{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:18:49Z","timestamp":1760059129920,"version":"build-2065373602"},"reference-count":71,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:00:00Z","timestamp":1747785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076246"],"award-info":[{"award-number":["62076246"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The rapid development of deepfake facial technology has led to facial fraud, posing a significant threat to social security. With the advent of diffusion models, the realism of forged facial images has increased, making detection increasingly challenging. However, the existing detection methods primarily focus on identifying facial forgeries generated by generative adversarial networks; they may struggle to generalize when faced with novel forgery techniques like diffusion models. To address this challenge, a multi-branch network with multi-feature enhancement (M2EH) model for improving the generalization of facial forgery detection is proposed in this paper. First, a multi-branch network is constructed, wherein diverse features are extracted through the three parallel branches of the network, allowing for extensive analysis into the subtle traces of facial forgeries. Then, an adaptive feature concatenation mechanism is proposed to integrate the diverse features extracted from the three branches, obtaining the effective fused representation by optimizing the weights of each feature channel. To further enhance the facial forgery detection ability, spatial pyramid pooling is introduced into the classifier to augment the fused features. Finally, independent loss functions are designed for each branch to ensure the effective learning of specific features while promoting collaborative optimization of the model through the overall loss function. Additionally, to improve model adaptability, a large-scale deepfake facial dataset, HybridGenFace, is built, which includes counterfeit images generated by both generative adversarial networks and diffusion models, addressing the limitations of existing datasets concerning a single forgery type. Experimental results show that M2EH outperforms most of the existing methods on various deepfake datasets.<\/jats:p>","DOI":"10.3390\/e27050545","type":"journal-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T13:59:43Z","timestamp":1747835983000},"page":"545","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Branch Network with Multi-Feature Enhancement for Improving the Generalization of Facial Forgery Detection"],"prefix":"10.3390","volume":"27","author":[{"given":"Siyu","family":"Meng","sequence":"first","affiliation":[{"name":"College of Information and Cyber Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Quange","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Information and Cyber Security, People\u2019s Public Security University of China, Beijing 100038, China"}]},{"given":"Qianli","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing Public Security Bureau, Beijing 100038, China"}]},{"given":"Rong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information and Cyber Security, People\u2019s Public Security University of China, Beijing 100038, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3306346.3323035","article-title":"Deferred neural rendering: Image synthesis using neural textures","volume":"38","author":"Thies","year":"2019","journal-title":"ACM Trans. Graph."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Niessner, M. (November, January 27). Faceforensics++: Learning to detect manipulated facial images. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea.","key":"ref_3","DOI":"10.1109\/ICCV.2019.00009"},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, X., Sun, P., Qi, H., and Lyu, S. (2020, January 13\u201319). Celeb-df: A large-scale challenging dataset for Deepfake forensics. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","key":"ref_4","DOI":"10.1109\/CVPR42600.2020.00327"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., and Lyu, S. (2019, January 12\u201317). Exposing deep fakes using inconsistent head poses. Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","key":"ref_5","DOI":"10.1109\/ICASSP.2019.8683164"},{"unstructured":"Korshunov, P., and Marcel, S. (2018). Deepfakes: A new threat to face recognition? Assessment and detection. arXiv.","key":"ref_6"},{"unstructured":"Dufour, N., Gully, A., Karlsson, P., Vorbyov, A.V., Leung, T., Childs, J., and Bregler, C. (2025, January 15). Deepfake Detection Dataset. Available online: https:\/\/research.google\/blog\/contributing-data-to-deepfake-detection-research.","key":"ref_7"},{"unstructured":"Dolhansky, B., Howes, R., Pflaum, B., Baram, N., and Canton-Ferrer, C. (2019). The Deepfake detection challenge (DFDC) preview dataset. arXiv.","key":"ref_8"},{"doi-asserted-by":"crossref","unstructured":"Zi, B., Chang, M., Chen, J., Ma, X., and Jiang, Y.G. (2020, January 12\u201316). WildDeepfake: A challenging real-world dataset for Deepfake detection. Proceedings of the 28th ACM International Conference on Multimedia, Association for Computing Machinery, New York, NY, USA.","key":"ref_9","DOI":"10.1145\/3394171.3413769"},{"doi-asserted-by":"crossref","unstructured":"He, Y., Gan, B., Chen, S., Zhou, Y., Yin, G., Song, L., Sheng, L., Shao, J., and Liu, Z. (2021, January 20\u201325). Forgerynet: A versatile benchmark for comprehensive forgery analysis. Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","key":"ref_10","DOI":"10.1109\/CVPR46437.2021.00434"},{"unstructured":"Borji, A. (2023). Generated faces in the wild: Quantitative comparison of stable diffusion, midjourney and dall-e 2. arXiv.","key":"ref_11"},{"unstructured":"Cheng, H., Guo, Y., Wang, T., Nie, L., and Kankanhalli, M. (November, January 28). Diffusion facial forgery detection. Proceedings of the 32nd ACM International Conference on Multimedia, Association for Computing Machinery, New York, NY, USA.","key":"ref_12"},{"unstructured":"Ho, J., Jain, A., and Abbeel, P. (2020, January 6\u201312). Denoising diffusion probabilistic models. Proceedings of the 34th International Conference on Neural Information Processing Systems, Vancouver BC Canada.","key":"ref_13"},{"unstructured":"Kim, K., Kim, Y., Cho, S., Seo, J., Nam, J., Lee, K., Kim, S., and Lee, K. (2022). Diffface: Diffusion-based face swapping with facial guidance. arXiv.","key":"ref_14"},{"doi-asserted-by":"crossref","unstructured":"Kim, M., Liu, F., Jain, A., and Liu, X. (2023, January 17\u201324). Dcface: Synthetic face generation with dual condition diffusion model. Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada.","key":"ref_15","DOI":"10.1109\/CVPR52729.2023.01223"},{"doi-asserted-by":"crossref","unstructured":"Huang, Z., Chan, K.C., Jiang, Y., and Liu, Z. (2023, January 17\u201324). Collaborative diffusion for multi-modal face generation and editing. Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada.","key":"ref_16","DOI":"10.1109\/CVPR52729.2023.00589"},{"key":"ref_17","first-page":"14","article-title":"Detection and analysis of synthetic faces based on diffusion models","volume":"40","author":"Huang","year":"2024","journal-title":"J. Fujian Norm. Univ."},{"doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., and Echizen, I. (2018, January 11\u201313). Mesonet: A compact facial video forgery detection network. Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China.","key":"ref_18","DOI":"10.1109\/WIFS.2018.8630761"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., and Echizen, I. (2019, January 12\u201317). Capsule-forensics: Using capsule networks to detect forged images and videos. Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","key":"ref_19","DOI":"10.1109\/ICASSP.2019.8682602"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Fang, F., Yamagishi, J., and Echizen, I. (2019, January 23\u201326). Multi-task learning for detecting and segmenting manipulated facial images and videos. Proceedings of the 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), Tampa, FL, USA.","key":"ref_20","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/s11760-024-03775-0","article-title":"A noise and edge extraction-based dual-branch method for shallowfake and deepfake localization","volume":"19","author":"Dagar","year":"2025","journal-title":"Signal Image Video Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TIFS.2023.3324739","article-title":"Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection","volume":"19","author":"Guo","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Khormali, A., and Yuan, J.-S. (2022). DFDT: An End-to-End DeepFake Detection Framework Using Vision Transformer. Appl. Sci., 12.","key":"ref_23","DOI":"10.3390\/app12062953"},{"key":"ref_24","first-page":"1350","article-title":"Survey of deep face manipulation and fake detection","volume":"63","author":"Tian","year":"2023","journal-title":"J. Tsinghua Univ."},{"doi-asserted-by":"crossref","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.W., Kim, S., and Choo, J. (2018, January 18\u201323). Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. Proceedings of the 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","key":"ref_25","DOI":"10.1109\/CVPR.2018.00916"},{"doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., and Aila, T. (2019, January 15\u201320). A style-based generator architecture for generative adversarial networks. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","key":"ref_26","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e2232","DOI":"10.1002\/cav.2232","article-title":"Diversified realistic face image generation GAN for human subjects in multimedia content creation","volume":"35","author":"Kumar","year":"2024","journal-title":"Comput. Animat. Virtual Worlds"},{"doi-asserted-by":"crossref","unstructured":"Zhao, N., Dang, S., Lin, H., Shi, Y., and Cao, N. (2023, January 1\u20136). Bring clipart to life. Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), Paris, France.","key":"ref_28","DOI":"10.1109\/ICCV51070.2023.02133"},{"doi-asserted-by":"crossref","unstructured":"Zhang, H., Wu, C., Cao, G., Wang, H., and Cao, W. (2024, January 20\u201327). Hypereditor: Achieving both authenticity and cross-domain capability in image editing via hypernetworks. Proceedings of the AAAI Conference on Artificial Intelligence, Vancouver, BC, Canada.","key":"ref_29","DOI":"10.1609\/aaai.v38i7.28532"},{"doi-asserted-by":"crossref","unstructured":"Navab, N., Hornegger, J., Wells, W.M., and Frangi, A.F. (2015, January 5\u20139). U-net: Convolutional networks for biomedical image segmentation. Proceedings of the Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015, Munich, Germany.","key":"ref_30","DOI":"10.1007\/978-3-319-24571-3"},{"doi-asserted-by":"crossref","unstructured":"Ruiz, N., Li, Y., Jampani, V., Pritch, Y., Rubinstein, M., and Aberman, K. (2023, January 17\u201324). Dreambooth: Fine tuning text-to-image diffusion models for subject driven generation. Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada.","key":"ref_31","DOI":"10.1109\/CVPR52729.2023.02155"},{"unstructured":"Wodajo, D., and Atnafu, S. (2021). Deepfake video detection using convolutional vision transformer. arXiv.","key":"ref_32"},{"doi-asserted-by":"crossref","unstructured":"Zhao, H., Wei, T., Zhou, W., Zhang, W., Chen, D., and Yu, N. (2021, January 20\u201325). Multi-attentional Deepfake detection. Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","key":"ref_33","DOI":"10.1109\/CVPR46437.2021.00222"},{"doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhang, Y., Yan, J., and Liu, W. (2021, January 20\u201325). Generalizing face forgery detection with high-frequency features. Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","key":"ref_34","DOI":"10.1109\/CVPR46437.2021.01605"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/TIFS.2022.3198275","article-title":"Hierarchical frequency-assisted interactive networks for face manipulation detection","volume":"17","author":"Miao","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., and Guo, B. (2021, January 10\u201317). Swin transformer: Hierarchical vision transformer using shifted windows. Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, BC, Canada.","key":"ref_36","DOI":"10.1109\/ICCV48922.2021.00986"},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., Mao, H., Wu, C.Y., Feichtenhofer, C., Darrell, T., and Xie, S. (2022, January 18\u201324). A convnet for the 2020s. Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), New Orleans, LA, USA.","key":"ref_37","DOI":"10.1109\/CVPR52688.2022.01167"},{"doi-asserted-by":"crossref","unstructured":"Shaker, A., Maaz, M., Rasheed, H., Khan, S., Yang, M.H., and Khan, F.S. (2023, January 1\u20136). Swiftformer: Efficient additive attention for transformer-based real-time mobile vision applications. Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), Paris, France.","key":"ref_38","DOI":"10.1109\/ICCV51070.2023.01598"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","article-title":"Spatial pyramid pooling in deep convolutional networks for visual recognition","volume":"37","author":"He","year":"2015","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"Mao, A., Mohri, M., and Zhong, Y. (2023, January 23\u201329). Cross-entropy loss functions: Theoretical analysis and applications. Proceedings of the 40th International Conference on Machine Learning (ICML\u203223), Honolulu, HI, USA.","key":"ref_40"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"doi-asserted-by":"crossref","unstructured":"Shiohara, K., Yang, X., and Taketomi, T. (2023, January 1\u20136). Blendface: Re-designing identity encoders for face-swapping. Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), Paris, France.","key":"ref_42","DOI":"10.1109\/ICCV51070.2023.00702"},{"unstructured":"Li, M., Yuan, G., Wang, C., Liu, Z., Zhang, Y., Nie, Y., Wang, J., and Xu, D. (2023). E4s: Fine-grained face swapping via editing with regional gan inversion. arXiv.","key":"ref_43"},{"doi-asserted-by":"crossref","unstructured":"Dalva, Y., Alt\u0131ndi\u015f, S.F., and Dundar, A. (2022, January 23\u201327). Vecgan: Image-to-image translation with interpretable latent directions. Proceedings of the Computer Vision-ECCV 2022: 17th European Conference, Tel Aviv, Israel.","key":"ref_44","DOI":"10.1007\/978-3-031-19787-1_9"},{"doi-asserted-by":"crossref","unstructured":"Preechakul, K., Chatthee, N., Wizadwongsa, S., and Suwajanakorn, S. (2022, January 18\u201324). Diffusion autoencoders: Toward a meaningful and decodable representation. Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), New Orleans, LA, USA.","key":"ref_45","DOI":"10.1109\/CVPR52688.2022.01036"},{"doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., and Fei-Fei, L. (2009, January 20\u201325). Imagenet: A large-scale hierarchical image database. Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA.","key":"ref_46","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref_47","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Hinton","year":"2008","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Yamagishi, J., and Echizen, I. (2019). Use of a capsule network to detect fake images and videos. arXiv.","key":"ref_48","DOI":"10.1109\/ICASSP.2019.8682602"},{"doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Ververas, E., Kotsia, I., and Zafeiriou, S. (2020, January 13\u201319). Retinaface: Single-shot multi-level face localisation in the wild. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","key":"ref_49","DOI":"10.1109\/CVPR42600.2020.00525"},{"doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., and Yu, N. (2021, January 20\u201325). Spatial-phase shallow learning: Rethinking face forgery detection in frequency domain. Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","key":"ref_50","DOI":"10.1109\/CVPR46437.2021.00083"},{"doi-asserted-by":"crossref","unstructured":"Vedaldi, A., Bischof, H., Brox, T., and Frahm, J.M. (2020, January 23\u201328). Thinking in frequency: Face forgery detection by mining frequency-aware clues. Proceedings of the Computer Vision-ECCV 2020, Glasgow, UK.","key":"ref_51","DOI":"10.1007\/978-3-030-58595-2"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/TIFS.2022.3233774","article-title":"F2trans: High-frequency fine-grained transformer for face forgery detection","volume":"18","author":"Miao","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Gu, Q., Chen, S., Yao, T., Chen, Y., Ding, S., and Yi, R. (March, January 22). Exploiting fine-grained face forgery clues via progressive enhancement learning. Proceedings of the AAAI Conference on Artificial Intelligence, Online.","key":"ref_53"},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Wu, Z., Ouyang, W., Han, X., Chen, J., Jiang, Y.G., and Li, S.N. (2022, January 27\u201330). M2tr: Multi-modal multi-scale transformers for Deepfake detection. Proceedings of the 2022 International Conference on Multimedia Retrieval, Association for Computing Machinery, Newark, NJ, USA.","key":"ref_54","DOI":"10.1145\/3512527.3531415"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2425","DOI":"10.1109\/TIFS.2022.3186803","article-title":"Lisiam: Localization invariance Siamese network for Deepfake detection","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"58114","DOI":"10.1109\/ACCESS.2024.3392512","article-title":"Self-supervised graph transformer for deepfake detection","volume":"12","author":"Khormali","year":"2024","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Chen, S., Yao, T., Chen, Y., Ding, S., Li, J., and Ji, R. (2021, January 2\u20139). Local relation learning for face forgery detection. Proceedings of the AAAI Conference on Artificial Intelligence, Online.","key":"ref_57","DOI":"10.1609\/aaai.v35i2.16193"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TBIOM.2021.3086109","article-title":"Inconsistency-aware wavelet dual-branch network for face forgery detection","volume":"3","author":"Jia","year":"2021","journal-title":"IEEE Trans. Biom. Behav. Identity Sci."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"127108","DOI":"10.1016\/j.eswa.2025.127108","article-title":"MH-FFNet: Leveraging mid-high frequency information for robust fine-grained face forgery detection","volume":"276","author":"Zhou","year":"2025","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Li, L., Bao, J., Zhang, T., Yang, H., Chen, D., Wen, F., and Guo, B. (2020, January 13\u201319). Face x-ray for more general face forgery detection. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","key":"ref_60","DOI":"10.1109\/CVPR42600.2020.00505"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"4234","DOI":"10.1109\/TIFS.2021.3102487","article-title":"Mtd-net: Learning to detect Deepfakes images by multi-scale texture difference","volume":"16","author":"Yang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2183","DOI":"10.1109\/LSP.2022.3214768","article-title":"Transformer-based feature compensation and aggregation for Deepfake detection","volume":"29","author":"Tan","year":"2022","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"119361","DOI":"10.1016\/j.eswa.2022.119361","article-title":"Rethinking gradient operator for exposing ai-enabled face forgeries","volume":"215","author":"Guo","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"123732","DOI":"10.1016\/j.eswa.2024.123732","article-title":"Deepfake detection based on high-frequency enhancement network for highly compressed content","volume":"249","author":"Gao","year":"2024","journal-title":"Expert Syst. Appl."},{"unstructured":"Tan, M., and Le, Q. (2019, January 9\u201315). EfficientNet: Rethinking model scaling for convolutional neural networks. Proceedings of the 36th International Conference on Machine Learning PMLR, Long Beach, CA, USA.","key":"ref_65"},{"unstructured":"Cozzolino, D., Thies, J., R\u00f6ssler, A., Riess, C., Nie\u00dfner, M., and Verdoliva, L. (2018). Forensictransfer: Weakly-supervised domain adaptation for forgery detection. arXiv.","key":"ref_66"},{"doi-asserted-by":"crossref","unstructured":"Li, D., Yang, Y., Song, Y.Z., and Hospedales, T. (2018, January 2\u20137). Learning to generalize: Meta-learning for domain generalization. Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LO, USA.","key":"ref_67","DOI":"10.1609\/aaai.v32i1.11596"},{"doi-asserted-by":"crossref","unstructured":"Sun, K., Liu, H., Ye, Q., Gao, Y., Liu, J., Shao, L., and Ji, R. (2021, January 2\u20139). Domain general face forgery detection by learning to weight. Proceedings of the AAAI Conference on Artificial Intelligence, Online.","key":"ref_68","DOI":"10.1609\/aaai.v35i3.16367"},{"doi-asserted-by":"crossref","unstructured":"Sun, K., Yao, T., Chen, S., Ding, S., Li, J., and Ji, R. (2021). Dual contrastive learning for general face forgery detection. arXiv.","key":"ref_69","DOI":"10.1609\/aaai.v36i2.20130"},{"doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Wang, O., Zhang, R., Owens, A., and Efros, A.A. (2020, January 13\u201319). CNN-Generated Images Are Surprisingly Easy to Spot\u2026 for Now. Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","key":"ref_70","DOI":"10.1109\/CVPR42600.2020.00872"},{"doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., and Batra, D. (2017, January 22\u201329). Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","key":"ref_71","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/5\/545\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:36:48Z","timestamp":1760031408000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/5\/545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,21]]},"references-count":71,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["e27050545"],"URL":"https:\/\/doi.org\/10.3390\/e27050545","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2025,5,21]]}}}