{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:38:59Z","timestamp":1776933539434,"version":"3.51.2"},"reference-count":52,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":305,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.070422","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T14:31:34Z","timestamp":1759933894000},"page":"5671-5702","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Multimodal Deep Fusion Network for Face Antis Poofing with Cross-Axial Attention and Deep Reinforcement Learning Technique"],"prefix":"10.32604","volume":"85","author":[{"given":"Diyar Wirya Omar","family":"Ameenulhakeem","sequence":"first","affiliation":[]},{"given":"Osman Nuri","family":"U\u00e7an","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"179010","DOI":"10.1109\/ACCESS.2024.3486552","article-title":"The evolution of biometric authentication: a deep dive into multi-modal facial recognition: a review case study","volume":"12","author":"Abdul-Al","year":"2024","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3859","DOI":"10.1007\/s00521-023-09288-0","article-title":"A comprehensive evaluation of feature-based AI techniques for deepfake detection","volume":"36","author":"Sandotra","year":"2024","journal-title":"Neural Comput Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"643424","DOI":"10.3389\/frai.2021.643424","article-title":"MagNet: detecting digital presentation attacks on face recognition","volume":"4","author":"Agarwal","year":"2021","journal-title":"Front Artif Intell"},{"key":"ref4","unstructured":"Dalvi J, Bafna S, Bagaria D, Virnodkar S. A survey on face recognition systems. arXiv:2201.02991. 2022."},{"key":"ref5","first-page":"5609","article-title":"Deep learning for face anti-spoofing: a survey","volume":"45","author":"Yu","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2461","DOI":"10.1007\/s00371-021-02123-4","article-title":"A robust framework for spoofing detection in faces using deep learning","volume":"38","author":"Arora","year":"2022","journal-title":"Vis Comput"},{"key":"ref7","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"277","article-title":"One-class face anti-spoofing via spoof cue map-guided feature learning","author":"Huang","year":"2024 Jun 16\u201322"},{"key":"ref8","first-page":"3697","article-title":"SLIP: spoof-aware one-class face anti-spoofing with language image pretraining","volume":"39","author":"Huang","year":"2025","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"6891","DOI":"10.3390\/app15126891","article-title":"Face anti-spoofing based on deep learning: a comprehensive survey","volume":"15","author":"Xing","year":"2025","journal-title":"Appl Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/116.20240053","article-title":"A survey on deep learning-based face anti-spoofing","volume":"13","author":"Huang","year":"2024","journal-title":"APSIPA Trans Signal Inf Process"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s00521-022-07779-0","article-title":"Policy-based optimization: single-step policy gradient method seen as an evolution strategy","volume":"35","author":"Viquerat","year":"2023","journal-title":"Neural Comput Appl"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.1007\/s10462-021-10061-9","article-title":"Deep reinforcement learning in computer vision: a comprehensive survey","volume":"55","author":"Le","year":"2022","journal-title":"Artif Intell Rev"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1109\/TCSVT.2017.2654543","article-title":"Residual networks of residual networks: multilevel residual networks","volume":"28","author":"Zhang","year":"2018","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref14","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201322","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018"},{"key":"ref15","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"1611","article-title":"FaceBagNet: bag-of-local-features model for multi-modal face anti-spoofing","author":"Shen","year":"2019 Jun 16\u201317"},{"key":"ref16","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"1617","article-title":"Recognizing multi-modal face spoofing with face recognition networks","author":"Parkin","year":"2019 Jun 16\u201317"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"28140","DOI":"10.1109\/ACCESS.2021.3052728","article-title":"A dataset and benchmark towards multi-modal face anti-spoofing under surveillance scenarios","volume":"9","author":"Chen","year":"2021","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"4058","DOI":"10.1109\/TIFS.2024.3371266","article-title":"MFAE: masked frequency autoencoders for domain generalization face anti-spoofing","volume":"19","author":"Zheng","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5650","DOI":"10.1109\/TDSC.2024.3381598","volume":"21","author":"Kong","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref20","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"1013","article-title":"Multiattention-net: a novel approach to face anti-spoofing with modified squeezed residual blocks","author":"Nathan","year":"2024 Jun 17\u201318"},{"key":"ref21","series-title":"2021 IEEE International Conference on Image Processing (ICIP)","first-page":"3622","article-title":"Particle swarm and pattern search optimisation of an ensemble of face anomaly detectors","author":"Fatemifar","year":"2021 Sep 19\u201322"},{"key":"ref22","series-title":"Proceedings of the 2012 BIOSIG-Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG)","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"Chingovska","year":"2012 Sep 6\u20137"},{"key":"ref23","series-title":"2016 International Conference of the Biometrics Special Interest Group (BIOSIG)","first-page":"1","article-title":"The replay-mobile face presentation-attack database","author":"Costa-Pazo","year":"2016 Sep 21\u201323"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1109\/TIFS.2018.2801312","article-title":"Unsupervised domain adaptation for face anti-spoofing","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1007\/s00521-021-06416-6","article-title":"An efficient cybersecurity framework for facial video forensics detection based on multimodal deep learning","volume":"34","author":"Sedik","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TIFS.2015.2398819","article-title":"Face recognition on consumer devices: reflections on replay attacks","volume":"10","author":"Smith","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.3390\/electronics11193056","article-title":"Face anti-spoofing method based on residual network with channel attention mechanism","volume":"11","author":"Kong","year":"2022","journal-title":"Electronics"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"109147","DOI":"10.1016\/j.patcog.2022.109147","article-title":"Face anti-spoofing using feature distilling and global attention learning","volume":"135","author":"Huang","year":"2023","journal-title":"Pattern Recognit"},{"key":"ref29","series-title":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"389","article-title":"Learning deep models for face anti-spoofing: binary or auxiliary supervision","author":"Liu","year":"2018 Jun 18\u201323"},{"key":"ref30","series-title":"2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017); 2017 May 30\u2013Jun 3;","first-page":"612","article-title":"OULU-NPU: a mobile face presentation attack database with real-world variations","author":"Boulkenafet","year":"2017"},{"key":"ref31","series-title":"2012 5th IAPR International Conference on Biometrics (ICB); 2012 Mar 29\u2013Apr 1","first-page":"26","article-title":"A face antispoofing database with diverse attacks","author":"Zhang"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"Wen","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"103969","DOI":"10.1016\/j.jvcir.2023.103969","article-title":"A hierarchical multi-modal cross-attention model for face anti-spoofing","volume":"97","author":"Xue","year":"2023","journal-title":"J Vis Commun Image Represent"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","article-title":"CASIA-SURF: a large-scale multi-modal benchmark for face anti-spoofing","volume":"2","author":"Zhang","year":"2020","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"key":"ref35","series-title":"2021 IEEE Winter Conference on Applications of Computer Vision (WACV); 2021 Jan 3\u20138","first-page":"1178","article-title":"CASIA-SURF CeFA: a benchmark for multi-modal cross-ethnicity face anti-spoofing","author":"Liu","year":"2021"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/TIFS.2019.2916652","article-title":"Biometric face presentation attack detection with multi-channel convolutional neural network","volume":"15","author":"George","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"5217","DOI":"10.1007\/s11263-024-02055-1","article-title":"Rethinking vision transformer and masked autoencoder in multimodal face anti-spoofing","volume":"132","author":"Yu","year":"2024","journal-title":"Int J Comput Vis"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"5366","DOI":"10.1109\/ACCESS.2024.3523257","article-title":"FFDL: feature fusion-based deep learning method utilizing federated learning for forged face detection","volume":"13","author":"Gautam","year":"2024","journal-title":"IEEE Access"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TKDE.2019.2958342","article-title":"A survey on canonical correlation analysis","volume":"33","author":"Yang","year":"2021","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref40","series-title":"2019 IEEE\/CVF International Conference on Computer Vision (ICCV); 2019 Oct 27\u2013Nov 2","first-page":"1","article-title":"FaceForensics++: learning to detect manipulated facial images","author":"Rossler"},{"key":"ref41","series-title":"2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2020 Jun 13\u201319","first-page":"13","article-title":"DeeperForensics-1.0: a large-scale dataset for real-world face forgery detection","author":"Jiang","year":"2020"},{"key":"ref42","series-title":"Proceedings of the 28th ACM International Conference on Multimedia","first-page":"2382","article-title":"WildDeepfake: a challenging real-world dataset for deepfake detection","author":"Zi","year":"2020"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"22855","DOI":"10.1109\/ACCESS.2025.3534906","article-title":"Dual-path adaptive channel attention network based on feature constraints for face anti-spoofing","volume":"13","author":"Li","year":"2025","journal-title":"IEEE Access"},{"key":"ref44","first-page":"58","article-title":"mmFAS: multimodal face anti-spoofing using multi-level alignment and switch-attention fusion","volume":"39","author":"Chen","year":"2025","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/TBIOM.2020.3010312","article-title":"Deep models and shortwave infrared information to detect face presentation attacks","volume":"2","author":"Heusch","year":"2020","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"3926","DOI":"10.1109\/TAI.2024.3353164","article-title":"Self-supervised forecasting in electronic health records with attention-free models","volume":"5","author":"Kumar","year":"2024","journal-title":"IEEE Trans Artif Intell"},{"key":"ref47","unstructured":"Ho J, Kalchbrenner N, Weissenborn D, Salimans T. Axial attention in multidimensional transformers. arXiv:1912.12180. 2019."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.neucom.2021.04.038","article-title":"On the diversity of multi-head attention","volume":"454","author":"Li","year":"2021","journal-title":"Neurocomputing"},{"key":"ref49","first-page":"5404816","article-title":"Asymmetric bidirectional fusion network for remote sensing pansharpening","volume":"61","author":"Zhao","year":"2023","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"ref50","unstructured":"Wang T, Yang L. Beetle swarm optimization algorithm: theory and application. arXiv:1808.00206. 2018."},{"key":"ref51","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3390\/bdcc6020067","article-title":"Iris liveness detection using multiple deep convolution networks","volume":"6","author":"Khade","year":"2022","journal-title":"Big Data Cogn Comput"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"106614","DOI":"10.1016\/j.envsoft.2025.106614","article-title":"Advancing precision, recall, F-score, and jaccard index: an approach for continuous, ratio-scale measurements","volume":"193","author":"Krasnod\u0119bska","year":"2025","journal-title":"Environ Model Softw"}],"updated-by":[{"DOI":"10.32604\/cmc.2026.083414","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T00:00:00Z","timestamp":1776902400000}}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_70422\/TSP_CMC_70422.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:25:26Z","timestamp":1763346326000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":52,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.070422","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-07-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}