{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:25:25Z","timestamp":1774967125710,"version":"3.50.1"},"reference-count":57,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Defense Advanced Research Projects Agency","award":["FA8750-20-2-1004"],"award-info":[{"award-number":["FA8750-20-2-1004"]}]},{"name":"Defense Advanced Research Projects Agency","award":["PE00000001"],"award-info":[{"award-number":["PE00000001"]}]},{"name":"European Union","award":["FA8750-20-2-1004"],"award-info":[{"award-number":["FA8750-20-2-1004"]}]},{"name":"European Union","award":["PE00000001"],"award-info":[{"award-number":["PE00000001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>The widespread use of deep learning techniques for creating realistic synthetic media, commonly known as deepfakes, poses a significant threat to individuals, organizations, and society. As the malicious use of these data could lead to unpleasant situations, it is becoming crucial to distinguish between authentic and fake media. Nonetheless, though deepfake generation systems can create convincing images and audio, they may struggle to maintain consistency across different data modalities, such as producing a realistic video sequence where both visual frames and speech are fake and consistent one with the other. Moreover, these systems may not accurately reproduce semantic and timely accurate aspects. All these elements can be exploited to perform a robust detection of fake content. In this paper, we propose a novel approach for detecting deepfake video sequences by leveraging data multimodality. Our method extracts audio-visual features from the input video over time and analyzes them using time-aware neural networks. We exploit both the video and audio modalities to leverage the inconsistencies between and within them, enhancing the final detection performance. The peculiarity of the proposed method is that we never train on multimodal deepfake data, but on disjoint monomodal datasets which contain visual-only or audio-only deepfakes. This frees us from leveraging multimodal datasets during training, which is desirable given their lack in the literature. Moreover, at test time, it allows to evaluate the robustness of our proposed detector on unseen multimodal deepfakes. We test different fusion techniques between data modalities and investigate which one leads to more robust predictions by the developed detectors. Our results indicate that a multimodal approach is more effective than a monomodal one, even if trained on disjoint monomodal datasets.<\/jats:p>","DOI":"10.3390\/jimaging9060122","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T03:33:52Z","timestamp":1687145632000},"page":"122","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["A Robust Approach to Multimodal Deepfake Detection"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5163-3364","authenticated-orcid":false,"given":"Davide","family":"Salvi","sequence":"first","affiliation":[{"name":"Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, 20133 Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9294-9624","authenticated-orcid":false,"given":"Honggu","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Sara","family":"Mandelli","sequence":"additional","affiliation":[{"name":"Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, 20133 Milan, Italy"}]},{"given":"Paolo","family":"Bestagini","sequence":"additional","affiliation":[{"name":"Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, 20133 Milan, Italy"}]},{"given":"Wenbo","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Stefano","family":"Tubaro","sequence":"additional","affiliation":[{"name":"Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, 20133 Milan, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"key":"ref_1","unstructured":"The New York Times (The New York Times, 2022). Science Has a Nasty Photoshopping Problem, The New York Times."},{"key":"ref_2","unstructured":"VICE (VICE, 2023). How I Broke Into a Bank Account With an AI-Generated Voice, VICE."},{"key":"ref_3","unstructured":"The Verge (The Verge, 2022). Liveness Tests Used by Banks to Verify ID Are \u201cExtremely Vulnerable\u201d to Deepfake Attacks, The Verge."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: An overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","article-title":"Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward","volume":"53","author":"Masood","year":"2022","journal-title":"Appl. Intell."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"50851","DOI":"10.1109\/ACCESS.2023.3276480","article-title":"TIMIT-TTS: A Text-to-Speech Dataset for Multimodal Synthetic Media Detection","volume":"11","author":"Salvi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Hu, L., Ng, E., Darrell, T., Li, H., and Rohrbach, A. (2023, January 2\u20137). Watch those words: Video falsification detection using word-conditioned facial motion. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA.","DOI":"10.1109\/WACV56688.2023.00469"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mittal, T., Bhattacharya, U., Chandra, R., Bera, A., and Manocha, D. (2020, January 12\u201316). Emotions don\u2019t lie: An audio-visual deepfake detection method using affective cues. Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413570"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Xu, Y., Jia, G., Huang, H., Duan, J., and He, R. (2021, January 4\u20137). Visual-semantic transformer for face forgery detection. Proceedings of the IEEE International Joint Conference on Biometrics (IJCB), Shenzhen, China.","DOI":"10.1109\/IJCB52358.2021.9484407"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1109\/TIFS.2022.3169921","article-title":"Detect and locate: Exposing face manipulation by semantic-and noise-level telltales","volume":"17","author":"Kong","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lomnitz, M., Hampel-Arias, Z., Sandesara, V., and Hu, S. (2020, January 13\u201315). Multimodal Approach for DeepFake Detection. Proceedings of the IEEE Applied Imagery Pattern Recognition Workshop (AIPR), Washington, DC, USA.","DOI":"10.1109\/AIPR50011.2020.9425192"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Li, Y., Chang, M.C., and Lyu, S. (2018, January 11\u201313). In ictu oculi: Exposing ai created fake videos by detecting eye blinking. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yang, X., Li, Y., and Lyu, S. (2019, January 12\u201317). Exposing deep fakes using inconsistent head poses. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK.","DOI":"10.1109\/ICASSP.2019.8683164"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Matern, F., Riess, C., and Stamminger, M. (2019, January 7\u201311). Exploiting visual artifacts to expose deepfakes and face manipulations. Proceedings of the IEEE Winter Applications of Computer Vision Workshops (WACVW), Waikoloa Village, HI, USA.","DOI":"10.1109\/WACVW.2019.00020"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Amerini, I., Galteri, L., Caldelli, R., and Del Bimbo, A. (2019, January 15\u201320). Deepfake video detection through optical flow based CNN. Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/ICCVW.2019.00152"},{"key":"ref_16","unstructured":"Koopman, M., Rodriguez, A.M., and Geradts, Z. (2018, January 29\u201331). Detection of deepfake video manipulation. Proceedings of the 20th Irish Machine Vision and Image Processing Conference (IMVIP), Belfast, UK."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Afchar, D., Nozick, V., Yamagishi, J., and Echizen, I. (2018, January 11\u201313). Mesonet: A compact facial video forgery detection network. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China.","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies, J., and Nie\u00dfner, M. (2019, January 15\u201320). Faceforensics++: Learning to detect manipulated facial images. Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"G\u00fcera, D., and Delp, E.J. (2018, January 27\u201330). Deepfake video detection using recurrent neural networks. Proceedings of the IEEE International Conference on Advanced Video and Signal based Surveillance (AVSS), Auckland, New Zealand.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bonettini, N., Cannas, E.D., Mandelli, S., Bondi, L., Bestagini, P., and Tubaro, S. (2021, January 10\u201315). Video face manipulation detection through ensemble of CNNs. Proceedings of the International Conference on Pattern Recognition (ICPR), Virtual Event.","DOI":"10.1109\/ICPR48806.2021.9412711"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Wei, T., Zhang, W., and Yu, N. (2021, January 20\u201325). Multi-attentional deepfake detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, X., Zhou, W., Chen, Y., He, Y., Xue, H., Zhang, W., and Yu, N. (2021, January 19\u201325). Spatial-phase shallow learning: Rethinking face forgery detection in frequency domain. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Virtual.","DOI":"10.1109\/CVPR46437.2021.00083"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ciftci, U.A., Demir, I., and Yin, L. (2020). Fakecatcher: Detection of synthetic portrait videos using biological signals. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI).","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cuccovillo, L., Papastergiopoulos, C., Vafeiadis, A., Yaroshchuk, A., Aichroth, P., Votis, K., and Tzovaras, D. (2022, January 12\u201316). Open Challenges in Synthetic Speech Detection. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Shanghai, China.","DOI":"10.1109\/WIFS55849.2022.9975433"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wei, G., and He, Q. (2011, January 10\u201313). Channel pattern noise based playback attack detection algorithm for speaker recognition. Proceedings of the IEEE International Conference on Machine Learning and Cybernetics (ICMLC), Guilin, China.","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Malik, H. (2019, January 28\u201330). Securing voice-driven interfaces against fake (cloned) audio attacks. Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, CA, USA.","DOI":"10.1109\/MIPR.2019.00104"},{"key":"ref_27","first-page":"1","article-title":"Synthetic speech detection through short-term and long-term prediction traces","volume":"2021","author":"Borrelli","year":"2021","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tak, H., Patino, J., Todisco, M., Nautsch, A., Evans, N., and Larcher, A. (2021, January 6\u201311). End-to-end anti-spoofing with RawNet2. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada.","DOI":"10.1109\/ICASSP39728.2021.9414234"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"134018","DOI":"10.1109\/ACCESS.2022.3231480","article-title":"Deepfake Audio Detection via MFCC features using Machine Learning","volume":"10","author":"Hamza","year":"2022","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2023, January 4\u201310). Reliability Estimation for Synthetic Speech Detection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece.","DOI":"10.1109\/ICASSP49357.2023.10095524"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Salvi, D., Bestagini, P., and Tubaro, S. (2023, January 12\u201315). Synthetic Speech Detection through Audio Folding. Proceedings of the International Workshop on Multimedia AI against Disinformation (MAD), Thessaloniki, Greece.","DOI":"10.1145\/3592572.3592844"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Sahidullah, M., Kinnunen, T., and Hanil\u00e7i, C. (2015, January 6\u201310). A comparison of features for synthetic speech detection. Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH), Dresden, Germany.","DOI":"10.21437\/Interspeech.2015-472"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Conti, E., Salvi, D., Borrelli, C., Hosler, B., Bestagini, P., Antonacci, F., Sarti, A., Stamm, M.C., and Tubaro, S. (2022, January 7\u201313). Deepfake Speech Detection Through Emotion Recognition: A Semantic Approach. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Singapore.","DOI":"10.1109\/ICASSP43922.2022.9747186"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Attorresi, L., Salvi, D., Borrelli, C., Bestagini, P., and Tubaro, S. (2022, January 21\u201325). Combining Automatic Speaker Verification and Prosody Analysis for Synthetic Speech Detection. Proceedings of the International Conference on Pattern Recognition, Montr\u00e9al, QC, Canada.","DOI":"10.1007\/978-3-031-37742-6_21"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"79236","DOI":"10.1109\/ACCESS.2021.3084299","article-title":"A survey of speaker recognition: Fundamental theories, recognition methods and opportunities","volume":"9","author":"Kabir","year":"2021","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Snyder, D., Garcia-Romero, D., Sell, G., Povey, D., and Khudanpur, S. (2018, January 15\u201320). X-vectors: Robust DNN embeddings for speaker recognition. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada.","DOI":"10.1109\/ICASSP.2018.8461375"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Hosler, B., Salvi, D., Murray, A., Antonacci, F., Bestagini, P., Tubaro, S., and Stamm, M.C. (2021, January 19\u201325). Do Deepfakes Feel Emotions? A Semantic Approach to Detecting Deepfakes via Emotional Inconsistencies. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Virtual.","DOI":"10.1109\/CVPRW53098.2021.00112"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khalid, H., Kim, M., Tariq, S., and Woo, S.S. (2021, January 24). Evaluation of an audio-video multimodal deepfake dataset using unimodal and multimodal detectors. Proceedings of the 1st Workshop on Synthetic Multimedia-Audiovisual Deepfake Generation and Detection, Virtual Event.","DOI":"10.1145\/3476099.3484315"},{"key":"ref_39","unstructured":"Korshunov, P., Halstead, M., Castan, D., Graciarena, M., McLaren, M., Burns, B., Lawson, A., and Marcel, S. (2019, January 9\u201315). Tampered speaker inconsistency detection with phonetically aware audio-visual features. Proceedings of the International Conference on Machine Learning (ICML), Long Beach, CA, USA."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Farid, H., Fried, O., and Agrawala, M. (2020, January 14\u201319). Detecting deep-fake videos from phoneme-viseme mismatches. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00338"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Zhou, Y., and Lim, S.N. (2021, January 11\u201317). Joint audio-visual deepfake detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, BC, Canada.","DOI":"10.1109\/ICCV48922.2021.01453"},{"key":"ref_42","unstructured":"Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., and Ferrer, C.C. (2020). The deepfake detection challenge (DFDC) dataset. arXiv."},{"key":"ref_43","unstructured":"Khalid, H., Tariq, S., Kim, M., and Woo, S.S. (2021, January 6\u201314). FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. Proceedings of the Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2), Virtual."},{"key":"ref_44","unstructured":"Korshunov, P., and Marcel, S. (2018). Deepfakes: A new threat to face recognition? Assessment and detection. arXiv."},{"key":"ref_45","unstructured":"Tan, M., and Le, Q. (2019, January 9\u201315). EfficientNet: Rethinking model scaling for convolutional neural networks. Proceedings of the International Conference on Machine Learning, Long Beach, CA, USA."},{"key":"ref_46","unstructured":"Ravanelli, M., Parcollet, T., Plantinga, P., Rouhe, A., Cornell, S., Lugosch, L., Subakan, C., Dawalatabad, N., Heba, A., and Zhong, J. (2021). SpeechBrain: A General-Purpose Speech Toolkit. arXiv."},{"key":"ref_47","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., and Polosukhin, I. (2017). Attention is all you need. Adv. Neural Inf. Process. Syst."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Todisco, M., Wang, X., Vestman, V., Sahidullah, M., Delgado, H., Nautsch, A., Yamagishi, J., Evans, N., Kinnunen, T., and Lee, K.A. (2019, January 15\u201319). ASVspoof 2019: Future horizons in spoofed and fake audio detection. Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Graz, Austria.","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref_49","unstructured":"Veaux, C., Yamagishi, J., and MacDonald, K. (2017). CSTR VCTK Corpus: English Multi-Speaker Corpus for CSTR Voice Cloning Toolkit, University of Edinburgh, The Centre for Speech Technology Research (CSTR)."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Nagrani, A., and Zisserman, A. (2018, January 2\u20136). VoxCeleb2: Deep Speaker Recognition. Proceedings of the Conference of the International Speech Communication Association (INTERSPEECH), Hyderabad, India.","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Korshunova, I., Shi, W., Dambre, J., and Theis, L. (2017, January 22\u201329). Fast face-swap using convolutional neural networks. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Nirkin, Y., Keller, Y., and Hassner, T. (2019, January 15\u201320). Fsgan: Subject agnostic face swapping and reenactment. Proceedings of the IEEE\/CVF International Conference on Computer Vision (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/ICCV.2019.00728"},{"key":"ref_53","unstructured":"Jia, Y., Zhang, Y., Weiss, R., Wang, Q., Shen, J., Ren, F., Nguyen, P., Pang, R., Lopez Moreno, I., and Wu, Y. (2018). Transfer learning from speaker verification to multispeaker text-to-speech synthesis. Adv. Neural Inf. Process. Syst."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Prajwal, K., Mukhopadhyay, R., Namboodiri, V.P., and Jawahar, C. (2020, January 12\u201316). A lip sync expert is all you need for speech to lip generation in the wild. Proceedings of the ACM International Conference on Multimedia, Seattle, WA, USA.","DOI":"10.1145\/3394171.3413532"},{"key":"ref_55","unstructured":"Sanderson, C. (2002). The VidTIMIT Database, IDIAP. Technical Report."},{"key":"ref_56","first-page":"27403","article-title":"DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1-1.1","volume":"93","author":"Garofolo","year":"1993","journal-title":"NASA STI\/Recon Tech. Rep. N"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Nagrani, A., Chung, J.S., and Zisserman, A. (2017, January 20\u201324). VoxCeleb: A large-scale speaker identification dataset. Proceedings of the International Speech Communication Association Conference (INTERSPEECH), Stockholm, Sweden.","DOI":"10.21437\/Interspeech.2017-950"}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/9\/6\/122\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:56:13Z","timestamp":1760126173000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/9\/6\/122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":57,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["jimaging9060122"],"URL":"https:\/\/doi.org\/10.3390\/jimaging9060122","relation":{},"ISSN":["2313-433X"],"issn-type":[{"value":"2313-433X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,19]]}}}