{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:11:48Z","timestamp":1778170308877,"version":"3.51.4"},"reference-count":51,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T00:00:00Z","timestamp":1639699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Significant progress has been made in generating counterfeit images and videos. Forged videos generated by deepfaking have been widely spread and have caused severe societal impacts, which stir up public concern about automatic deepfake detection technology. Recently, many deepfake detection methods based on forged features have been proposed. Among the popular forged features, textural features are widely used. However, most of the current texture-based detection methods extract textures directly from RGB images, ignoring the mature spectral analysis methods. Therefore, this research proposes a deepfake detection network fusing RGB features and textural information extracted by neural networks and signal processing methods, namely, MFF-Net. Specifically, it consists of four key components: (1) a feature extraction module to further extract textural and frequency information using the Gabor convolution and residual attention blocks; (2) a texture enhancement module to zoom into the subtle textural features in shallow layers; (3) an attention module to force the classifier to focus on the forged part; (4) two instances of feature fusion to firstly fuse textural features from the shallow RGB branch and feature extraction module and then to fuse the textural features and semantic information. Moreover, we further introduce a new diversity loss to force the feature extraction module to learn features of different scales and directions. The experimental results show that MFF-Net has excellent generalization and has achieved state-of-the-art performance on various deepfake datasets.<\/jats:p>","DOI":"10.3390\/e23121692","type":"journal-article","created":{"date-parts":[[2021,12,19]],"date-time":"2021-12-19T20:37:27Z","timestamp":1639946247000},"page":"1692","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["MFF-Net: Deepfake Detection Network Based on Multi-Feature Fusion"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7949-0548","authenticated-orcid":false,"given":"Lei","family":"Zhao","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9028-8113","authenticated-orcid":false,"given":"Mingcheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0851-1994","authenticated-orcid":false,"given":"Hongwei","family":"Ding","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6079-009X","authenticated-orcid":false,"given":"Xiaohui","family":"Cui","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"key":"ref_2","unstructured":"Karras, T., Aila, T., Laine, S., and Lehtinen, J. (30\u20133, January 30). Progressive Growing of GANs for Improved Quality, Stability, and Variation. Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., and Aila, T. (2019, January 15\u201320). A style-based generator architecture for generative adversarial networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref_4","unstructured":"Brock, A., Donahue, J., and Simonyan, K. (May, January 30). Large Scale GAN Training for High Fidelity Natural Image Synthesis. Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_5","unstructured":"West, J., and Bergstrom, C. (2021, May 11). Which Face is Real?. Available online: http:\/\/www.whichfaceisreal.com."},{"key":"ref_6","unstructured":"github (2021, May 11). FaceAPP. Available online: https:\/\/faceapp.com\/app."},{"key":"ref_7","unstructured":"github (2021, May 11). faceswap. Available online: https:\/\/github.com\/MarekKowalski\/FaceSwap\/."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Nie\u00dfner, M. (2019, January 27\u201328). Faceforensics++: Learning to detect manipulated facial images. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Seoul, Korea.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3306346.3323035","article-title":"Deferred neural rendering: Image synthesis using neural textures","volume":"38","author":"Thies","year":"2019","journal-title":"Acm Trans. Graph. (TOG)"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., and Echizen, I. (2018, January 11\u201313). Mesonet: A compact facial video forgery detection network. Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., and Guo, B. (2020, January 16\u201318). Face X-ray for more general face forgery detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., and Stamminger, M. (2019, January 7\u201311). Exploiting visual artifacts to expose deepfakes and face manipulations. Proceedings of the 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW), Waikoloa Village, HI, USA.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","article-title":"Deepfakes and beyond: A survey of face manipulation and fake detection","volume":"64","author":"Tolosana","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., and Echizen, I. (2019, January 23\u201326). Multi-task learning for detecting and segmenting manipulated facial images and videos. Proceedings of the 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), Tampa, FL, USA.","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref_15","unstructured":"Frank, J., Eisenhofer, T., Sch\u00f6nherr, L., Fischer, A., Kolossa, D., and Holz, T. (2020, January 13\u201318). Leveraging frequency analysis for deep fake image recognition. Proceedings of the International Conference on Machine Learning, PMLR, Montr\u00e9al, QC, Canada."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhang, X., Karaman, S., and Chang, S.F. (2019, January 9\u201312). Detecting and simulating artifacts in gan fake images. Proceedings of the 2019 IEEE International Workshop on Information Forensics and Security (WIFS), Delft, The Netherlands.","DOI":"10.1109\/WIFS47025.2019.9035107"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liu, Z., Qi, X., and Torr, P.H. (2020, January 14\u201319). Global texture enhancement for fake face detection in the wild. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00808"},{"key":"ref_18","unstructured":"Durall, R., Keuper, M., Pfreundt, F.J., and Keuper, J. (2019). Unmasking deepfakes with simple features. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Qian, Y., Yin, G., Sheng, L., Chen, Z., and Shao, J. (2020, January 23\u201328). Thinking in frequency: Face forgery detection by mining frequency-aware clues. Proceedings of the European Conference on Computer Vision, Glasgow, UK.","DOI":"10.1007\/978-3-030-58610-2_6"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020, January 13\u201319). Celeb-df: A large-scale challenging dataset for deepfake forensics. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"ref_21","unstructured":"(2021, May 11). Deepfakedetection. Available online: https:\/\/ai.googleblog.com\/2019\/09\/contributing-data-to-deepfake-detection.html."},{"key":"ref_22","unstructured":"Arjovsky, M., Chintala, S., and Bottou, L. (2017, January 6\u201311). Wasserstein generative adversarial networks. Proceedings of the International conference on machine learning, PMLR, Sydney, Australia."},{"key":"ref_23","unstructured":"Berthelot, D., Schumm, T., and Metz, L. (2017). Began: Boundary equilibrium generative adversarial networks. arXiv."},{"key":"ref_24","unstructured":"Kodali, N., Abernethy, J., Hays, J., and Kira, Z. (2017). On convergence and stability of gans. arXiv."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., and Aila, T. (2020, January 13\u201319). Analyzing and improving the image quality of stylegan. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref_26","unstructured":"Miyato, T., Kataoka, T., Koyama, M., and Yoshida, Y. (May, January 30). Spectral Normalization for Generative Adversarial Networks. Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_27","unstructured":"Li, C.L., Chang, W.C., Cheng, Y., Yang, Y., and P\u00f3czos, B. (2017, January 4\u20139). MMD GAN: Towards deeper understanding of moment matching network. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, CA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., and Lyu, S. (2019, January 12\u201317). Exposing deep fakes using inconsistent head poses. Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref_29","unstructured":"Agarwal, S., Farid, H., Gu, Y., He, M., Nagano, K., and Li, H. (2019, January 16). Protecting World Leaders Against Deep Fakes. Proceedings of the CVPR Workshops, Long Beach, CA, USA."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","article-title":"Illuminant-based transformed spaces for image forensics","volume":"11","author":"Carvalho","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Durall, R., Keuper, M., and Keuper, J. (2020, January 13\u201319). Watch your up-convolution: Cnn based generative deep neural networks are failing to reproduce spectral distributions. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00791"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Huang, Y., Juefei-Xu, F., Wang, R., Guo, Q., Ma, L., Xie, X., Li, J., Miao, W., Liu, Y., and Pu, G. (2020, January 12\u201316). Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413732"},{"key":"ref_33","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., and Brendel, W. (May, January 30). ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.23915\/distill.00003","article-title":"Deconvolution and checkerboard artifacts","volume":"1","author":"Odena","year":"2016","journal-title":"Distill"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., and Yu, N. (2021, January 19\u201325). Multi-attentional deepfake detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017, January 21\u201326). Xception: Deep learning with depthwise separable convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., and Kweon, I.S. (2018, January 8\u201314). Cbam: Convolutional block attention module. Proceedings of the European conference on computer vision (ECCV), Munich, Germany.","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., and Tang, X. (2015, January 7\u201313). Deep learning face attributes in the wild. Proceedings of the IEEE international conference on computer vision, Santiago, Chile.","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Cozzolino, D., Poggi, G., and Verdoliva, L. (2017, January 20\u201321). Recasting residual-based local descriptors as convolutional neural networks: An application to image forgery detection. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA.","DOI":"10.1145\/3082031.3083247"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bayar, B., and Stamm, M.C. (2016, January 20\u201322). A deep learning approach to universal image manipulation detection using a new convolutional layer. Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain.","DOI":"10.1145\/2909827.2930786"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Rahmouni, N., Nozick, V., Yamagishi, J., and Echizen, I. (2017, January 4\u20137). Distinguishing computer graphics from natural images using convolution neural networks. Proceedings of the 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes, France.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"ref_43","first-page":"131","article-title":"Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis","volume":"7","author":"Gunawan","year":"2017","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Chen, M., Sedighi, V., Boroumand, M., and Fridrich, J. (2017, January 20\u201322). JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA.","DOI":"10.1145\/3082031.3083248"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., and Yu, N. (2021, January 19\u201325). Spatial-phase shallow learning: Rethinking face forgery detection in frequency domain. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref_46","unstructured":"github (2021, May 11). Deepfakes. Available online: https:\/\/github.com\/deepfakes\/faceswap."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Thies, J., Zollhofer, M., Stamminger, M., Theobalt, C., and Nie\u00dfner, M. (2016, January 27\u201330). Face2face: Real-time face capture and reenactment of rgb videos. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.262"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Feichtenhofer, C., Fan, H., Malik, J., and He, K. (2019, January 27\u201328). Slowfast networks for video recognition. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Seoul, Korea.","DOI":"10.1109\/ICCV.2019.00630"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Trinh, L., Tsang, M., Rambhatla, S., and Liu, Y. (2021, January 5\u20139). Interpretable and trustworthy deepfake detection via dynamic prototypes. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, Waikola, HI, USA.","DOI":"10.1109\/WACV48630.2021.00202"},{"key":"ref_50","first-page":"8930","article-title":"This looks like that: Deep learning for interpretable image recognition","volume":"32","author":"Chen","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., and Pantic, M. (2021, January 19\u201325). Lips Don\u2019t Lie: A Generalisable and Robust Approach To Face Forgery Detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00500"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/12\/1692\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:50:17Z","timestamp":1760169017000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/12\/1692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,17]]},"references-count":51,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["e23121692"],"URL":"https:\/\/doi.org\/10.3390\/e23121692","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,17]]}}}