{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:05:43Z","timestamp":1763345143293,"version":"3.45.0"},"reference-count":39,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062330","type":"journal-article","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T07:12:27Z","timestamp":1753427547000},"page":"1161-1184","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Multimodal AIGC Video Detection for Identifying Fake Videos Generated by Large Models"],"prefix":"10.32604","volume":"85","author":[{"given":"Yong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tianning","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Daofu","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Li","family":"Di","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3313","DOI":"10.1109\/TKDE.2021.3130191","article-title":"A review on generative adversarial networks: algorithms, theory, and applications","volume":"35","author":"Gui","year":"2021","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref2","first-page":"1","article-title":"How generative adversarial networks and their variants work: an overview","volume":"52","author":"Hong","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/MNET.006.2300223","article-title":"Exploring collaborative distributed diffusion-based AI-generated content (AIGC) in wireless networks","volume":"38","author":"Du","year":"2023","journal-title":"IEEE Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MITP.2020.2985492","article-title":"\u201cAll around me are synthetic faces\u201d: the mad world of AI-generated media","volume":"22","author":"Whittaker","year":"2020","journal-title":"IT Prof"},{"key":"ref5","first-page":"1","article-title":"Exploring the potential implications of AI-generated content in social engineering attacks","volume":"16","author":"Alahmed","year":"2024","journal-title":"Int J Comput Digit Syst"},{"key":"ref6","first-page":"103","article-title":"Navigating the grey area: copyright implications of AI generated content","volume":"29","author":"Vishnu","year":"2024","journal-title":"J Intell Prop Rights"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"183","DOI":"10.32628\/CSEIT217334","article-title":"Deep fake: an understanding of fake images and videos","volume":"7","author":"Negi","year":"2021","journal-title":"Int J Scientific Res Comput Sci Eng Inf Technol"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1007\/s11042-020-09974-4","article-title":"A comprehensive survey on passive techniques for digital video forgery detection","volume":"80","author":"Shelke","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4241","DOI":"10.1007\/s11042-023-15609-1","article-title":"A comprehensive taxonomy on multimedia video forgery detection techniques: challenges and novel trends","volume":"83","author":"El-Shafai","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"2772","DOI":"10.1109\/TMI.2020.2975344","article-title":"Hi-net: hybrid-fusion network for multi-modal MR image synthesis","volume":"39","author":"Zhou","year":"2020","journal-title":"IEEE Trans Med Imaging"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"9236","DOI":"10.1109\/TPAMI.2021.3125995","article-title":"AF: an association-based fusion method for multi-modal classification","volume":"44","author":"Liang","year":"2021","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/TAI.2021.3064901","article-title":"Fake profile detection on social networking websites: a comprehensive review","volume":"1","author":"Roy","year":"2020","journal-title":"IEEE Trans Artif Intell"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1177\/1365712718807226","article-title":"Determining authenticity of video evidence in the age of artificial intelligence and in the wake of Deepfake videos","volume":"23","author":"Maras","year":"2019","journal-title":"Int J Evid Proof"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s00371-021-02347-4","article-title":"A detailed analysis of image and video forgery detection techniques","volume":"39","author":"Tyagi","year":"2023","journal-title":"Vis Comput"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1007\/s11277-020-07126-3","article-title":"Deep convolutional neural network for graphics forgery detection in video","volume":"112","author":"Kaur","year":"2020","journal-title":"Wirel Pers Commun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"27109","DOI":"10.1007\/s11042-017-5083-1","article-title":"Video tamper detection based on multi-scale mutual information","volume":"78","author":"Wei","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TMM.2019.2925961","article-title":"Using blockchain for improved video integrity verification","volume":"22","author":"Ghimire","year":"2019","journal-title":"IEEE Trans Multimedia"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"11527","DOI":"10.1007\/s11042-018-6585-1","article-title":"Video frame and region duplication forgery detection based on correlation coefficient and coefficient of variation","volume":"78","author":"Singh","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TCSVT.2021.3074259","article-title":"Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network","volume":"32","author":"Hu","year":"2021","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2887","DOI":"10.1007\/s11042-020-08836-3","article-title":"Deep learning-based late fusion of multimodal information for emotion classification of music video","volume":"80","author":"Pandeya","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/JSTSP.2020.2987728","article-title":"Multimodal intelligence: representation learning, information fusion, and applications","volume":"14","author":"Zhang","year":"2020","journal-title":"IEEE J Sel Top Signal Process"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"21503","DOI":"10.1007\/s00521-021-06086-4","article-title":"Predicting image credibility in fake news over social media using multi-modal approach","volume":"34","author":"Singh","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s13042-019-01056-8","article-title":"Emotion recognition using multimodal deep learning in multiple psychophysiological signals and video","volume":"11","author":"Wang","year":"2020","journal-title":"Int J Mach Learn Cybern"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1960","DOI":"10.1109\/LSP.2024.3433596","article-title":"AVT\u00b2-DWF: improving deepfake detection with audio-visual fusion and dynamic weighting strategies","volume":"31","author":"Wang","year":"2024","journal-title":"IEEE Signal Process Lett"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"128128","DOI":"10.1016\/j.neucom.2024.128128","article-title":"Feature fusion vision transformers using MLP-mixer for enhanced deepfake detection","volume":"598","author":"Essa","year":"2024","journal-title":"Neurocomputing"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"30335","DOI":"10.1007\/s11042-019-07863-z","article-title":"Human vision inspired feature extraction for facial expression recognition","volume":"78","author":"Sadeghi","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TASLP.2019.2913091","article-title":"Constrained learned feature extraction for acoustic scene classification","volume":"27","author":"Zhang","year":"2019","journal-title":"IEEE ACM Trans Audio\n\nSpeech Lang Process"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1007\/s11760-020-01701-8","article-title":"Bridging the gap between the short-time Fourier transform (STFT), wavelets, the constant-Q transform and multi-resolution STFT","volume":"14","author":"Mateo","year":"2020","journal-title":"Signal Image Video Process"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"5856","DOI":"10.1016\/j.jksuci.2021.07.012","article-title":"A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition","volume":"34","author":"Begum","year":"2022","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"3713","DOI":"10.1007\/s11042-022-13428-4","article-title":"Natural language processing: state of the art, current trends and challenges","volume":"82","author":"Khurana","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"5789","DOI":"10.1007\/s10462-021-09958-2","article-title":"Transformer models for text-based emotion detection: a review of BERT-based approaches","volume":"54","author":"Acheampong","year":"2021","journal-title":"Artif Intell Rev"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"18431","DOI":"10.1007\/s00500-020-05049-6","article-title":"Novel OGBEE-based feature selection and feature-level fusion with MLP neural network for social media multimodal sentiment analysis","volume":"24","author":"Bairavel","year":"2020","journal-title":"Soft Comput"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"6558","DOI":"10.18653\/v1\/P19-1656","article-title":"Multimodal transformer for unaligned multimodal language sequences","volume":"2019","author":"Tsai","year":"2019","journal-title":"Proc Conf Assoc Comput Linguist Meet"},{"key":"ref34","first-page":"5","article-title":"An improvised CNN model for fake image detection","volume":"15","author":"Hamid","year":"2023","journal-title":"Int J Inf Technol"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"53549","DOI":"10.1007\/s11042-023-17588-9","article-title":"A generalized novel image forgery detection method using generative adversarial network","volume":"83","author":"Sharma","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref36","first-page":"1053","article-title":"A method of detection of deepfake using bidirectional convolutional LSTM","volume":"30","author":"Lee","year":"2020","journal-title":"J Korea Inst Inf Secur Cryptol"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","article-title":"Deep fake video detection using transfer learning approach","volume":"48","author":"Suratkar","year":"2023","journal-title":"Arab J Sci Eng"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"4027","DOI":"10.1109\/TCSVT.2023.3238517","article-title":"Exploiting complementary dynamic incoherence for deepfake video detection","volume":"33","author":"Wang","year":"2023","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref39","first-page":"169","article-title":"A performance enhancement of deepfake video detection through the use of a hybrid CNN deep learning model","volume":"14","author":"Ikram","year":"2023","journal-title":"Int J Electr Comput Eng Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_62330\/TSP_CMC_62330.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:02:27Z","timestamp":1763344947000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062330","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}