{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:00:24Z","timestamp":1776103224515,"version":"3.50.1"},"reference-count":198,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100019092","name":"Hunan Provincial Funds for Distinguished Young Scholars","doi-asserted-by":"crossref","award":["2024JJ2025"],"award-info":[{"award-number":["2024JJ2025"]}],"id":[{"id":"10.13039\/501100019092","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the existing Deepfake detection studies from the reliability perspective. We identify three reliability-oriented research challenges in the current Deepfake detection domain: transferability, interpretability, and robustness. Moreover, while solutions have been frequently addressed regarding the three challenges, the general reliability of a detection model has been barely considered, leading to the lack of reliable evidence in real-life usages and even for prosecutions on Deepfake-related cases in court. We, therefore, introduce a model reliability study metric using statistical random sampling knowledge and the publicly available benchmark datasets to review the reliability of the existing detection models on arbitrary Deepfake candidate suspects. Case studies are further executed to justify the real-life Deepfake cases including different groups of victims with the help of the reliably qualified detection models as reviewed in this survey. Reviews and experiments on the existing approaches provide informative discussions and future research directions for Deepfake detection.<\/jats:p>","DOI":"10.1145\/3699710","type":"journal-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T15:40:42Z","timestamp":1728402042000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["Deepfake Detection: A Comprehensive Survey from the Reliability Perspective"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2920-6099","authenticated-orcid":false,"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[{"name":"Computer Science, The University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9131-0578","authenticated-orcid":false,"given":"Xin","family":"Liao","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4552-9744","authenticated-orcid":false,"given":"Kam Pui","family":"Chow","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8916-6645","authenticated-orcid":false,"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Guelph, Guelph, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8350-7186","authenticated-orcid":false,"given":"Yinglong","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security Ministry of Education, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"U.S Food & Drug Administration. 2022. COVID-19 Antigen Home Test Package Insert for Healthcare Providers. Retrieved from https:\/\/www.fda.gov\/media\/152698\/download. Accessed: 2022-09-09."},{"key":"e_1_3_2_3_2","first-page":"1","article-title":"MesoNet: A compact facial video forgery detection network","author":"Afchar Darius","year":"2018","unstructured":"Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. MesoNet: A compact facial video forgery detection network. 2018 IEEE International Workshop on Information Forensics and Security (WIFS) (2018), 1\u20137.","journal-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360904"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"e_1_3_2_6_2","unstructured":"Rima Sabina Aouf. 2019. Museum creates deepfake Salvador Dal\u00ed to greet visitors. Retrieved from https:\/\/www.dezeen.com\/2019\/05\/24\/salvador-dali-deepfake-dali-musuem-florida\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190892"},{"key":"e_1_3_2_8_2","volume-title":"33rd British Machine Vision Conference 2022, BMVC 2022, London, UK, November 21-24, 2022","author":"Baldassarre Federico","year":"2022","unstructured":"Federico Baldassarre, Quentin Debard, Gonzalo Fiz Pontiveros, and Tri Kurniawan Wijaya. 2022. Quantitative metrics for evaluating explanations of video deepfake detectors. In 33rd British Machine Vision Conference 2022, BMVC 2022, London, UK, November 21-24, 2022. BMVA Press. Retrieved from https:\/\/bmvc2022.mpi-inf.mpg.de\/0972.pdf"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19886"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"e_1_3_2_11_2","volume-title":"International Conference on Learning Representations","author":"Brock Andrew","year":"2019","unstructured":"Andrew Brock, Jeff Donahue, and Karen Simonyan. 2019. Large scale GAN training for high fidelity natural image synthesis. In International Conference on Learning Representations. Retrieved from https:\/\/openreview.net\/forum?id=B1xsqj09Fm"},{"key":"e_1_3_2_12_2","first-page":"737","volume-title":"Proceedings of the 6th International Conference on Neural Information Processing Systems (NIPS\u201993)","author":"Bromley Jane","year":"1993","unstructured":"Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S\u00e4ckinger, and Roopak Shah. 1993. Signature verification using a \u201dsiamese\u201d time delay neural network. In Proceedings of the 6th International Conference on Neural Information Processing Systems (NIPS\u201993). 737\u2013744."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-044894-7.00294-3"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475347"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3204753"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01815"},{"key":"e_1_3_2_19_2","volume-title":"Advances in Neural Information Processing Systems","author":"Chen Liang","year":"2022","unstructured":"Liang Chen, Yong Zhang, Yibing Song, Jue Wang, and Lingqiao Liu. 2022. OST: Improving generalization of DeepFake detection via one-shot test-time training. In Advances in Neural Information Processing Systems, Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (Eds.)."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3625231"},{"key":"e_1_3_2_23_2","unstructured":"Rudy Chinchilla. 2021. Mom Made Deepfake Nudes of Daughter\u2019s Cheer Teammates to Harass Them: Police. Retrieved from https:\/\/www.nbcphiladelphia.com\/news\/local\/mom-made-deepfake-nudes-of-daughters-cheer-teammates-to-harass-them-police\/2740906\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_26_2","volume-title":"Responsible AI (RAT) - ICLR 2021 Workshop","author":"Chuming Yang","year":"2021","unstructured":"Yang Chuming, Daniel Wu, and Ken Hong. 2021. Practical deepfake detection: Vulnerabilities in global contexts. In Responsible AI (RAT) - ICLR 2021 Workshop."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"e_1_3_2_28_2","unstructured":"EU Health Security Committee. 2022. EU Common list of COVID-19 antigen tests. Retrieved from https:\/\/health.ec.europa.eu\/system\/files\/2022-07\/covid-19_eu-common-list-antigen-tests_en.pdf. Accessed: 2022-09-09."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026073"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_2_31_2","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops","author":"Verdoliva Davide Cozzolino Giovanni Poggi Luisa","year":"2019","unstructured":"Davide Cozzolino Giovanni Poggi Luisa Verdoliva. 2019. Extracting camera-based fingerprints for video forensics. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00582"},{"key":"e_1_3_2_33_2","unstructured":"Catherine de Weever and S. Wilczek. 2020. Deepfake detection through PRNU and logistic regression analyses."},{"key":"e_1_3_2_34_2","unstructured":"deepfakes. 2018. FakeApp. Retrieved from https:\/\/www.malavida.com\/en\/soft\/fakeapp\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_35_2","unstructured":"deepfakes. 2019. DeepFakes. Retrieved from https:\/\/github.com\/deepfakes\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12277"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Brian Dolhansky Joanna Bitton Ben Pflaum Jikuo Lu Russ Howes Menglin Wang and Cristian Canton Ferrer. 2020. The DeepFake Detection Challenge (DFDC) Dataset. DOI:10.48550\/ARXIV.2006.07397","DOI":"10.48550\/ARXIV.2006.07397"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Brian Dolhansky Russ Howes Ben Pflaum Nicole Baram and Cristian Canton Ferrer. 2019. The Deepfake Detection Challenge (DFDC) Preview Dataset. DOI:10.48550\/ARXIV.1910.08854","DOI":"10.48550\/ARXIV.1910.08854"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_2"},{"key":"e_1_3_2_41_2","volume-title":"International Conference on Learning Representations","author":"Dosovitskiy Alexey","year":"2021","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. 2021. An image is worth 16x16 words: Transformers for image recognition at scale. In International Conference on Learning Representations."},{"key":"e_1_3_2_42_2","unstructured":"Ricard Durall Margret Keuper Franz-Josef Pfreundt and Janis Keuper. 2020. Unmasking DeepFakes with simple Features. arXiv:1911.00686. Retrieved from https:\/\/arxiv.org\/abs\/1911.00686"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.56"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202227"},{"key":"e_1_3_2_45_2","unstructured":"FFmpeg. 2021. FFmpeg. Retrieved from https:\/\/www.ffmpeg.org\/. Accessed: 2021-08-29."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-87857-7_2"},{"key":"e_1_3_2_47_2","volume-title":"Proceedings of the 37th International Conference on Machine Learning (ICML\u201920)","author":"Frank Joel","year":"2020","unstructured":"Joel Frank, Thorsten Eisenhofer, Lea Sch\u00f6nherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz. 2020. Leveraging frequency analysis for deep fake image recognition. In Proceedings of the 37th International Conference on Machine Learning (ICML\u201920). JMLR.org, Article 304, 12 pages."},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"e_1_3_2_51_2","first-page":"2672","volume-title":"The 27th Neural Information Processing Systems Advances","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In The 27th Neural Information Processing Systems Advances. 2672\u20132680."},{"key":"e_1_3_2_52_2","unstructured":"Dou Goodman Hao Xin Wang Yang Wu Yuesheng Xiong Junfeng and Zhang Huan. 2020. Advbox: a toolbox to generate adversarial examples that fool neural networks. arXiv:2001.05574. Retrieved from https:\/\/arxiv.org\/abs\/2001.05574"},{"key":"e_1_3_2_53_2","unstructured":"Hong Kong Special Administrative Region Government. 2022. Rapid Antigen Test (RAT) for COVID-19. Retrieved from https:\/\/www.coronavirus.gov.hk\/pdf\/RapAgTest_FAQ_ENG.pdf. Accessed: 2022-09-09."},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"e_1_3_2_55_2","volume-title":"Advances in Neural Information Processing Systems","author":"Guan Jiazhi","year":"2022","unstructured":"Jiazhi Guan, Hang Zhou, Zhibin Hong, Errui Ding, Jingdong Wang, Chengbin Quan, and Youjian Zhao. 2022. Delving into sequential patches for deepfake detection. In Advances in Neural Information Processing Systems, Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (Eds.)."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00341"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023037"},{"key":"e_1_3_2_58_2","unstructured":"Nick Dufourand Andrew Gully. 2019. Contributing Data to Deepfake Detection Research. Retrieved from https:\/\/ai.googleblog.com\/2019\/09\/contributing-data-to-deepfake-detection.html. Accessed: 2022-09-08."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2021.103170"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Zhiqing Guo Gaobo Yang Jiyou Chen and Xingming Sun. 2022. Exposing Deepfake Face Forgeries with Guided Residuals. DOI:10.48550\/ARXIV.2205.00753","DOI":"10.48550\/ARXIV.2205.00753"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01453"},{"key":"e_1_3_2_63_2","unstructured":"Drew Harwell. 2021. Remember the \u2018deepfake cheerleader mom\u2019? Prosecutors now admit they can\u2019t prove fake-video claims. Retrieved from https:\/\/www.washingtonpost.com\/technology\/2021\/05\/14\/deepfake-cheer-mom-claims-dropped\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/349"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03867-9"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_70_2","unstructured":"Ashish Hooda Neal Mangaokar Ryan Feng Kassem Fawaz Somesh Jha and Atul Prakash. 2022. Towards Adversarially Robust Deepfake Detection: An Ensemble Approach. arXiv:2202.05687. Retrieved from https:\/\/arxiv.org\/abs\/2202.05687"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10010370"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19978"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3074259"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33709-3_11"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3464307"},{"key":"e_1_3_2_77_2","unstructured":"Wombo Studios Inc. 2021. Wombo: Make your selfies sing. Retrieved from https:\/\/play.google.com\/store\/apps\/details?id=com.womboai.wombo&hl=en&gl=US. Accessed: 2022-09-08."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239493"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_28"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19990"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988660"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","unstructured":"Wonjun Kang Geonsu Lee Hyung Il Koo and Nam Ik Cho. 2022. One-Shot Face Reenactment on Megapixels. DOI:10.48550\/ARXIV.2205.13368","DOI":"10.48550\/ARXIV.2205.13368"},{"key":"e_1_3_2_86_2","volume-title":"International Conference on Learning Representations","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive growing of GANs for improved quality, stability, and variation. In International Conference on Learning Representations. Retrieved from https:\/\/openreview.net\/forum?id=Hk99zCeAb"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2970919"},{"key":"e_1_3_2_88_2","unstructured":"Katie Katro. 2022. Bucks County mother gets probation in harassment case involving daughter\u2019s cheerleading rivals. Retrieved from https:\/\/6abc.com\/raffaela-spone-bucks-county-pa-cheerleaders-harassment-case-victory-vipers-squad\/11939419\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_89_2","unstructured":"Leo Kelion. 2018. Deepfake porn videos deleted from internet by Gfycat. Retrieved from https:\/\/www.bbc.com\/news\/technology-42905185. Accessed: 2022-09-08."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.11.006"},{"key":"e_1_3_2_91_2","unstructured":"Davis King. 2021. dlib 19.22.1. Retrieved from https:\/\/pypi.org\/project\/dlib\/. Accessed: 2021-08-29."},{"key":"e_1_3_2_92_2","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings","author":"Kingma Diederik P.","year":"2014","unstructured":"Diederik P. Kingma and Max Welling. 2014. Auto-encoding variational bayes. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_93_2","first-page":"133","volume-title":"Proceedings of the 20th Irish Machine Vision and Image Processing conference","author":"Koopman Marissa","year":"2018","unstructured":"Marissa Koopman, Andrea Macarulla Rodriguez, and Zeno Geradts. 2018. Detection of deepfake video manipulation. In Proceedings of the 20th Irish Machine Vision and Image Processing conference. 133\u2013136."},{"key":"e_1_3_2_94_2","unstructured":"Pavel Korshunov and S\u00e9bastien Marcel. 2018. DeepFakes: A new threat to face recognition? Assessment and detection. arXiv:1812.08685. Retrieved from https:\/\/arxiv.org\/abs\/1812.08685"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093628"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01057"},{"key":"e_1_3_2_97_2","unstructured":"Laan Labs. 2017. Face Swap Live. Retrieved from https:\/\/play.google.com\/store\/apps\/details?id=com.laan.labs.faceswaplive&hl=en&gl=US. Accessed: 2022-09-28."},{"key":"e_1_3_2_98_2","unstructured":"Dave Lee. 2018. Deepfakes porn has serious consequences. Retrieved from https:\/\/www.bbc.com\/news\/technology-42912529. Accessed: 2022-09-08."},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00984"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00639"},{"key":"e_1_3_2_101_2","doi-asserted-by":"crossref","unstructured":"Lingzhi Li Jianmin Bao Hao Yang Dong Chen and Fang Wen. 2020. Advancing high fidelity identity swapping for forgery detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 5074\u20135083.","DOI":"10.1109\/CVPR42600.2020.00512"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"e_1_3_2_104_2","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Li Yuezun","year":"2019","unstructured":"Yuezun Li and Siwei Lyu. 2019. Exposing DeepFake videos by detecting face warping artifacts. In IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)."},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_8"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007959"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949286"},{"key":"e_1_3_2_111_2","unstructured":"FaceApp Technology Ltd. 2017. FaceApp: Face Editor. Retrieved from https:\/\/play.google.com\/store\/apps\/details?id=io.faceapp&hl=en&gl=US. Accessed: 2022-09-28."},{"key":"e_1_3_2_112_2","unstructured":"Shao-An Lu. 2018. faceswap-GAN. Retrieved from https:\/\/github.com\/shaoanlu\/faceswap-GAN. Accessed: 2022-09-08."},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7100193"},{"key":"e_1_3_2_116_2","unstructured":"Marek MarekKowalski. 2019. FaceSwap. Retrieved from https:\/\/github.com\/MarekKowalski\/FaceSwap. Accessed: 2021-08-29."},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2701335"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72634-2_2"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW.2019.00020"},{"key":"e_1_3_2_121_2","unstructured":"Joshua Rhett Miller. 2022. Deepfake video of Zelensky telling Ukrainians to surrender removed from social platforms. Retrieved from https:\/\/nypost.com\/2022\/03\/17\/deepfake-video-shows-volodymyr-zelensky-telling-ukrainians-to-surrender\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"e_1_3_2_123_2","unstructured":"Hello Group Inc. (Momo). 2019. ZAO. Retrieved from https:\/\/apps.apple.com\/cn\/app\/id1465199127. Accessed: 2022-09-08."},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230744.3230818"},{"key":"e_1_3_2_125_2","first-page":"1","article-title":"Multi-task learning for detecting and segmenting manipulated facial images and videos","author":"Nguyen Huy Hoang","year":"2019","unstructured":"Huy Hoang Nguyen, Fuming Fang, Junichi Yamagishi, and Isao Echizen. 2019. Multi-task learning for detecting and segmenting manipulated facial images and videos. 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS) (2019), 1\u20138.","journal-title":"2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS)"},{"key":"e_1_3_2_126_2","doi-asserted-by":"crossref","unstructured":"Huy H. Nguyen Junichi Yamagishi and Isao Echizen. 2019. Use of a Capsule Network to Detect Fake Images and Videos. arXiv:1910.12467. Retrieved from https:\/\/arxiv.org\/abs\/1910.12467","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1167\/jov.21.9.2015"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2120481119"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1167\/jov.22.14.3068"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00728"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3093446"},{"key":"e_1_3_2_132_2","unstructured":"World Health Organization. 2022. Use of SARS-CoV-2 antigen-detection rapid diagnostic tests for COVID-19 self-testing. Retrieved from https:\/\/apps.who.int\/iris\/bitstream\/handle\/10665\/352350\/WHO-2019-nCoV-Ag-RDTs-Self-testing-2022.1-eng.pdf?sequence=1. Accessed: 2022-09-09."},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00430-021-00719-0"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPhot.2012.6215223"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00244"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623589"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00042"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","unstructured":"Kunlin Liu Ivan Perov Daiheng Gao Nikolay Chervoniy Wenbo Zhou and Weiming Zhang. 2023. Deepfacelab: Integrated flexible and extensible face-swapping framework. Pattern Recogn. 141 C (September 2023). DOI:10.1016\/j.patcog.2023.109628","DOI":"10.1016\/j.patcog.2023.109628"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","unstructured":"Francesco Picetti Sara Mandelli Paolo Bestagini Vincenzo Lipari and Stefano Tubaro. 2022. DIPPAS: a deep image prior PRNU anonymization scheme. EURASIP Journal on Information Security 2022 1 (February 2022) 2. DOI:10.1186\/s13635-022-00128-7","DOI":"10.1186\/s13635-022-00128-7"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","unstructured":"Adam Polyak Lior Wolf and Yaniv Taigman. 2020. TTS Skins: Speaker Conversion via ASR. In Interspeech (2020) 786\u2013790. DOI:10.21437\/Interspeech.2020-1416","DOI":"10.21437\/Interspeech.2020-1416"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/38.946629"},{"key":"e_1_3_2_144_2","unstructured":"Learn & revise. 2019. Deepfakes: What are they and why would I make one? Retrieved from https:\/\/www.bbc.co.uk\/bitesize\/articles\/zfkwcqt. Accessed: 2022-09-08."},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_146_2","volume-title":"CVPR Workshops","author":"Sabir Ekraam","year":"2019","unstructured":"Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, and P. Natarajan. 2019. Recurrent convolutional strategies for face manipulation detection in videos. In CVPR Workshops."},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295142"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692683"},{"key":"e_1_3_2_149_2","unstructured":"ScienceDaily. 2020. \u201cDeepfakes\u201d ranked as most serious AI crime threat. Retrieved from https:\/\/www.sciencedaily.com\/releases\/2020\/08\/200804085908.htm. Accessed: 2021-05-01."},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1145\/3494109.3527194"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107950"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"e_1_3_2_153_2","unstructured":"Dima Shvets. 2022. Reface. Retrieved from https:\/\/hey.reface.ai\/. Accessed: 2022-09-08."},{"key":"e_1_3_2_154_2","volume-title":"3rd International Conference on Learning Representations","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In 3rd International Conference on Learning Representations, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_155_2","unstructured":"Hispasec Sistemas. 2004. VirusTotal. Retrieved from https:\/\/www.virustotal.com. Accessed: 2023-02-28."},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00361"},{"key":"e_1_3_2_158_2","series-title":"Proceedings of Machine Learning Research","first-page":"6105","volume-title":"Proceedings of the 36th International Conference on Machine Learning","volume":"97","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In Proceedings of the 36th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol. 97). PMLR, 6105\u20136114."},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1145\/3267357.3267367"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/3306346.3323035"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2929475"},{"key":"e_1_3_2_162_2","unstructured":"Global Times. 2021. Chinese social media platforms delete actor\u2019s accounts of for hurting the nation after controversial photos of Yasukuni Shrine. Retrieved from https:\/\/www.globaltimes.cn\/page\/202108\/1231473.shtml. Accessed: 2022-09-27."},{"key":"e_1_3_2_163_2","unstructured":"Global Times. 2021. Chinese surrogacy scandal actress Zheng Shuang fined $46 million for tax evasion shows banned. Retrieved from https:\/\/www.globaltimes.cn\/page\/202108\/1232636.shtml. Accessed: 2022-09-27."},{"key":"e_1_3_2_164_2","unstructured":"Global Times. 2021. Works of scandals-hit actress Zhao Wei removed from platforms following ban on actor Zhang Zhehan for visiting Yasukuni Shrine. Retrieved from https:\/\/www.globaltimes.cn\/page\/202108\/1232631.shtml. Accessed: 2022-09-27."},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68821-9_38"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.014"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-081551504-3.50049-3"},{"key":"e_1_3_2_168_2","series-title":"Proceedings of Machine Learning Research","first-page":"10347","volume-title":"Proceedings of the 38th International Conference on Machine Learning","volume":"139","author":"Touvron Hugo","year":"2021","unstructured":"Hugo Touvron, Matthieu Cord, Matthijs Douze, Francisco Massa, Alexandre Sablayrolles, and Herve Jegou. 2021. Training data-efficient image transformers & distillation through attention. In Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol. 139), Marina Meila and Tong Zhang (Eds.). PMLR, 10347\u201310357."},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00202"},{"key":"e_1_3_2_170_2","doi-asserted-by":"publisher","unstructured":"S. Tripathy J. Kannala and E. Rahtu. 2020. ICface: Interpretable and controllable face reenactment using GANs. In 2020 IEEE Winter Conference on Applications of Computer Vision (WACV) IEEE Computer Society Los Alamitos CA USA 3374\u20133383. DOI:10.1109\/WACV45572.2020.9093474","DOI":"10.1109\/WACV45572.2020.9093474"},{"key":"e_1_3_2_171_2","volume-title":"Advances in Neural Information Processing Systems","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in Neural Information Processing Systems, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc."},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00872"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","unstructured":"Tianyi Wang Harry Cheng Kam Pui Chow and Liqiang Nie. 2023. Deep convolutional pooling transformer for deepfake detection. ACM Trans. Multimedia Comput. Commun. Appl. 19 6 (May 2023). DOI:10.1145\/3588574","DOI":"10.1145\/3588574"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","unstructured":"Tianyi Wang and Kam Pui Chow. 2023. Noise based deepfake detection via multi-head relative-interaction. In (AAAI\u201923\/IAAI\u201923\/EAAI\u201923) AAAI Press. DOI:10.1609\/aaai.v37i12.26701","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301395"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/157"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3146766"},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"e_1_3_2_180_2","unstructured":"Deressa Wodajo and Solomon Atnafu. 2021. Deepfake Video Detection Using Convolutional Vision Transformer. arXiv:2102.11126. Retrieved from https:\/\/arxiv.org\/abs\/2102.11126"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0104-6"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144878"},{"key":"e_1_3_2_184_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_37"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053969"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00044"},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00955"},{"key":"e_1_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00384"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00689"},{"key":"e_1_3_2_192_2","volume-title":"British Machine Vision Conference (BMVC)","author":"Zhang Yunxuan","year":"2019","unstructured":"Yunxuan Zhang, Siwei Zhang, Yue He, Cheng Li, Chen Change Loy, and Ziwei Liu. 2019. One-shot face reenactment. In British Machine Vision Conference (BMVC)."},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"e_1_3_2_195_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.229"},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","unstructured":"Bojia Zi Minghao Chang Jingjing Chen Xingjun Ma and Yu-Gang Jiang. 2020. WildDeepfake: A challenging real-world dataset for deepfake detection. 2382\u20132390. DOI:10.1145\/3394171.3413769","DOI":"10.1145\/3394171.3413769"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3699710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:52Z","timestamp":1750295392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3699710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":198,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3699710"],"URL":"https:\/\/doi.org\/10.1145\/3699710","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2023-02-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}