{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T22:45:51Z","timestamp":1774737951402,"version":"3.50.1"},"reference-count":37,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062922","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T04:12:18Z","timestamp":1742271138000},"page":"3351-3368","source":"Crossref","is-referenced-by-count":4,"title":["Deepfake Detection Method Based on Spatio-Temporal Information Fusion"],"prefix":"10.32604","volume":"83","author":[{"given":"Xinyi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wanru","family":"Song","sequence":"additional","affiliation":[]},{"given":"Chuanyan","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Deepfake. [cited 2019 Oct 29]. Available from: http:\/\/github.com\/deepfakes\/faceswap."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","article-title":"Generative adversarial networks: an overview","volume":"35","author":"Creswell","year":"2018","journal-title":"IEEE Signal Process Mag"},{"key":"ref3","unstructured":"Kingma DP, Welling M. Auto-encoding variational Bayes. arXiv:1312.6114. 2013."},{"key":"ref4","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"11254","article-title":"SemanticStyleGAN: learning compositional generative priors for controllable image synthesis and editing","author":"Shi","year":"2022 Jun 18\u201324"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Wang Y, Chen X, Zhu J, Chu W, Tai Y, Wang C, et al. HifiFace: 3D shape and semantic prior guided high fidelity face swapping. arXiv:2106.09965. 2021.","DOI":"10.24963\/ijcai.2021\/157"},{"key":"ref6","first-page":"1491","article-title":"Review of deep network generative fake face detection methods","volume":"36","author":"Yang","year":"2024","journal-title":"J Comput-Aided Des Comput Graph"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","article-title":"Exposing digital forgeries by detecting traces of resampling","volume":"53","author":"Popescu","year":"2005","journal-title":"IEEE Trans Signal Process"},{"key":"ref8","series-title":"IEEE Winter Applications of Computer Vision Workshops (WACVW)","first-page":"83","article-title":"Exploiting visual artifacts to expose deepfakes and face manipulations","author":"Matern","year":"2019 Jan 7\u201311"},{"key":"ref9","unstructured":"Pishori A, Rollins B, van Houten N, Chatwani N, Uraimov O. Detecting Deepfake videos: an analysis of three techniques. arXiv:2007.08517. 2020."},{"key":"ref10","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","first-page":"666","article-title":"Deepfake detection by analyzing convolutional traces","author":"Guarnera","year":"2020 Jun 14\u201319"},{"key":"ref11","first-page":"1","article-title":"FakeCatcher: detection of synthetic portrait videos using biological signals","volume":"43","author":"Ciftci","year":"2020","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref12","series-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","article-title":"In ictu oculi: exposing AI-created fake videos by detecting eye blinking","author":"Li","year":"2018 Dec 11\u201313"},{"key":"ref13","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"5001","article-title":"Face X-ray for more general face forgery detection","author":"Li","year":"2020 Jun 13\u201319"},{"key":"ref14","first-page":"370","article-title":"A study on face anti-spoofing based on semi-supervised learning","volume":"3","author":"Li","year":"2021","journal-title":"Chin J Intell Sci Technol"},{"key":"ref15","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"2929","article-title":"Face forgery detection by 3D decomposition","author":"Zhu","year":"2021 Jun 20\u201325"},{"key":"ref16","series-title":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","article-title":"Mesonet: a compact facial video forgery detection network","author":"Afchar","year":"2018 Dec 11\u201313"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"Chugh K, Gupta P, Dhall A, Subramanian R. Not made for each other Audio-visual dissonance-based deepfake detection and localization. arXiv:2007.08517. 2020.","DOI":"10.1145\/3394171.3413700"},{"key":"ref18","first-page":"467","article-title":"Multi-branch deepfake detection algorithm based on fine-grained features","volume":"77","author":"Qin","year":"2023","journal-title":"Computers Mater Contin"},{"key":"ref19","series-title":"ICASSP 2019\u20142019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2307","article-title":"Capsule-forensics: using capsule networks to detect forged images and videos","author":"Nguyen","year":"2019 May 12\u201317"},{"key":"ref20","series-title":"2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems","article-title":"Multi-task learning for detecting and segmenting manipulated facial images and videos","author":"Nguyen","year":"2019 Sep 23\u201326"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","article-title":"Deepfake detection based on discrepancies between faces and their context","volume":"44","author":"Nirkin","year":"2021","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref22","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"2185","article-title":"Multi-attentional deepfake detection","author":"Zhao","year":"2021 Jun 20\u201325"},{"key":"ref23","series-title":"Proceedings of the 2022 International Conference on Multimedia Retrieval","first-page":"615","article-title":"M2tr: multi-modal multi-scale transformers for deepfake detection","author":"Wang","year":"2022 Jun 27\u201330"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"Keresh A, Shamoi P. Liveness detection in computer vision: transformer-based self-supervised learning for face anti-spoofing. arXiv:2406.138602024. 2024.","DOI":"10.1109\/ACCESS.2024.3513795"},{"key":"ref25","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops","first-page":"46","article-title":"Exposing deepfake videos by detecting face warping artifacts","author":"Li","year":"2019 Jun 16\u201317"},{"key":"ref26","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, et al. An image is worth 16 \u00d7 16 words: transformers for image recognition at scale. arXiv:2010.11929. 2020."},{"key":"ref27","unstructured":"FakeApp. [cited 2025 Jan 1]. Available from: https:\/\/www.fakeapp.org\/download."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1109\/TPAMI.2016.2644615","article-title":"SegNet: a deep convolutional encoder-decoder architecture for image segmentation","volume":"39","author":"Badrinarayanan","year":"2017","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref29","unstructured":"DeepFaceLab. [cited 2023 Oct 3]. Available from: http:\/\/github.com\/iperov\/DeepFaceLab."},{"key":"ref30","unstructured":"DFaker. [cited 2022 May 1]. Available from: http:\/\/github.com\/dfaker\/df."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/jimaging9060122","article-title":"A robust approach to multimodal deepfake detection","volume":"9","author":"Salvi","year":"2023","journal-title":"J Imaging"},{"key":"ref32","series-title":"2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","first-page":"1428","article-title":"Detecting deepfakes: using CNN to identify manipulated visual media","author":"Sunanda","year":"2024 Oct 3\u20135"},{"key":"ref33","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref34","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6299","article-title":"Quo Vadis, action recognition? A new model and the kinetics dataset","author":"Carreira","year":"2017 Jul 21\u201326"},{"key":"ref35","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","article-title":"FaceForensics++: learning to detect manipulated facial images","author":"R\u00f6ssler","year":"2019 Oct 27\u2013Nov 2"},{"key":"ref36","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3207","article-title":"Celeb-DF: a large-scale challenging dataset for deepfake forensics","author":"Li","year":"2020 Jun 13\u201319"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TBIOM.2022.3201887","article-title":"Motion magnified 3-D residual-in-dense network for deepfake detection","volume":"5","author":"Mehra","year":"2023","journal-title":"IEEE Trans Biom Behav Identity Sci"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_62922\/TSP_CMC_62922.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:21Z","timestamp":1763341641000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062922","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}