{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:56:57Z","timestamp":1772200617875,"version":"3.50.1"},"reference-count":94,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"DFG, German Research Foundation","award":["390727645"],"award-info":[{"award-number":["390727645"]}]},{"name":"German-Greek Universities cooperation program","award":["57515461"],"award-info":[{"award-number":["57515461"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Appl. Percept."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>With recent advances in machine learning and big data, it is now possible to create synthetic images that look real. Face generation is often of particular interest, as faces can be used for various purposes. However, improper use of such content can lead to the dissemination of false information, such as fake news, and thus pose a threat to society. This work studies whether people believe the truthfulness of faces using eye tracking and self-reports, including free-form textual explanations when participants encounter real and computer-generated faces. We used three different datasets for our evaluations, and our experimental results show that while people are relatively better at identifying the truthfulness of real faces and faces generated by earlier machine learning algorithms with different gazing behaviors in viewing and rating phases, they perform less accurately when deciding the truthfulness of synthetic face images that are generated by newer algorithms. Our findings provide important insights for society and policymakers.<\/jats:p>","DOI":"10.1145\/3696667","type":"journal-article","created":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T12:47:18Z","timestamp":1727095638000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Can You Tell Real from Fake Face Images? Perception of Computer-Generated Faces by Humans"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4594-4318","authenticated-orcid":false,"given":"Efe","family":"Bozkir","sequence":"first","affiliation":[{"name":"Human-Centered Technologies for Learning, Department of Educational Sciences, TUM School of Social Sciences and Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6913-3643","authenticated-orcid":false,"given":"Clara","family":"Riedmiller","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3872-4325","authenticated-orcid":false,"given":"Athanassios N.","family":"Skodras","sequence":"additional","affiliation":[{"name":"Digital Signal and Image Processing Lab, Department of Electrical and Computer Engineering, School of Engineering, University of Patras, Patras, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3123-7268","authenticated-orcid":false,"given":"Gjergji","family":"Kasneci","sequence":"additional","affiliation":[{"name":"Responsible Data Science, Department of Governance, TUM School of Social Sciences and Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3146-4484","authenticated-orcid":false,"given":"Enkelejda","family":"Kasneci","sequence":"additional","affiliation":[{"name":"Human-Centered Technologies for Learning, Department of Educational Sciences, TUM School of Social Sciences and Technology, Technical University of Munich, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Adrienne Goldstein for GMF. 2021. Social Media Engagement with Deceptive Sites Reached Record Highs in 2020. Retrieved July 30 2022 from https:\/\/www.gmfus.org\/news\/social-media-engagement-deceptive-sites-reached-record-highs-2020"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343036.3343138"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517031.3529619"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00085"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE49384.2020.9179472"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517031.3529631"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1943403.1943454"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Umur A. Ciftci Gokturk Yuksek and Ilke Demir. 2022. My face my choice: Privacy enhancing deepfakes for social media anonymization. arXiv:2211.01361. Retrieved from 10.48550\/ARXIV.2211.01361","DOI":"10.48550\/ARXIV.2211.01361"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1177\/0267658316637401"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1017\/9781108233279"},{"key":"e_1_3_1_16_2","volume-title":"Practical Nonparametric Statistics","author":"Conover William Jay","year":"1999","unstructured":"William Jay Conover. 1999. Practical Nonparametric Statistics, Vol. 350. John Wiley & Sons."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57883-5"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00419-2"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2620030"},{"key":"e_1_3_1_20_2","volume-title":"Machine Learning for Deepfake Detection","author":"Gallagher Shannon K.","year":"2022","unstructured":"Shannon K. Gallagher. 2022. Machine Learning for Deepfake Detection. Carnegie Mellon University. Retrieved November 29, 2022 from https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1180868.pdf"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445596"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(98)00068-7"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507082"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.2661"},{"key":"e_1_3_1_25_2","unstructured":"Google DeepMind. 2023. Gemini Models. Retrieved May 22 2024 from https:\/\/deepmind.google\/technologies\/gemini\/"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2110013119"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401221"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2017.04.006"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(08)62386-9"},{"issue":"2","key":"e_1_3_1_30_2","first-page":"65","article-title":"A simple sequentially rejective multiple test procedure","volume":"6","author":"Holm Sture","year":"1979","unstructured":"Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian Journal of Statistics 6, 2 (1979), 65\u201370. Retrieved from http:\/\/www.jstor.org\/stable\/4615733","journal-title":"Scandinavian Journal of Statistics"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2871714"},{"key":"e_1_3_1_32_2","volume-title":"Eye Tracking: A Comprehensive Guide to Methods and Measures","author":"Holmqvist Kenneth","year":"2011","unstructured":"Kenneth Holmqvist, Marcus Nystr\u00f6m, Richard Andersson, Richard Dewhurst, Halszka Jarodzka, and Joost Van de Weijer. 2011. Eye Tracking: A Comprehensive Guide to Methods and Measures. OUP Oxford."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1093\/jcde\/qwae017"},{"key":"e_1_3_1_34_2","unstructured":"Jurica Koleti\u0107. 2017. Man wearing Henley top portrait. Retrieved September 7 2024 from https:\/\/unsplash.com\/photos\/man-wearing-henley-top-portrait-7YVZYZeITc8"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(76)90015-3"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1515\/psicl-2016-0009"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1710.10196"},{"key":"e_1_3_1_38_2","first-page":"852","article-title":"Alias-free generative adversarial networks","volume":"34","author":"Karras Tero","year":"2021","unstructured":"Tero Karras, Miika Aittala, Samuli Laine, Erik H\u00e4rk\u00f6nen, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2021. Alias-free generative adversarial networks. In Proceedings of the Advances in Neural Information Processing Systems, Vol. 34, 852\u2013863.","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18706-x"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208131"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2020.612175"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379156.3391366"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2021.3120982"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471200"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109628"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR50242.2020.00068"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485133"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.733531"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10339-012-0499-z"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1080\/21520704.2018.1511660"},{"key":"e_1_3_1_56_2","unstructured":"Andreas Mueller. 2020. WordCloud for Python. Retrieved September 14 2022 from https:\/\/github.com\/amueller\/word_cloud"},{"key":"e_1_3_1_57_2","unstructured":"This Person Does Not Exist. 2019. Retrieved January 25 2023 from https:\/\/thispersondoesnotexist.com\/"},{"key":"e_1_3_1_58_2","unstructured":"John Naughton. 2023. ChatGPT Exploded into Public Life a Year Ago. Now We Know What Went on Behind the Scenes. Retrieved January 10 2024 from https:\/\/www.theguardian.com\/commentisfree\/2023\/dec\/09\/chatgpt-ai-pearl-harbor-moment-sam-altman"},{"key":"e_1_3_1_59_2","unstructured":"Deutsche Welle News. 2022. Vitali Klitschko Fake Tricks Berlin Mayor in Video Call. Retrieved September 11 2022 from https:\/\/www.dw.com\/en\/vitali-klitschko-fake-tricks-berlin-mayor-in-video-call\/a-62257289"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2022.103525"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2120481119"},{"key":"e_1_3_1_62_2","unstructured":"OpenAI. 2023. DALL-E 3. Retrieved September 3 2024 from https:\/\/openai.com\/index\/dall-e-3\/"},{"key":"e_1_3_1_63_2","unstructured":"Donnie O\u2019Sullivan. 2020. A High School Student Created a Fake 2020 Candidate. Twitter Verified It. Retrieved September 6 2022 from https:\/\/www.cnn.com\/2020\/02\/28\/tech\/fake-twitter-candidate-2020\/index.html"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743701"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.42"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2019.103842"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154404"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2112.10752"},{"key":"e_1_3_1_69_2","first-page":"1","volume-title":"Proceedings of the British Machine Vision Conference (BMVC \u201921),","author":"Rong Yao","year":"2021","unstructured":"Yao Rong, Wenjia Xu, Zeynep Akata, and Enkelejda Kasneci. 2021. Human attention in fine-grained classification. In Proceedings of the British Machine Vision Conference (BMVC \u201921), 1\u201314. Retrieved from https:\/\/arxiv.org\/abs\/2111.01628."},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","unstructured":"Andreas R\u00f6ssler Davide Cozzolino Luisa Verdoliva Christian Riess Justus Thies and Matthias Nie\u00dfner. 2018. FaceForensics: A large-scale video dataset for forgery detection in human faces. arXiv:1803.09179. Retrieved from 10.48550\/ARXIV.1803.09179","DOI":"10.48550\/ARXIV.1803.09179"},{"key":"e_1_3_1_72_2","first-page":"1","volume-title":"Proceedings of the AAAI Spring Symposium on Combining Machine Learning with Knowledge Engineering (AAAI-MAKE \u201919)","author":"Sajjad Ahmed","year":"2019","unstructured":"Ahmed Sajjad, Knut Hinkelmann, and Flavio Corradini. 2019. Combining machine learning with knowledge engineering to detect fake news in social networks-a survey. In Proceedings of the AAAI Spring Symposium on Combining Machine Learning with Knowledge Engineering (AAAI-MAKE \u201919). AAAI Press, 1\u201312."},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/355017.355028"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaac.2016.02.002"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342220.3343642"},{"key":"e_1_3_1_76_2","volume-title":"Deepfakes, Explained","author":"Somers Meredith","year":"2020","unstructured":"Meredith Somers. 2020. Deepfakes, Explained. MIT Sloan School of Management. Retrieved May 28, 2024 from https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/deepfakes-explained"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445699"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2403.04493"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3182644"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201350"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_1_82_2","unstructured":"John Thornhill. 2021. Deepfakes Threaten to Inflate the Liar\u2019S Dividend. Retrieved September 2 2022 from https:\/\/www.ft.com\/content\/6e103e44-acc7-4136-9c37-58543507138a"},{"key":"e_1_3_1_83_2","unstructured":"Tobii AB. 2022. Eye Tracker Data Quality Test Report v 1.1. Retrieved July 25 2022 from https:\/\/www.tobii.com\/"},{"key":"e_1_3_1_84_2","unstructured":"Tobii AB. 2022. Tobii Pro Lab User Manual v. 1.194. Retrieved July 25 2022 from https:\/\/www.tobii.com\/"},{"key":"e_1_3_1_85_2","unstructured":"Tobii AB. 2022. Tobii Pro Spectrum. Retrieved July 25 2022 from https:\/\/www.tobiipro.com\/product-listing\/tobii-pro-spectrum\/"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445627"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3239182"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00322"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","unstructured":"Zuhao Yang Fangneng Zhan Kunhao Liu Muyu Xu and Shijian Lu. 2023. AI-generated images as data source: The dawn of synthetic era. arXiv:2310.01830. Retrieved from 10.48550\/arXiv.2310.01830","DOI":"10.48550\/arXiv.2310.01830"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993901.2993908"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11733-y"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375849"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2021.106909"}],"container-title":["ACM Transactions on Applied Perception"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:44Z","timestamp":1750294664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"references-count":94,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3696667"],"URL":"https:\/\/doi.org\/10.1145\/3696667","relation":{},"ISSN":["1544-3558","1544-3965"],"issn-type":[{"value":"1544-3558","type":"print"},{"value":"1544-3965","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"2023-06-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}