{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T17:05:13Z","timestamp":1726419913041},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.ins.2023.03.079","type":"journal-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T03:16:53Z","timestamp":1678850213000},"page":"370-383","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["A facial geometry based detection model for face manipulation using CNN-LSTM architecture"],"prefix":"10.1016","volume":"633","author":[{"given":"Peifeng","family":"Liang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4467-9599","authenticated-orcid":false,"given":"Zenggang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Honghui","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Hongjin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"10","key":"10.1016\/j.ins.2023.03.079_br0010","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.sysarc.2012.07.001","article-title":"Three-phase time-aware energy minimization with DVFS and unrolling for chip multiprocessors","volume":"58","author":"Qiu","year":"2012","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.ins.2023.03.079_br0020","series-title":"IEEE EUC Conf.","first-page":"25","article-title":"Efficient algorithm of energy minimization for heterogeneous wireless sensor network","author":"Qiu","year":"2006"},{"key":"10.1016\/j.ins.2023.03.079_br0030","series-title":"2015 IEEE Symposium on Service-Oriented System Engineering","first-page":"127","article-title":"A reusable software component for integrated syntax and semantic validation for services computing","author":"Tao","year":"2015"},{"key":"10.1016\/j.ins.2023.03.079_br0040","series-title":"Proc. of Neural Information Processing Systems","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014"},{"key":"10.1016\/j.ins.2023.03.079_br0050","unstructured":"J. Vincent, An online propaganda campaign used AI-generated headshots to create fake journalists, Verge.com."},{"key":"10.1016\/j.ins.2023.03.079_br0060","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.ins.2022.04.014","article-title":"Detecting deepfake videos based on spatiotemporal attention and convolutional LSTM","volume":"601","author":"Chen","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.03.079_br0070","doi-asserted-by":"crossref","DOI":"10.1002\/widm.1438","article-title":"Deepfake attribution: on the source identification of artificially generated images","author":"Khoo","year":"2022","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"10.1016\/j.ins.2023.03.079_br0080","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.ins.2022.03.026","article-title":"Ffr_fd: effective and fast detection of deepfakes via feature point defects","volume":"596","author":"Wang","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.03.079_br0090","series-title":"Proc. of 2018 IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"1","article-title":"Exposing AI created fake videos by detecting eye blinking","author":"Li","year":"2018"},{"key":"10.1016\/j.ins.2023.03.079_br0100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPAMI.2020.3009287","article-title":"Fakecatcher: detection of synthetic portrait videos using biological signals","volume":"01","author":"Ciftci","year":"2020","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.ins.2023.03.079_br0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107616","article-title":"Identification of deep network generated images using disparities in color components","volume":"174","author":"Li","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.ins.2023.03.079_br0130","series-title":"Proc. of 2020 European Conference on Computer Vision","first-page":"86","article-title":"Thinking in frequency: face forgery detection by mining frequency-aware clues","author":"Qian","year":"2020"},{"key":"10.1016\/j.ins.2023.03.079_br0140","unstructured":"B. Zhang, S. Li, G. Feng, Z. Qian, X. Zhang, Patch diffusion: a general module for face manipulation detection."},{"key":"10.1016\/j.ins.2023.03.079_br0150","series-title":"Proc. of 2021 International Carnahan Conference on Security Technology (ICCST)","first-page":"1","article-title":"An experimental evaluation on deepfake detection using deep face recognition","author":"Ramachandran","year":"2021"},{"key":"10.1016\/j.ins.2023.03.079_br0160","series-title":"Proc. of 25th International Conference on Pattern Recognition (ICPR)","first-page":"9827","article-title":"An experimental evaluation of recent face recognition losses for deepfake detection","author":"Liu","year":"2021"},{"issue":"7","key":"10.1016\/j.ins.2023.03.079_br0170","doi-asserted-by":"crossref","first-page":"3286","DOI":"10.1109\/TIP.2019.2895466","article-title":"Hybrid LSTM and encoder\u2013decoder architecture for detection of image forgeries","volume":"28","author":"Bappy","year":"2019","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"10.1016\/j.ins.2023.03.079_br0180","doi-asserted-by":"crossref","first-page":"5929","DOI":"10.1007\/s10462-020-09838-1","article-title":"A review on the long short-term memory model","volume":"53","author":"Van Houdt","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.ins.2023.03.079_br0190","series-title":"Proc. of the IEEE International Conference on Computer Vision","first-page":"3730","article-title":"Deep learning face attributes in the wild","author":"Liu","year":"2015"},{"issue":"3","key":"10.1016\/j.ins.2023.03.079_br0200","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1360612.1360638","article-title":"Face swapping: automatically replacing faces in photographs","volume":"27","author":"Bitouk","year":"2008","journal-title":"ACM Trans. Graph."},{"key":"10.1016\/j.ins.2023.03.079_br0210","series-title":"Proc. of 2012 IEEE International Conference on Multimedia and Expo","first-page":"333","article-title":"Face swapping under large pose variations: a 3d model based approach","author":"Lin","year":"2012"},{"key":"10.1016\/j.ins.2023.03.079_br0220","series-title":"Proc. of the IEEE\/CVF International Conference on Computer Vision","first-page":"7184","article-title":"Fsgan: subject agnostic face swapping and reenactment","author":"Nirkin","year":"2019"},{"key":"10.1016\/j.ins.2023.03.079_br0230","series-title":"ACM SIGGRAPH 2018 Posters","first-page":"1","article-title":"Rsgan: face swapping and editing using face and hair representation in latent spaces","author":"Natsume","year":"2018"},{"key":"10.1016\/j.ins.2023.03.079_br0240","series-title":"Proc. of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"6713","article-title":"Towards open-set identity preserving face synthesis","author":"Bao","year":"2018"},{"author":"Li","key":"10.1016\/j.ins.2023.03.079_br0250"},{"key":"10.1016\/j.ins.2023.03.079_br0260","series-title":"ACM Asia Conf. on Computer and Comm.","article-title":"Deepsweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation","author":"Qiu","year":"2021"},{"issue":"3","key":"10.1016\/j.ins.2023.03.079_br0270","first-page":"2124","article-title":"Deep residual learning-based enhanced JPEG compression in the Internet of things","volume":"17","author":"Qiu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.ins.2023.03.079_br0280","series-title":"Proc. of 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"1881","article-title":"Detection and localization of image forgeries using resampling features and deep learning","author":"Bunk","year":"2017"},{"key":"10.1016\/j.ins.2023.03.079_br0290","series-title":"Proc. of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4690","article-title":"Arcface: additive angular margin loss for deep face recognition","author":"Deng","year":"2019"},{"issue":"3","key":"10.1016\/j.ins.2023.03.079_br0300","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","article-title":"Blind authentication using periodic properties of interpolation","volume":"3","author":"Mahdian","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2023.03.079_br0310","series-title":"Proc. of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"5194","article-title":"Psgan: pose and expression robust spatial-aware GAN for customizable makeup transfer","author":"Jiang","year":"2020"},{"key":"10.1016\/j.ins.2023.03.079_br0320","series-title":"Proc. of the European Conference on Computer Vision (ECCV)","first-page":"325","article-title":"Bisenet: bilateral segmentation network for real-time semantic segmentation","author":"Yu","year":"2018"},{"key":"10.1016\/j.ins.2023.03.079_br0330","series-title":"Proc. of International Conference on Medical Image Computing and Computer-Assisted Intervention","first-page":"234","article-title":"U-net: convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015"},{"key":"10.1016\/j.ins.2023.03.079_br0340","doi-asserted-by":"crossref","first-page":"161509","DOI":"10.1109\/ACCESS.2020.3021531","article-title":"Laun improved StarGAN for facial emotion recognition","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.ins.2023.03.079_br0350","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1109\/TPAMI.2016.2644615","article-title":"Segnet: a deep convolutional encoder-decoder architecture for image segmentation","volume":"39","author":"Badrinarayanan","year":"2017","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.ins.2023.03.079_br0360","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102779","article-title":"A fault detection model for edge computing security using imbalanced classification","volume":"133","author":"Liang","year":"2022","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.ins.2023.03.079_br0370","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","article-title":"Data imbalance in classification: experimental evaluation","volume":"513","author":"Thabtah","year":"2020","journal-title":"Inf. Sci."},{"author":"Kingma","key":"10.1016\/j.ins.2023.03.079_br0380"},{"key":"10.1016\/j.ins.2023.03.079_br0390","series-title":"Proc. of the IEEE\/CVF International Conference on Computer Vision","first-page":"1","article-title":"Faceforensics++: learning to detect manipulated facial images","author":"Rossler","year":"2019"},{"author":"Kawa","key":"10.1016\/j.ins.2023.03.079_br0400"},{"key":"10.1016\/j.ins.2023.03.079_br0410","series-title":"Proc. of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2387","article-title":"Face2face: real-time face capture and reenactment of RGB videos","author":"Thies","year":"2016"},{"issue":"5","key":"10.1016\/j.ins.2023.03.079_br0420","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1109\/JSTSP.2020.3002101","article-title":"Media forensics and deepfakes: an overview","volume":"14","author":"Verdoliva","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"10.1016\/j.ins.2023.03.079_br0430","series-title":"Proc. of 2017 IEEE International Conference on Computer Vision","first-page":"3677","article-title":"Fast face-swap using convolutional neural networks","author":"Korshunova","year":"2017"},{"issue":"4","key":"10.1016\/j.ins.2023.03.079_br0440","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3306346.3323035","article-title":"Deferred neural rendering: image synthesis using neural textures","volume":"38","author":"Thies","year":"2019","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"10.1016\/j.ins.2023.03.079_br0450","series-title":"Proc. of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"2889","article-title":"Deeperforensics-1.0: a large-scale dataset for real-world face forgery detection","author":"Jiang","year":"2020"},{"key":"10.1016\/j.ins.2023.03.079_br0460","series-title":"Proc. of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3207","article-title":"Celeb-df: a large-scale challenging dataset for deepfake forensics","author":"Li","year":"2020"},{"key":"10.1016\/j.ins.2023.03.079_br0470","series-title":"Proc. of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8695","article-title":"Cnn-generated images are surprisingly easy to spot... for now","author":"Wang","year":"2020"},{"author":"Li","key":"10.1016\/j.ins.2023.03.079_br0480"},{"key":"10.1016\/j.ins.2023.03.079_br0490","series-title":"Proc. of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"5001","article-title":"Face x-ray for more general face forgery detection","author":"Li","year":"2020"},{"author":"Dong","key":"10.1016\/j.ins.2023.03.079_br0500"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025523003894?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025523003894?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T03:34:47Z","timestamp":1705548887000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025523003894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":49,"alternative-id":["S0020025523003894"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2023.03.079","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A facial geometry based detection model for face manipulation using CNN-LSTM architecture","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2023.03.079","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}