{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:39:11Z","timestamp":1776883151904,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","funder":[{"name":"Ministry of Education, Singapore, MOE AcRF TIER 3 Grant","award":["MOE-MOET32022-0001"],"award-info":[{"award-number":["MOE-MOET32022-0001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3754544","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:38:54Z","timestamp":1761377934000},"page":"7210-7219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["FractalForensics: Proactive Deepfake Detection and Localization via Fractal Watermarks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2920-6099","authenticated-orcid":false,"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7436-0162","authenticated-orcid":false,"given":"Harry","family":"Cheng","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7242-5452","authenticated-orcid":false,"given":"Ming-Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4846-2015","authenticated-orcid":false,"given":"Mohan","family":"Kankanhalli","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Les objets fractals, par B","volume":"64","author":"Allezaud Robert","year":"1985","unstructured":"Robert Allezaud. 1985. Les objets fractals, par B. Mandelbrot. Communication & Langages, Vol. 64, 1 (Jan. 1985), 123-124.","journal-title":"Mandelbrot. Communication & Langages"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00046"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 7115-7125","author":"Bounareli S.","unstructured":"S. Bounareli, C. Tzelepis, V. Argyriou, I. Patras, and G. Tzimiropoulos. 2023a. HyperReenact: One-Shot Reenactment via Jointly Learning to Refine and Retarget Faces. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 7115-7125."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE 17th International Conference on Automatic Face and Gesture Recognition. 1-8.","author":"Bounareli S.","unstructured":"S. Bounareli, C. Tzelepis, V. Argyriou, I. Patras, and G. Tzimiropoulos. 2023b. StyleMask: Disentangling the Style Space of StyleGAN2 for Neural Face Reenactment. In IEEE 17th International Conference on Automatic Face and Gesture Recognition. 1-8."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00341"},{"key":"e_1_3_2_1_10_1","first-page":"770","volume-title":"Deep Residual Learning for Image Recognition. IEEE Conference on Computer Vision and Pattern Recognition","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, X. Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. IEEE Conference on Computer Vision and Pattern Recognition (2016), 770-778."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01199431"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_13_1","unstructured":"Gary B. Huang Marwan Mattar Honglak Lee and Erik Learned-Miller. 2012. Learning to Align from Scratch. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Learning Representations.","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169921"},{"key":"e_1_3_2_1_18_1","volume-title":"Moe-ffd: Mixture of experts for generalized and parameter-efficient face forgery detection. arXiv preprint arXiv:2404.08452","author":"Kong Chenqi","year":"2024","unstructured":"Chenqi Kong, Anwei Luo, Peijun Bao, Yi Yu, Haoliang Li, Zengwei Zheng, Shiqi Wang, and Alex C Kot. 2024. Moe-ffd: Mixture of experts for generalized and parameter-efficient face forgery detection. arXiv preprint arXiv:2404.08452 (2024)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3541028"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00829"},{"key":"e_1_3_2_1_22_1","volume-title":"Forgery-aware adaptive learning with vision transformer for generalized face forgery detection","author":"Luo Anwei","year":"2024","unstructured":"Anwei Luo, Rizhao Cai, Chenqi Kong, Yakun Ju, Xiangui Kang, Jiwu Huang, and Alex C Kot Life. 2024. Forgery-aware adaptive learning with vision transformer for generalized face forgery detection. IEEE Transactions on Circuits and Systems for Video Technology (2024)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3332218"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547950"},{"key":"e_1_3_2_1_25_1","volume-title":"The Fractal Geometry of Nature","author":"Mandelbrot Beno\u00eet B.","unstructured":"Beno\u00eet B. Mandelbrot. 1982. The Fractal Geometry of Nature. W.H. Freeman and Company, New York."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3640466"},{"key":"e_1_3_2_1_28_1","volume-title":"DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios","author":"Qu Zuomin","year":"2024","unstructured":"Zuomin Qu, Zuping Xi, Wei Lu, Xiangyang Luo, Qian Wang, and Bin Li. 2024. DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.819848"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01816"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897756"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Pu Sun Honggang Qi Yuezun Li and Siwei Lyu. 2024. FakeTracer: Catching Face-swap DeepFakes via Implanting Traces in Training.","DOI":"10.1109\/TETC.2024.3386960"},{"key":"e_1_3_2_1_34_1","first-page":"126977","article-title":"RLE: A unified perspective of data augmentation for cross-spectral re-identification","volume":"37","author":"Tan Lei","year":"2024","unstructured":"Lei Tan, Yukang Zhang, Keke Han, Pingyang Dai, Yan Zhang, Yongjian Wu, and Rongrong Ji. 2024. RLE: A unified perspective of data augmentation for cross-spectral re-identification. Advances in Neural Information Processing Systems, Vol. 37 (2024), 126977-126996.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_35_1","unstructured":"Jan van Leeuwen (Ed.). 1991. Handbook of theoretical computer science (vol. A): algorithms and complexity."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475518"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588574"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26701"},{"key":"e_1_3_2_1_39_1","unstructured":"Tianyi Wang Mengxiao Huang Harry Cheng Bin Ma and Yinglong Wang. 2024a. Robust Identity Perceptual Watermark Against Deepfake Face Swapping."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680869"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3354573"},{"key":"e_1_3_2_1_42_1","volume-title":"Xiaodong Lin, and Yinglong Wang.","author":"Wang Tianyi","year":"2024","unstructured":"Tianyi Wang, Xin Liao, Kam Pui Chow, Xiaodong Lin, and Yinglong Wang. 2024d. Deepfake Detection: A Comprehensive Survey from the Reliability Perspective. Comput. Surveys (2024)."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision.","author":"Wang Tianyi","year":"2025","unstructured":"Tianyi Wang, Shuaicheng Niu, Harry Cheng, Xiao Zhang, and Yinglong Wang. 2025. NullSwap: Proactive Identity Cloaking Against Deepfake Face Swapping. In Proceedings of the IEEE\/CVF International Conference on Computer Vision."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018323.2018340"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612471"},{"key":"e_1_3_2_1_46_1","volume-title":"Designing One Unified Framework for High-Fidelity Face Reenactment and Swapping. In European Conference on Computer Vision. 54-71","author":"Xu Chao","year":"2022","unstructured":"Chao Xu, Jiangning Zhang, Yue Han, Guanzhong Tian, Xianfang Zeng, Ying Tai, Yabiao Wang, Chengjie Wang, and Yong Liu. 2022. Designing One Unified Framework for High-Fidelity Face Reenactment and Swapping. In European Conference on Computer Vision. 54-71."},{"key":"e_1_3_2_1_47_1","unstructured":"Yuankun Yang Chenyue Liang Hongyu He Xiaoyu Cao and Neil Zhenqiang Gong. 2021. FaceGuard: Proactive Deepfake Detection."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Xuanyu Zhang Zecheng Tang Zhipei Xu Runyi Li Youmin Xu Bin Chen Feng Gao and Jian Zhang. 2025. OmniGuard: Hybrid Manipulation Localization via Augmented Versatile Deep Image Watermarking.","DOI":"10.1109\/CVPR52734.2025.00286"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00828"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00458"},{"key":"e_1_3_2_1_52_1","volume-title":"HiDDeN: Hiding Data With Deep Networks. In European Conference on Computer Vision. 682-697","author":"Zhu Jiren","year":"2018","unstructured":"Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. HiDDeN: Hiding Data With Deep Networks. In European Conference on Computer Vision. 682-697."}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","location":"Dublin Ireland","acronym":"MM '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3754544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T04:13:30Z","timestamp":1765340010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3754544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":52,"alternative-id":["10.1145\/3746027.3754544","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3754544","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}