{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:10:01Z","timestamp":1763345401697,"version":"3.45.0"},"reference-count":53,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066307","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T07:42:54Z","timestamp":1752219774000},"page":"905-923","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network"],"prefix":"10.32604","volume":"85","author":[{"given":"Yuanqing","family":"Ding","sequence":"first","affiliation":[]},{"given":"Hanming","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Qiming","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Fanliang","family":"Bu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"author":"Li","article-title":"In ictu oculi: exposing AI created fake videos by detecting eye blinking","series-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS); 2018 Dec 11\u201313; Hong Kong, China","key":"ref1"},{"key":"ref2","article-title":"FakeCatcher: detection of synthetic portrait videos using biological signals","author":"Ciftci","year":"2020","journal-title":"IEEE Trans Pattern Anal Mach Intell Forthcoming"},{"author":"Agarwal","article-title":"Detecting deep-fake videos from phoneme-viseme mismatches","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW); 2020 Jun 14\u201319","key":"ref3"},{"unstructured":"Durall R, Keuper M, Pfreundt FJ, Keuper J. Unmasking DeepFakes with simple features. arXiv:1911.00686. 2019.","key":"ref4"},{"author":"Li","article-title":"Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","key":"ref5"},{"author":"Liu","article-title":"Spatial-phase shallow learning: rethinking face forgery detection in frequency domain","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","key":"ref6"},{"key":"ref7","first-page":"1304","article-title":"Deepfake face detection via multi-level discrete wavelet transform and vision transformer","volume":"97","author":"Uddin","year":"2025","journal-title":"Vis Comput"},{"author":"Luo","article-title":"Generalizing face forgery detection with high-frequency features","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","key":"ref8"},{"author":"Chollet","article-title":"Xception: deep learning with depthwise separable convolutions","series-title":"Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2017 Jul 21\u201326","key":"ref9"},{"author":"Li","article-title":"Face X-ray for more general face forgery detection","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 Jun 13\u201319","key":"ref10"},{"author":"Afchar","article-title":"MesoNet: a compact facial video forgery detection network","series-title":"Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS); 2018 Dec 11\u201313","key":"ref11"},{"author":"Coccomini","article-title":"Combining EfficientNet and vision transformers for video deepfake detection","series-title":"Proceedings of the Image Analysis and Processing\u2014ICIAP 2022; 2022 May 23\u201327","key":"ref12"},{"author":"Zhao","article-title":"Multi-attentional deepfake detection","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2021 Jun 20\u201325","key":"ref13"},{"author":"Deressa","article-title":"Improved deepfake video detection using convolutional vision transformer","series-title":"Proceedings of the 2024 IEEE Gaming, Entertainment, and Media Conference (GEM); 2024 Jun 5\u20137","key":"ref14"},{"unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, et al. An image is worth 16 \u00d7 16 words: transformers for image recognition at scale. arXiv:2010.11929. 2020.","key":"ref15"},{"key":"ref16","first-page":"6105","article-title":"EfficientNet: rethinking model scaling for convolutional neural networks","volume":"97","author":"Tan","year":"2019","journal-title":"Proc Mach Learn Res"},{"unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, et al. The DeepFake detection challenge (DFDC) dataset. arXiv:2006.07397. 2020.","key":"ref17"},{"author":"Qian","article-title":"Thinking in frequency: face forgery detection by mining frequency-aware clues","series-title":"Proceedings of the Computer Vision\u2014ECCV 2020; 2020 Aug 23\u201328","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"4746","DOI":"10.1007\/s11263-024-02116-5","article-title":"WATCHER: wavelet-guided texture-content hierarchical relation learning for deepfake detection","volume":"132","author":"Wang","year":"2024","journal-title":"Int J Comput Vis"},{"author":"Wang","article-title":"Dynamic graph learning with content-guided spatial-frequency relation reasoning for deepfake detection","series-title":"Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2023 Jun 17\u201324","key":"ref20"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","article-title":"Noiseprint: a CNN-based camera model fingerprint","volume":"15","author":"Cozzolino","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"author":"Cozzolino","article-title":"Extracting camera-based fingerprints for video forensics","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops; 2019 Jun 16\u201320","key":"ref22"},{"author":"El Rai","article-title":"Fighting deepfake by residual noise using convolutional neural networks","series-title":"Proceedings of the 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS); 2020 Nov 25\u201326","key":"ref23"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"69031","DOI":"10.1109\/ACCESS.2022.3185121","article-title":"Detection enhancement for various deepfake types based on residual noise and manipulation traces","volume":"10","author":"Kang","year":"2022","journal-title":"IEEE Access"},{"author":"Zhou","article-title":"Two-stream neural networks for tampered face detection","series-title":"Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW); 2017 Jul 21\u201326","key":"ref25"},{"key":"ref26","first-page":"735","article-title":"Exploiting fine-grained face forgery clues via progressive enhancement learning","volume":"36","author":"Gu","year":"2022","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"author":"Zhou","article-title":"Learning rich features for image manipulation detection","series-title":"Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323","key":"ref28"},{"author":"Rao","article-title":"A deep learning approach to detection of splicing and copy-move forgeries in images","series-title":"Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS); 2016 Dec 4\u20137","key":"ref29"},{"author":"Vaswani","article-title":"Attention is all you need","series-title":"Proceedings of the Advances in Neural Information Processing Systems 30 (NIPS 2017); 2017 Dec 4\u20139","key":"ref30"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TMM.2021.3120873","article-title":"EAPT: efficient attention pyramid transformer for image processing","volume":"25","author":"Lin","year":"2021","journal-title":"IEEE Trans Multimed"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"4499","DOI":"10.1109\/TNNLS.2021.3116209","article-title":"BaGFN: broad attentive graph fusion network for high-order feature interactions","volume":"34","author":"Xie","year":"2023","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"author":"Ye","article-title":"Cross-modal self-attention network for referring image segmentation","series-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2019 Jun 15\u201320","key":"ref33"},{"author":"Chen","article-title":"CrossViT: cross-attention multi-scale vision transformer for image classification","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV); 2021 Oct 10\u201317","key":"ref34"},{"author":"He","article-title":"Deep residual learning for image recognition","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2016 Jun 27\u201330","key":"ref35"},{"author":"Rossler","article-title":"FaceForensics++: learning to detect manipulated facial images","series-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV); 2019 Oct 27\u2013Nov 2","key":"ref36"},{"author":"Li","article-title":"Celeb-DF: a large-scale challenging dataset for DeepFake forensics","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2020 Jun 13\u201319","key":"ref37"},{"unstructured":"Deepfakes [Internet]. [cited 2025 Feb 12]. Available from: https:\/\/github.com\/deepfakes\/faceswap.","key":"ref38"},{"author":"Thies","article-title":"Face2Face: real-time face capture and reenactment of RGB videos","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2016 Jun 27\u201330","key":"ref39"},{"unstructured":"Faceswap [Internet]. [cited 2025 Feb 12]. Available from: https:\/\/github.com\/MarekKowalski\/FaceSwap.","key":"ref40"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3306346.3323035","article-title":"Deferred neural rendering","volume":"38","author":"Thies","year":"2019","journal-title":"ACM Trans Graph"},{"unstructured":"Timesler. Pretrained Pytorch face detection (MTCNN) and recognition (InceptionResnet) models [Internet]. [cited 2025 Feb 12]. Available from: https:\/\/github.com\/timesler\/facenet-pytorch.","key":"ref42"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"125","DOI":"10.3390\/info11020125","article-title":"Albumentations: fast and flexible image augmentations","volume":"11","author":"Buslaev","year":"2020","journal-title":"Information"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"22678","DOI":"10.1109\/ACCESS.2022.3152029","article-title":"Convolutional neural network based on diverse Gabor filters for deepfake recognition","volume":"10","author":"Khalifa","year":"2022","journal-title":"IEEE Access"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1922","DOI":"10.1109\/TIFS.2023.3344293","article-title":"Adaptive texture and spectrum clue mining for generalizable face forgery detection","volume":"19","author":"Liu","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"author":"Zi","article-title":"WildDeepfake: a challenging real-world dataset for deepfake detection","series-title":"Proceedings of the 28th ACM International Conference on Multimedia; 2020 Oct 12\u201316","key":"ref46"},{"author":"Masi","article-title":"Two-branch recurrent network for isolating deepfakes in videos","series-title":"Proceedings of the Computer Vision\u2014ECCV 2020; 2020 Aug 23\u201328","key":"ref47"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"45421","DOI":"10.1109\/ACCESS.2020.2968612","article-title":"Generative adversarial ensemble learning for face forensics","volume":"8","author":"Baek","year":"2020","journal-title":"IEEE Access"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"6111","DOI":"10.1109\/TPAMI.2021.3093446","article-title":"DeepFake detection based on discrepancies between faces and their context","volume":"44","author":"Nirkin","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"author":"Cozzolino","article-title":"Recasting residual-based local descriptors as convolutional neural networks","series-title":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security; 2017 Jun 20\u201322","key":"ref50"},{"author":"Bayar","article-title":"A deep learning approach to universal image manipulation detection using a new convolutional layer","series-title":"Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security; 2016 Jun 20\u201322","key":"ref51"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"119352","DOI":"10.1016\/j.ins.2023.119352","article-title":"HolisticDFD: infusing spatiotemporal transformer embeddings for deepfake detection","volume":"645","author":"Anas Raza","year":"2023","journal-title":"Inf Sci"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"e0311720","DOI":"10.1371\/journal.pone.0311720","article-title":"Multi-feature fusion based face forgery detection with local and global characteristics","volume":"19","author":"Ding","year":"2024","journal-title":"PLoS One"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66307\/TSP_CMC_66307.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:05:53Z","timestamp":1763345153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066307","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}