{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:30:49Z","timestamp":1744259449940,"version":"3.40.3"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030876630"},{"type":"electronic","value":"9783030876647"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":30,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"Abstract<\/jats:title>Recently, digital face manipulation\u00a0and its detection have sparked large interest in industry and academia around the world. Numerous approaches have been proposed in the literature to create realistic face manipulations, such as DeepFakes\u00a0and face morphs. To the human eye manipulated images and videos can be almost indistinguishable from real content. Although impressive progress has been reported in the automatic detection of such face manipulations, this research field is often considered to be a cat and mouse game<\/jats:italic>. This chapter briefly discusses the state of the art of digital face manipulation\u00a0and detection. Issues and challenges that need to be tackled by the research community are summarized, along with future trends in the field.<\/jats:p>","DOI":"10.1007\/978-3-030-87664-7_21","type":"book-chapter","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T09:03:06Z","timestamp":1643619786000},"page":"463-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Future Trends in Digital Face Manipulation and Detection"],"prefix":"10.1007","author":[{"given":"Ruben","family":"Tolosana","sequence":"first","affiliation":[]},{"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Vera-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Verdoliva","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Huy H.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Junichi","family":"Yamagishi","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Rot","sequence":"additional","affiliation":[]},{"given":"Klemen","family":"Grm","sequence":"additional","affiliation":[]},{"given":"Vitomir","family":"\u0160truc","sequence":"additional","affiliation":[]},{"given":"Antitza","family":"Dantcheva","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Romero-Tapiador","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Fierrez","sequence":"additional","affiliation":[]},{"given":"Aythami","family":"Morales","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Ortega-Garcia","sequence":"additional","affiliation":[]},{"given":"Els","family":"Kindt","sequence":"additional","affiliation":[]},{"given":"Catherine","family":"Jasserand","sequence":"additional","affiliation":[]},{"given":"Tarmo","family":"Kalvet","sequence":"additional","affiliation":[]},{"given":"Marek","family":"Tiits","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"21_CR1","unstructured":"Barni M, Battiato S, Boato G, Farid H, Memon N (2020) MultiMedia forensics in the wild. In: International conference on pattern recognition"},{"key":"21_CR2","unstructured":"Biggio B, Korshunov P, Mensink T, Patrini G, Rao D, Sadhu A (2019) Synthetic realities: deep learning for detecting AudioVisual fakes. In: International conference on machine learning"},{"key":"21_CR3","unstructured":"Gregory S, Cristian C, Leal-Taix\u00e9 L, Christoph B, Hany F, Matthias N, Sergio E, Edward D, McCloskey S, Isabelle G, Arslan B, Justus T, Luisa V, Hugo\u00a0Jair E, Christa S, Andreas R, Jun W, Davide C, Guo G (2020) Workshop on media forensics. In: Conference on computer vision and pattern recognition"},{"key":"21_CR4","unstructured":"Kiran R, Naser D, Cunjian C, Antitza D, Adam C, Hu\u00a0H, Raghavendra R (2020) Workshop on Deepfakes and presentation attacks in biometrics. In: Winter conference on applications of computer vision"},{"key":"21_CR5","unstructured":"Verdoliva L, Bestagini P. Multimedia forensics. In: ACM multimedia"},{"key":"21_CR6","unstructured":"Citron D (2019) How DeepFake undermine truth and threaten democracy. https:\/\/www.youtube.com\/watch?v=pg5WtBjox-Y"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"Hunt Allcott","year":"2017","unstructured":"Allcott Hunt, Gentzkow Matthew (2017) Social media and fake news in the 2016 election. J Econ Perspect 31(2):211\u201336","journal-title":"J Econ Perspect"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3072959.3073640","volume":"36","author":"Supasorn Suwajanakorn","year":"2017","unstructured":"Suwajanakorn Supasorn, Seitz Steven M, Kemelmacher-Shlizerman Ira (2017) Synthesizing obama: learning lip sync from audio. ACM Trans Graph 36(4):1\u201313","journal-title":"ACM Trans Graph"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Kietzmann J, Lee LW, McCarthy IP, Kietzmann TC (2020) Deepfakes: Trick or Treat? Bus Horiz 63(2):135\u2013146","DOI":"10.1016\/j.bushor.2019.11.006"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"Ruben Tolosana","year":"2020","unstructured":"Tolosana Ruben, Vera-Rodriguez Ruben, Fierrez Julian, Morales Aythami, Ortega-Garcia Javier (2020) DeepFakes and beyond: a survey of face manipulation and fake detection. Inf Fusion 64:131\u2013148","journal-title":"Inf Fusion"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","volume":"14","author":"Luisa Verdoliva","year":"2020","unstructured":"Verdoliva Luisa (2020) Media forensics and DeepFakes: an overview. IEEE J Sel Top Signal Process 14:910\u2013932","journal-title":"IEEE J Sel Top Signal Process"},{"key":"21_CR12","unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer CC (2020) The DeepFake detection challenge (DFDC) dataset. arXiv:2006.07397"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Jiang L, Li R, Wu W, Qian C, Loy CC (2020) DeeperForensics-1.0: a large-scale dataset for real-world face forgery detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00296"},{"key":"21_CR14","unstructured":"Raja K, Ferrara M, Franco A, Spreeuwers L, Batskos I, Gomez-Barrero FD, Scherhag U, Fischer D, Venkatesh S (2020) In: Singh JM, Li G, Lo\u00efc B, Sergey I, Raghavendra R, Christian R, Dinusha F, Uwe S, Fons K, Raymond V, Davide M, Christoph B (eds) Evaluation platform and benchmarking. IEEE transactions on information forensics and security, morphing attack detection-database"},{"key":"21_CR15","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2018) FaceForensics: a large-scale video dataset for forgery detection in human faces. arXiv:1803.09179"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Nie\u00dfner M (2019) FaceForensics++: learning to detect manipulated facial images. In: Proceeding of the IEEE\/CVF international conference on computer vision","DOI":"10.1109\/ICCV.2019.00009"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Ruben Tolosana, Sergio Romero-Tapiador, Julian Fierrez, and Ruben Vera-Rodriguez. DeepFakes Evolution: Analysis of Facial Regions and Fake Detection Performance. In Proc. International Conference on Pattern Recognition Workshops, 2020","DOI":"10.1007\/978-3-030-68821-9_38"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425780","volume":"54","author":"Yisroel Mirsky","year":"2021","unstructured":"Mirsky Yisroel, Lee Wenke (2021) The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys 54(1):1\u201341","journal-title":"ACM Computing Surveys"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Li Y, Yang X, Sun P, Qi H, Lyu S (2020) Celeb-DF: a large-scale challenging dataset for DeepFake forensics. In: Proceeding of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00327"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"23012","DOI":"10.1109\/ACCESS.2019.2899367","volume":"7","author":"Ulrich Scherhag","year":"2019","unstructured":"Scherhag Ulrich, Rathgeb Christian, Merkle Johannes, Breithaupt Ralph, Busch Christoph (2019) Face recognition systems under morphing attacks: a survey. IEEE Access 7:23012\u201323026","journal-title":"IEEE Access"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Venkatesh S, Ramachandra R, Raja K, Busch C (2021) Face morphing attack generation & detection: a comprehensive survey. In: IEEE transactions on technology and society","DOI":"10.1109\/TTS.2021.3066254"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Zhang S, Chi C, Lei Z, Li SZ (2020) Refineface: refinement neural network for high performance face detection. In: IEEE transactions on pattern analysis and machine intelligence","DOI":"10.1109\/TPAMI.2020.2997456"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Zhou Y, Liu D, Huang T (2018) Survey of face detection on low-quality images. In: Proceedings of the IEEE international conference on automatic face & gesture recognition, pp 769\u2013773","DOI":"10.1109\/FG.2018.00121"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aittala M, Hellsten J, Lehtinen J, Aila T (2020) Analyzing and improving the image quality of StyleGAN. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Deng Y, Yang J, Chen D, Wen F, Tong X (2020) Disentangled and controllable face image generation via 3D imitative-contrastive learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00520"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Ciftci UA, Demir I, Yin L (2020) Fakecatcher: detection of synthetic portrait videos using biological signals. In: IEEE transactions on pattern analysis and machine intelligence","DOI":"10.1109\/TPAMI.2020.3009287"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Hernandez-Ortega J, Tolosana R, Fierrez J, Morales A (2021) DeepFakesON-Phys: DeepFakes detection based on heart rate estimation. In: Proceedings of the 35th AAAI conference on artificial intelligence workshops","DOI":"10.1007\/978-3-030-87664-7_12"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Gragnaniello D, Cozzolino D, Marra F, Poggi G, Verdoliva L (2021) Are GAN generated images easy to detect? A critical analysis of the state-of-the-art. In: Proceedings of the IEEE international conference on multimedia and expo","DOI":"10.1109\/ICME51207.2021.9428429"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Marra F, Gragnaniello D, Verdoliva L, Poggi G (2019) Do GANs leave artificial fingerprints? In: Proceeding of the IEEE conference on multimedia information processing and retrieval","DOI":"10.1109\/MIPR.2019.00103"},{"issue":"5","key":"21_CR30","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/JSTSP.2020.3007250","volume":"14","author":"Jo\u00e3 C Neves","year":"2020","unstructured":"Neves Jo\u00e3 C, Tolosana Ruben, Vera-Rodriguez Ruben, Lopes Vasco, Proenca Hugo, Fierrez Julian (2020) GANprintR: improved fakes and evaluation of the state of the art in face manipulation detection. IEEE J Sel Top Signal Process 14(5):1038\u20131048","journal-title":"IEEE J Sel Top Signal Process"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) ImageNet: a large-scale hierarchical image database. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Chung JS, Nagrani A, Zisserman A (2018) VoxCeleb2: deep speaker recognition. arXiv:1806.05622","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Zhou T, Wang W, Liang Z, Shen J (2021) Face forensics in the wild. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00572"},{"key":"21_CR34","doi-asserted-by":"publisher","first-page":"167209","DOI":"10.1109\/ACCESS.2020.3022987","volume":"8","author":"Min Pang","year":"2020","unstructured":"Pang Min, He Ligang, Kuang Liqun, Chang Min, He Zhiying, Han Xie (2020) Developing a parametric 3D face model editing algorithm. IEEE Access 8:167209\u2013167224","journal-title":"IEEE Access"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Giachanou A, Zhang G, Rosso P (2020) Multimodal multi-image fake news detection. In: Proceedings of the IEEE international conference on data science and advanced analytics","DOI":"10.1109\/DSAA49011.2020.00091"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Singhal S, Kabra A, Sharma M, Shah RR, Chakraborty T, Kumaraguru P (2020) Spotfake+: a multimodal framework for fake news detection via transfer learning. In: Proceedings of the AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v34i10.7230"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Du M, Pentyala S, Li Y, Hu X (2020) Towards generalizable Deepfake detection with locality-aware AutoEncoder. In: Proceedings of the ACM international conference on information & knowledge management","DOI":"10.1145\/3340531.3411892"},{"key":"21_CR38","doi-asserted-by":"crossref","unstructured":"Nguyen HH, Fang F, Yamagishi J, Echizen I (2019) Multi-task learning for detecting and segmenting manipulated facial images and videos. In: Proceedings of the IEEE international conference on biometrics theory, applications and systems","DOI":"10.1109\/BTAS46853.2019.9185974"},{"key":"21_CR39","unstructured":"Cozzolino D, Thies J, R\u00f6ssler A, Riess C, Nie\u00dfner M, Verdoliva L (2018) ForensicTransfer: weakly-supervised domain adaptation for forgery detection. arXiv:1812.02510"},{"key":"21_CR40","doi-asserted-by":"crossref","unstructured":"Peng B, Fan H, Wang W, Dong J, Li Y, Lyu S, Li Q, Sun Z, Chen H, Chen B et\u00a0al (2021) DFGC 2021: a DeepFake game competition. arXiv:2106.01217","DOI":"10.1109\/IJCB52358.2021.9484387"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Bernardo K, Haryanto NE, Busch C (2021) Effects of image compression on face image manipulation detection: a case study on facial retouching. IET Biom 10","DOI":"10.1049\/bme2.12027"},{"key":"21_CR42","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"Javier Galbally","year":"2014","unstructured":"Galbally Javier, Marcel Sebastien, Fierrez Julian (2014) Biometric anti-spoofing methods: a survey in face recognition. IEEE Access 2:1530\u20131552","journal-title":"IEEE Access"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Marcel S, Nixon MS, Fierrez J, Evans N (2019) Handbook of biometric anti-spoofing, 2nd edn","DOI":"10.1007\/978-3-319-92627-8"},{"issue":"1","key":"21_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"Raghavendra Ramachandra","year":"2017","unstructured":"Ramachandra Raghavendra, Busch Christoph (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv 50(1):1\u201337","journal-title":"ACM Comput Surv"},{"key":"21_CR45","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TIFS.2019.2934867","volume":"15","author":"Ruben Tolosana","year":"2019","unstructured":"Tolosana Ruben, Gomez-Barrero Marta, Busch Christoph, Ortega-Garcia Javier (2019) Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans Inf Forensics Secur 15:1261\u20131275","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Trinh L, Tsang M, Rambhatla S, Liu Y (2021) Interpretable and trustworthy DeepFake detection via dynamic prototypes. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision","DOI":"10.1109\/WACV48630.2021.00202"},{"key":"21_CR47","doi-asserted-by":"crossref","unstructured":"Carlini N, Farid H (2020) Evading Deepfake-image detectors with white-and black-box attacks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW50498.2020.00337"},{"key":"21_CR48","doi-asserted-by":"crossref","unstructured":"Gandhi A, Jain S (2020) Adversarial perturbations fool Deepfake detectors. In: Proceedings of the international joint conference on neural networks","DOI":"10.1109\/IJCNN48605.2020.9207034"},{"key":"21_CR49","unstructured":"Huang Y, Juefei-Xu F, Wang R, Xie X, Ma L, Li J, Miao W, Liu Y, Pu G (2020) FakeLocator: robust localization of GAN-based face manipulations via semantic segmentation networks with bells and whistles. arXiv:2001.09598"},{"key":"21_CR50","doi-asserted-by":"crossref","unstructured":"Huang R, Fang F, Nguyen HH, Yamagishi J, Echizen I (2020) Security of facial forensics models against adversarial attacks. In: Proceedings of the IEEE international conference on image processing","DOI":"10.1109\/ICIP40778.2020.9190678"},{"key":"21_CR51","doi-asserted-by":"crossref","unstructured":"Hussain S, Neekhara P, Jere M, Koushanfar F, McAuley J (2021) Adversarial Deepfakes: evaluating vulnerability of Deepfake detectors to adversarial examples. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision","DOI":"10.1109\/WACV48630.2021.00339"},{"key":"21_CR52","doi-asserted-by":"crossref","unstructured":"Cozzolino D, Thies J, R\u00f6ssler A, Nie\u00dfner M, Verdoliva L (2021) SpoC: spoofing camera fingerprints. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW53098.2021.00110"},{"key":"21_CR53","doi-asserted-by":"crossref","unstructured":"Lago F, Pasquini C, B\u00f6hme R, Dumont H, Goffaux V, Boato G (2021) More real than real: a study on human visual perception of synthetic faces. arXiv:2106.07226v1","DOI":"10.1109\/MSP.2021.3120982"},{"key":"21_CR54","volume-title":"Synthetic faces: how perceptually convincing are they?","author":"Sophie J Nightingale","year":"2021","unstructured":"Nightingale Sophie J, Agarwal Shruti, H\u00e4rk\u00f6nen Erik, Lehtinen Jaakko, Farid Hany (2021) Synthetic faces: how perceptually convincing are they? Vision Sciences Society (VSS) meeting, In Proc"},{"issue":"1","key":"21_CR55","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/e20010060","volume":"20","author":"Bla\u017e Meden","year":"2018","unstructured":"Meden Bla\u017e, Emer\u0161i\u010d \u017diga, \u0160truc Vitomir, Peer Peter (2018) k-same-net: k-anonymity with generative deep neural networks for face deidentification. Entropy 20(1):60","journal-title":"Entropy"},{"key":"21_CR56","doi-asserted-by":"crossref","unstructured":"Meden B, Mall\u0131 RC, Fabijan S, Ekenel HK, \u0160truc V, Peer P (2017) Face deidentification with generative deep neural networks. IET Signal Process 11(9):1046\u20131054","DOI":"10.1049\/iet-spr.2017.0049"},{"key":"21_CR57","doi-asserted-by":"publisher","first-page":"99735","DOI":"10.1109\/ACCESS.2019.2924619","volume":"7","author":"Vahid Mirjalili","year":"2019","unstructured":"Mirjalili Vahid, Raschka Sebastian, Ross Arun (2019) FlowSAN: privacy-enhancing semi-adversarial networks to confound arbitrary face-based gender classifiers. IEEE Access 7:99735\u201399745","journal-title":"IEEE Access"},{"key":"21_CR58","unstructured":"Giovanni C, Luisa P, Verdoliva D (2019) Extracting camera-based fingerprints for video forensics. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops"},{"key":"21_CR59","unstructured":"Perera P, Oza P, Patel VM (2021) One\u2013class classification: a survey, pp 1\u201319. arXiv:2101.03064"},{"key":"21_CR60","unstructured":"Hoi SC, Sahoo D, Lu J, Zhao P (2021) A comprehensive survey. Neurocomputing, Online Learning"},{"issue":"2","key":"21_CR61","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11704-019-8208-z","volume":"14","author":"Xibin Dong","year":"2020","unstructured":"Dong Xibin, Zhiwen Yu, Cao Wenming, Shi Yifan, Ma Qianli (2020) A survey on ensemble learning. Front Comput Sci 14(2):241\u2013258","journal-title":"Front Comput Sci"},{"key":"21_CR62","doi-asserted-by":"crossref","unstructured":"Sagi O, Rokach L (2018) Ensemble learning: a survey. Wiley Interdiscip Rev Data Min Knowl Discov 8(4)","DOI":"10.1002\/widm.1249"},{"key":"21_CR63","unstructured":"Montavon G, Binder A, Lapuschkin S, Samek W, M\u00fcller KR (2019) Explainable AI: interpreting, explaining and visualizing deep learning, vol 11700. Springer Nature"},{"key":"21_CR64","doi-asserted-by":"crossref","unstructured":"Cozzolino D, R\u00f6ssler A, Thies J, Nie\u00dfner M, Verdoliva L (2021) ID-reveal: identity-aware DeepFake video detection. arXiv:2012.02512","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"21_CR65","doi-asserted-by":"publisher","first-page":"106373","DOI":"10.1109\/ACCESS.2020.3000254","volume":"8","author":"C Rathgeb","year":"2020","unstructured":"Rathgeb C, Satnoianu C-I, Haryanto NE, Bernardo K, Busch C (2020) Differential detection of facial retouching: a multi-biometric approach. IEEE Access 8:106373\u2013106385","journal-title":"IEEE Access"},{"key":"21_CR66","doi-asserted-by":"crossref","unstructured":"Scherhag U, Rathgeb C, Merkle J, Busch C (2020) Deep face representations for differential morphing attack detection. In: IEEE transactions on information forensics and security","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"21_CR67","doi-asserted-by":"crossref","unstructured":"Hsu LY, Hu HT (2020) Blind watermarking for color images using EMMQ based on QDFT. Expert Syst Appl 149","DOI":"10.1016\/j.eswa.2020.113225"},{"key":"21_CR68","doi-asserted-by":"crossref","unstructured":"Khare P, Srivastava VK (2021) A secured and robust medical image watermarking approach for protecting Iitegrity of medical images. Trans Emerg Telecommun Technol 32(2)","DOI":"10.1002\/ett.3918"},{"key":"21_CR69","unstructured":"Terh\u00f6rst P, Huber M, Damer N, Rot P, Kirchbuchner F, Struc V, Kuijper A (2020) Privacy evaluation protocols for the evaluation of soft-biometric privacy-enhancing technologies. In: 2020 International conference of the biometrics special interest group (BIOSIG), pp 1\u20135"},{"key":"21_CR70","doi-asserted-by":"crossref","unstructured":"Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232\u2013243","DOI":"10.1109\/TKDE.2005.32"},{"issue":"5","key":"21_CR71","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"21_CR72","doi-asserted-by":"crossref","unstructured":"Croft WL, Sack JR, Shi W (2019) Differentially private obfuscation of facial images. In: Proceedings of the international cross-domain conference for machine learning and knowledge extraction","DOI":"10.1007\/978-3-030-29726-8_15"},{"key":"21_CR73","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the international conference on theory and applications of models of computation"},{"key":"21_CR74","volume-title":"Analysis of the e-passport readiness in the EU","author":"Marek Tiits","year":"2014","unstructured":"Tiits Marek, Kalvet Tarmo, Mikko Katrin-Laas (2014) Analysis of the e-passport readiness in the EU. Institute of Baltic Studies, Technical report, Tartu"},{"key":"21_CR75","unstructured":"Tiits M, Kalvet T, Mikko K-L (2014) Social acceptance of e-passports. In: Proceedings of the international conference of the biometrics special interest group"}],"updated-by":[{"updated":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"DOI":"10.1007\/978-3-030-87664-7_22","type":"correction","source":"publisher","label":"Correction"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Digital Face Manipulation and Detection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87664-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T07:05:29Z","timestamp":1707462329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87664-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030876630","9783030876647"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87664-7_21","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"1 January 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}