computer Vision. 3697--3705","author":"Korshunova Iryna","year":"2017","unstructured":"Iryna Korshunova, Wenzhe Shi, Joni Dambre, and Lucas Theis. 2017. Fast Face-Swap Using Convolutional Neural Networks. In 2017 IEEE International Conference on Computer Vision. 3697--3705."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"e_1_3_2_1_21_1","volume-title":"Exposing DeepFake Videos By Detecting Face Warping Artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops.","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu. 2019. Exposing DeepFake Videos By Detecting Face Warping Artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops."},{"key":"e_1_3_2_1_22_1","volume-title":"European Conference on Computer Vision. 128--145","author":"Liang Jiahao","year":"2022","unstructured":"Jiahao Liang, Huafeng Shi, and Weihong Deng. 2022. Exploring Disentangled Content Information for\u00a0Face Forgery Detection. In European Conference on Computer Vision. 128--145."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 8578--8587","author":"Liu Z.","unstructured":"Z. Liu, M. Li, Y. Zhang, C. Wang, Q. Zhang, J. Wang, and Y. Nie. 2023. Fine-Grained Face Swapping Via Regional GAN Inversion. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 8578--8587."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547950"},{"key":"e_1_3_2_1_26_1","unstructured":"Paarth Neekhara Shehzeen Hussain Xinqiao Zhang Ke Huang Julian McAuley and Farinaz Koushanfar. 2022. FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes. arXiv preprint arXiv:2204.01960."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3093446"},{"key":"e_1_3_2_1_29_1","volume-title":"Luis RP, Jian Jiang, Sheng Zhang, Pingyu Wu, Bo Zhou, and Weiming Zhang.","author":"Perov Ivan","year":"2021","unstructured":"Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Kunlin Liu, Sugasa Marangonda, Chris Um\u00e9, Mr. Dpfks, Carl Shift Facenheim, Luis RP, Jian Jiang, Sheng Zhang, Pingyu Wu, Bo Zhou, and Weiming Zhang. 2021. DeepFaceLab: Integrated, flexible and extensible face-swapping framework. arXiv preprint arXiv:2005.05535."},{"key":"e_1_3_2_1_30_1","volume-title":"Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems. In European Conference on Computer Vision Workshop. 236--251","author":"Ruiz Nataniel","year":"2020","unstructured":"Nataniel Ruiz, Sarah Adel Bargal, and Stan Sclaroff. 2020. Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems. In European Conference on Computer Vision Workshop. 236--251."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"e_1_3_2_1_34_1","volume-title":"The General and Logical Theory of Automata","author":"Neumann John Von","unstructured":"John Von Neumann. 1951. The General and Logical Theory of Automata. John Wiley & Sons Inc., 1--31."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/107"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588574"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"e_1_3_2_1_38_1","unstructured":"Tianyi Wang Mengxiao Huang Harry Cheng Bin Ma and Yinglong Wang. 2024. Robust Identity Perceptual Watermark Against Deepfake Face Swapping. arXiv preprint arXiv:2311.01357."},{"key":"e_1_3_2_1_39_1","article-title":"An Efficient Attribute-Preserving Framework for Face Swapping","author":"Wang Tianyi","year":"2024","unstructured":"Tianyi Wang, Zian Li, Ruixia Liu, Yinglong Wang, and Liqiang Nie. 2024. An Efficient Attribute-Preserving Framework for Face Swapping. IEEE Transactions on Multimedia, 1--13.","journal-title":"IEEE Transactions on Multimedia, 1--13."},{"key":"e_1_3_2_1_40_1","volume-title":"Xiaodong Lin, and Yinglong Wang.","author":"Wang Tianyi","year":"2023","unstructured":"Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, and Yinglong Wang. 2023. Deepfake Detection: A Comprehensive Study from the Reliability Perspective. arXiv preprint arXiv:2211.10881."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01450"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.55.601"},{"key":"e_1_3_2_1_43_1","volume-title":"Nature","volume":"311","author":"Wolfram Stephen","year":"1984","unstructured":"Stephen Wolfram. 1984. Cellular Automata as Models of Complexity. Nature, Vol. 311, 5985 (1984), 419--424."},{"key":"e_1_3_2_1_44_1","volume-title":"A New Kind of Science. Wolfram Media","author":"Wolfram Stephen","unstructured":"Stephen Wolfram. 2002. A New Kind of Science. Wolfram Media, Inc."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_37"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"e_1_3_2_1_47_1","volume-title":"European Conference on Computer Vision. 54--71","author":"Xu Chao","year":"2022","unstructured":"Chao Xu, Jiangning Zhang, Yue Han, Guanzhong Tian, Xianfang Zeng, Ying Tai, Yabiao Wang, Chengjie Wang, and Yong Liu. 2022. Designing One Unified Framework for\u00a0High-Fidelity Face Reenactment and\u00a0Swapping. In European Conference on Computer Vision. 54--71."},{"key":"e_1_3_2_1_48_1","first-page":"4534","article-title":"DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection","volume":"36","author":"Yan Zhiyuan","year":"2023","unstructured":"Zhiyuan Yan, Yong Zhang, Xinhang Yuan, Siwei Lyu, and Baoyuan Wu. 2023. DeepfakeBench: A Comprehensive Benchmark of Deepfake Detection. In Advances in Neural Information Processing Systems, Vol. 36. 4534--4565.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_49_1","volume-title":"European Conference on Computer Vision. 55--71","author":"Yang Kewei","year":"2022","unstructured":"Kewei Yang, Kang Chen, Daoliang Guo, Song-Hai Zhang, Yuan-Chen Guo, and Weidong Zhang. 2022. Face2Face\u03c1: Real-Time High-Resolution One-Shot Face Reenactment. In European Conference on Computer Vision. 55--71."},{"key":"e_1_3_2_1_50_1","unstructured":"Yuankun Yang Chenyue Liang Hongyu He Xiaoyu Cao and Neil Zhenqiang Gong. 2021. FaceGuard: Proactive Deepfake Detection. arXiv preprint arXiv:2109.05673."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 14428--14437","author":"Yu N.","unstructured":"N. Yu, V. Skripniuk, S. Abdelnabi, and M. Fritz. 2021. Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 14428--14437."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00537"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 15003--15013","author":"Zhao T.","unstructured":"T. Zhao, X. Xu, M. Xu, H. Ding, Y. Xiong, and W. Xia. 2021. Learning Self-Consistency for Deepfake Detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 15003--15013."},{"key":"e_1_3_2_1_55_1","volume-title":"Two-Stream Neural Networks for Tampered Face Detection. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops. 1831--1839","author":"Zhou Peng","unstructured":"Peng Zhou, Xintong Han, Vlad I. Morariu, and Larry S. Davis. 2017. Two-Stream Neural Networks for Tampered Face Detection. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops. 1831--1839."},{"key":"e_1_3_2_1_56_1","volume-title":"HiDDeN: Hiding Data With Deep Networks. In European Conference on Computer Vision. 682--697","author":"Zhu Jiren","year":"2018","unstructured":"Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. HiDDeN: Hiding Data With Deep Networks. In European Conference on Computer Vision. 682--697."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262156"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":57,"alternative-id":["10.1145\/3664647.3680869","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680869","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}