{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:56:44Z","timestamp":1740106604513,"version":"3.37.3"},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["109-2221-E-562-002"],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Visual Communication and Image Representation"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1016\/j.jvcir.2024.104094","type":"journal-article","created":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T03:27:40Z","timestamp":1708745260000},"page":"104094","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["AI-assisted deepfake detection using adaptive blind image watermarking"],"prefix":"10.1016","volume":"100","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9543-6872","authenticated-orcid":false,"given":"Ling-Yuan","family":"Hsu","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jvcir.2024.104094_b0005","series-title":"Deep Fake: an Understanding of Fake Images and Videos","first-page":"183","author":"Negi","year":"2021"},{"issue":"4","key":"10.1016\/j.jvcir.2024.104094_b0010","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1162\/leon_a_01930","article-title":"Visual indeterminacy in GAN art","volume":"53","author":"Hertzmann","year":"2020","journal-title":"Leonardo"},{"key":"10.1016\/j.jvcir.2024.104094_b0015","series-title":"In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4401","article-title":"A style-based generator architecture for generative adversarial networks","author":"Karras","year":"2019"},{"key":"10.1016\/j.jvcir.2024.104094_b0020","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake Detection: A Systematic Literature Review","volume":"10","author":"Rana","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jvcir.2024.104094_b0025","unstructured":"T. Wang, M. Huang, H. Cheng, B. Ma, and Y. Wang, \u201cRobust Identity Perceptual Watermark Against Deepfake Face Swapping,\u201d arXiv preprint arXiv:2311.01357, 2023."},{"key":"10.1016\/j.jvcir.2024.104094_b0030","series-title":"In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"4655","article-title":"Improving Fairness in Deepfake Detection","author":"Ju","year":"2024"},{"issue":"7","key":"10.1016\/j.jvcir.2024.104094_b0035","doi-asserted-by":"crossref","first-page":"7512","DOI":"10.1007\/s10489-022-03867-9","article-title":"DeepFake detection algorithm based on improved vision transformer","volume":"53","author":"Heo","year":"2023","journal-title":"Appl. Intell."},{"key":"10.1016\/j.jvcir.2024.104094_b0040","series-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence","first-page":"1","article-title":"FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals","author":"Ciftci","year":"2020"},{"key":"10.1016\/j.jvcir.2024.104094_b0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103239","article-title":"Dynamic texture analysis for detecting fake faces in video sequences","volume":"79","author":"Bonomi","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2024.104094_b0050","series-title":"In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops","first-page":"666","article-title":"Deepfake detection by analyzing convolutional traces","author":"Guarnera","year":"2020"},{"key":"10.1016\/j.jvcir.2024.104094_b0055","unstructured":"S. Agarwal and L. R. Varshney, \u201cLimits of deepfake detection: A robust estimation viewpoint,\u201d arXiv preprint arXiv:1905.03493, 2019."},{"issue":"4","key":"10.1016\/j.jvcir.2024.104094_b0060","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1109\/18.850674","article-title":"Authentication theory and hypothesis testing","volume":"46","author":"Maurer","year":"2000","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.jvcir.2024.104094_b0065","doi-asserted-by":"crossref","first-page":"41596","DOI":"10.1109\/ACCESS.2019.2905689","article-title":"Combating deepfake videos using blockchain and smart contracts","volume":"7","author":"Hasan","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jvcir.2024.104094_b0070","series-title":"2020 IEEE\/ITU International Conference on Artificial Intelligence for Good (AI4G)","first-page":"55","author":"Chan","year":"2020"},{"key":"10.1016\/j.jvcir.2024.104094_b0075","series-title":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","first-page":"1","author":"Salih","year":"2022"},{"issue":"14","key":"10.1016\/j.jvcir.2024.104094_b0080","doi-asserted-by":"crossref","first-page":"3938","DOI":"10.1049\/ipr2.12909","article-title":"A novel blind tamper detection and localization scheme for multiple faces in digital images","volume":"17","author":"Thabit","year":"2023","journal-title":"IET Image Proc."},{"key":"10.1016\/j.jvcir.2024.104094_b0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2023.103837","article-title":"Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain","volume":"94","author":"Cao","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2024.104094_b0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2023.103875","article-title":"Wavelet-FCWAN: Fast and Covert Watermarking Attack Network in Wavelet Domain","volume":"95","author":"Wang","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2024.104094_b0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.169319","article-title":"Robust and reversible color image watermarking based on DFT in the spatial domain","volume":"262","author":"Cao","year":"2022","journal-title":"Optik"},{"key":"10.1016\/j.jvcir.2024.104094_b0100","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.jvcir.2016.05.001","article-title":"Robust non-blind color video watermarking using QR decomposition and entropy analysis","volume":"38","author":"Rasti","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2024.104094_b0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2023.103986","article-title":"Blind image watermark decoder in NSST-FPCET domain using Weibull Mixtures-HMT","volume":"97","author":"Wang","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"10.1016\/j.jvcir.2024.104094_b0110","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1006\/cviu.2001.0921","article-title":"Face Detection: A Survey","volume":"83","author":"Hjelm\u00e5s","year":"2001","journal-title":"Comput. Vis. Image Underst."},{"issue":"10","key":"10.1016\/j.jvcir.2024.104094_b0115","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process Lett."},{"issue":"Supplement C","key":"10.1016\/j.jvcir.2024.104094_b0120","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jvcir.2017.03.009","article-title":"Robust blind image watermarking using crisscross inter-block prediction in the DCT domain","volume":"46","author":"Hsu","year":"2017","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"10.1016\/j.jvcir.2024.104094_b0125","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.aeue.2015.11.003","article-title":"A mixed modulation scheme for blind image watermarking","volume":"70","author":"Hu","year":"2016","journal-title":"AEU-Int. J. Electron. C."},{"issue":"10","key":"10.1016\/j.jvcir.2024.104094_b0130","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1109\/81.633874","article-title":"An introduction to the synchronization of chaotic systems: Coupled skew tent maps","volume":"44","author":"Hasler","year":"1997","journal-title":"IEEE Trans. Circuits Syst. Fundam. Theory Appl."},{"key":"10.1016\/j.jvcir.2024.104094_b0135","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey Wolf Optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Adv. Eng. Softw."},{"key":"10.1016\/j.jvcir.2024.104094_b0140","unstructured":"C. Louizos, K. Swersky, Y. Li, M. Welling, and R. Zemel, \u201cThe variational fair autoencoder,\u201d arXiv preprint arXiv:1511.00830, 2015."},{"key":"10.1016\/j.jvcir.2024.104094_b0145","unstructured":"A. Creswell, K. Arulkumaran, and A. A. Bharath, \u201cOn denoising autoencoders trained to minimise binary cross-entropy,\u201d arXiv preprint arXiv:1708.08487, 2017."},{"issue":"4","key":"10.1016\/j.jvcir.2024.104094_b0150","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.jvcir.2024.104094_b0155","unstructured":"C. V. G. University of Granada. \u201cCVG-UGR Image Database \u201d http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/c512.php (accessed."},{"key":"10.1016\/j.jvcir.2024.104094_b0160","unstructured":"A. Sage, E. Agustsson, R. Timofte, and L. V. Gool. \u201cLLD - Large Logo Dataset.\u201d https:\/\/data.vision.ee.ethz.ch\/sagea\/lld\/ (accessed."},{"key":"10.1016\/j.jvcir.2024.104094_b0165","unstructured":"P. Arbelaez, C. Fowlkes, and D. Martin. \u201cThe Berkeley Segmentation Dataset and Benchmark.\u201d https:\/\/www2.eecs.berkeley.edu\/Research\/Projects\/CS\/vision\/bsds\/ (accessed."},{"key":"10.1016\/j.jvcir.2024.104094_b0170","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1016\/j.ijleo.2017.05.011","article-title":"An improved robust image watermarking method using DCT and YCoCg-R color space","volume":"140","author":"Moosazadeh","year":"2017","journal-title":"Optik"},{"key":"10.1016\/j.jvcir.2024.104094_b0175","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","article-title":"Robust and blind image watermarking in DCT domain using inter-block coefficient correlation","volume":"517","author":"Ko","year":"2020","journal-title":"Inf. Sci."},{"issue":"7","key":"10.1016\/j.jvcir.2024.104094_b0180","doi-asserted-by":"crossref","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","article-title":"DWFCAT: dual watermarking framework for industrial image authentication and tamper localization","volume":"17","author":"Kamili","year":"2020","journal-title":"IEEE Trans. Ind. Inf."}],"container-title":["Journal of Visual Communication and Image Representation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S104732032400049X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S104732032400049X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T09:40:26Z","timestamp":1717407626000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S104732032400049X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":36,"alternative-id":["S104732032400049X"],"URL":"https:\/\/doi.org\/10.1016\/j.jvcir.2024.104094","relation":{},"ISSN":["1047-3203"],"issn-type":[{"type":"print","value":"1047-3203"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AI-assisted deepfake detection using adaptive blind image watermarking","name":"articletitle","label":"Article Title"},{"value":"Journal of Visual Communication and Image Representation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jvcir.2024.104094","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"104094"}}