{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:34:32Z","timestamp":1773002072289,"version":"3.50.1"},"reference-count":48,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"vor","delay-in-days":264,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100010887","name":"Weifang University of Science and Technology","doi-asserted-by":"publisher","award":["2024RWBS03"],"award-info":[{"award-number":["2024RWBS03"]}],"id":[{"id":"10.13039\/501100010887","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>The rapid development of deepfake technology has led to the generation of a large amount of tampered video and image content, posing a major challenge to content authenticity verification. In particular, detecting deepfakes in image sequences (e.g., agricultural product packaging) is particularly difficult because the anomalies introduced by the tampering techniques are often subtle and temporally continuous. In this paper, we propose a new deepfake detection method based on time series, combining independent component analysis (FastICA) with anomaly detection techniques. We first apply FastICA to extract independent components from image sequences to identify anomalous visual patterns that are unique to deepfake tampering. In addition, we use an efficient anomaly detection algorithm, LSHiforest, to achieve scalable and accurate identification of suspicious sequences. Experimental results show that the proposed method can still detect deepfake content with high accuracy in challenging scenarios with complex temporal dynamics. Our work provides a promising solution for real\u2010time and large\u2010scale detection of deepfake content in dynamic media.<\/jats:p>","DOI":"10.1155\/int\/8566328","type":"journal-article","created":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T14:05:12Z","timestamp":1758549912000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deepfake Detection in Image Sequences: A Temporal Approach for Anomaly Detection"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2205-8978","authenticated-orcid":false,"given":"Rongju","family":"Yao","sequence":"first","affiliation":[]},{"given":"Zhiqing","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Tong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6763-6626","authenticated-orcid":false,"given":"Khosro","family":"Rezaee","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,9,22]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/int\/7084582"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010104"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.26599\/bdma.2024.9020030"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"KorshunovP.andMarcelS. Deepfake Video Detection Using Recurrent Neural Networks Proceedings of the International Conference on Biometrics (ICB 2018) February 2018 Gold Coast Australia 1\u20138.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010002"},{"key":"e_1_2_11_6_2","unstructured":"GoodfellowI. Pouget-AbadieJ. MirzaM.et al. Generative Adversarial Nets Proceedings of the 27th International Conference on Neural Information Processing Systems November 2014 Bangkok Thailand 2672\u20132680."},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2023.3262419"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/7578036"},{"key":"e_1_2_11_9_2","article-title":"RUP-GAN: a Black-Box Attack Method for Social Intelligence Recommendation Systems Based on Adversarial Learning","volume":"20","author":"Yu S.","year":"2025","journal-title":"Big Data Mining and Analytics"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010049"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.26599\/bdma.2024.9020047"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2023.9010023"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.26599\/bdma.2024.9020048"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"NguyenH. YamagishiJ. andEchizenI. Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing April 2019 Minneapolis MN 2307\u20132311.","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"e_1_2_11_15_2","unstructured":"AgarwalS. FaridH. GuY. HeM. NaganoK. andLiH. Protecting World Leaders Against Deep Fakes Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops June 2020 Nashville TN 1\u20139."},{"key":"e_1_2_11_16_2","first-page":"80","article-title":"Recurrent Convolutional Strategies for Face Manipulation Detection in Videos","volume":"3","author":"Sabir Cjjaawminp E.","year":"2019","journal-title":"Interfaces"},{"key":"e_1_2_11_17_2","first-page":"6193","article-title":"In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking","volume":"29","author":"Li Y.","year":"2020","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_2_11_18_2","first-page":"1821","article-title":"Fakecatcher: Detection of Synthetic Portrait Videos Using Biological Signals","volume":"42","author":"Wang Y.","year":"2020","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_2_11_19_2","unstructured":"DolhanskyB. HowesR. PflaumB. BaramN. andFerrerC. The Deepfake Detection Challenge (DFDC) Preview Dataset Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops June 2020 Nashville TN 1\u201310."},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3159538"},{"key":"e_1_2_11_21_2","first-page":"4957","article-title":"Few-Shot fast-adaptive Anomaly Detection","volume":"35","author":"Wang Z.","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-231187"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3094295"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109348"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218001421520030"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"LiuW. ChenC. LiaoX.et al. Learning Accurate and Bidirectional Transformation via Dynamic Embedding Transportation for Cross-Domain Recommendation Proceedings of the AAAI Conference on Artificial Intelligence May 2024 Vancouver Canada.","DOI":"10.1609\/aaai.v38i8.28728"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2021.3116679"},{"key":"e_1_2_11_28_2","unstructured":"KDD Cup 1999 Data 2024 http:\/\/kdd.ics.uci.edu\/databases\/kddcup99."},{"key":"e_1_2_11_29_2","unstructured":"CaoY. XiangH. ZhangH. ZhuY. andTingK. M. Anomaly Detection Based on Isolation Mechanisms: a Survey 2024."},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"AndoniA. RazenshteynI. andNosatzkiN. S. Lsh Forest: Practical Algorithms Made Theoretical Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms Society for Industrial and Applied Mathematics January 2017 Philadelphia PA 67\u201378 https:\/\/doi.org\/10.1137\/1.9781611974782.5.","DOI":"10.1137\/1.9781611974782.5"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33016431"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2024.3389714"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-91805-3"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2024.124221"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102182"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.030"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2017.2733018"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3345431"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.051"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3310077"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120217"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2015.2511764"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2024.3402561"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983642"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2022.3207310"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2023.123639"},{"key":"e_1_2_11_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2023.3259431"},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102454"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/8566328","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/8566328","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/8566328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:10:22Z","timestamp":1772993422000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/8566328"}},"subtitle":[],"editor":[{"given":"Beijing","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/8566328"],"URL":"https:\/\/doi.org\/10.1155\/int\/8566328","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-01-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8566328"}}