{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T08:46:29Z","timestamp":1763541989801,"version":"3.45.0"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.129632","type":"journal-article","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T23:30:52Z","timestamp":1757115052000},"page":"129632","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["Dual-stream temporal-spatial forgery detection via phase-consistent edge features and 3D visual state-space modeling"],"prefix":"10.1016","volume":"298","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-8256-0156","authenticated-orcid":false,"given":"Zhong","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0003-5567-7609","authenticated-orcid":false,"given":"Siyang","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7679-0171","authenticated-orcid":false,"given":"Zuxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2025.129632_bib0001","doi-asserted-by":"crossref","first-page":"2523","DOI":"10.1109\/TASLP.2023.3288409","article-title":"AudioLM: A language modeling approach to audio generation","volume":"31","author":"Borsos","year":"2023","journal-title":"IEEE\/ACM transactions on audio, speech, and language processing"},{"key":"10.1016\/j.eswa.2025.129632_bib0002","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, C., Yao, T., Chen, S., Ding, S., Yang, X. (a). End-to-end reconstruction-classification learning for face forgery detection. Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022, 4113\u20134122.","DOI":"10.1109\/CVPR52688.2022.00408"},{"key":"10.1016\/j.eswa.2025.129632_bib0003","series-title":"Proceedings of second international conference on computing, communications, and cyber-security: IC4S 2020","first-page":"557","article-title":"Deepfake: An overview","author":"Chadha","year":"2021"},{"key":"10.1016\/j.eswa.2025.129632_bib0004","series-title":"Proceedings of the 28th ACM international conference on multimedia","first-page":"2003","article-title":"SimSwap: An efficient framework for high fidelity face swapping","author":"Chen","year":"2020"},{"issue":"5","key":"10.1016\/j.eswa.2025.129632_bib0005","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/JSTSP.2020.2999185","article-title":"Recurrent convolutional structures for audio spoof and video deepfake detection","volume":"14","author":"Chintha","year":"2020","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"10.1016\/j.eswa.2025.129632_bib0006","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"1251","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"Chollet","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0007","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"5781","article-title":"On the detection of digital face manipulation","author":"Dang","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0008","doi-asserted-by":"crossref","unstructured":"Das, S., Seferbekov, S., Datta, A., Islam, MS., Amin, MR., (b). Towards solving the deepfake problem: An analysis on improving deepfake detection using dynamic face augmentation. Proceedings of the IEEE\/CVF international conference on computer vision, 2021, 3776\u20133785.","DOI":"10.1109\/ICCVW54120.2021.00421"},{"key":"10.1016\/j.eswa.2025.129632_bib0009","series-title":"Technical Report","article-title":"Improved regularization of convolutional neural networks with cutout","author":"Devries","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0010","series-title":"Proceedings of the European conference on computer vision (ECCV)","first-page":"534","article-title":"Joint 3D face reconstruction and dense alignment with position map regression network","author":"Feng","year":"2018"},{"issue":"3","key":"10.1016\/j.eswa.2025.129632_bib0011","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"10.1016\/j.eswa.2025.129632_bib0012","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.eswa.2025.129632_bib0013","series-title":"Technical Report","article-title":"Linear-time sequence modeling with selective state spaces","author":"Gu","year":"2023"},{"key":"10.1016\/j.eswa.2025.129632_bib0014","doi-asserted-by":"crossref","unstructured":"Gu, Q., Chen, S., Yao, T., (c). Exploiting fine-grained face forgery clues via progressive enhancement learning. Proceedings of the AAAI Conference on Artificial Intelligence, 2022, 735\u2013743.","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"10.1016\/j.eswa.2025.129632_bib0015","doi-asserted-by":"crossref","unstructured":"Gu, Z., Yao, T., Chen, Y.,(d). Hierarchical contrastive inconsistency learning for deepfake video detection (vol. 2022). Cham. Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-19775-8_35"},{"key":"10.1016\/j.eswa.2025.129632_bib0016","doi-asserted-by":"crossref","unstructured":"Haliassos, A., Vougioukas, K., Petridis, S., Pantic, M., (e). Lips don\u2019t lie: A generalisable and robust approach to face forgery detection. Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2021, 5039\u20135049.","DOI":"10.1109\/CVPR46437.2021.00500"},{"issue":"11","key":"10.1016\/j.eswa.2025.129632_bib0017","doi-asserted-by":"crossref","first-page":"5464","DOI":"10.1109\/TIP.2019.2916751","article-title":"AttGAN: Facial attribute editing by only changing what you want","volume":"28","author":"He","year":"2019","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.eswa.2025.129632_bib0018","series-title":"Advances in neural information processing systems","article-title":"Denoising diffusion probabilistic models","volume":"vol. 33","author":"Ho","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0019","series-title":"2020 11th International conference on information and communication systems (ICICS)","first-page":"53","article-title":"Forensics and analysis of deepfake videos","author":"Jafar","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0020","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"2889","article-title":"Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection","author":"Jiang","year":"2020"},{"issue":"3","key":"10.1016\/j.eswa.2025.129632_bib0021","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1089\/cyber.2020.0272","article-title":"The real threat of deepfake pornography: A review of canadian policy","volume":"24","author":"Karasavva","year":"2021","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.eswa.2025.129632_bib0022","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"The Journal of Machine Learning Research"},{"key":"10.1016\/j.eswa.2025.129632_bib0023","series-title":"Proceedings of the IEEE international conference on computer vision","first-page":"3677","article-title":"Fast face-swap using convolutional neural networks","author":"Korshunova","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0024","unstructured":"Kovesi, P. (1999). Image features from phase congruency, videre: Journal of computer vision research (vol. 1)."},{"key":"10.1016\/j.eswa.2025.129632_bib0025","doi-asserted-by":"crossref","unstructured":"Li, J., Xie, H., Yu, L. (f). Wavelet-enhanced weakly supervised local feature learning for face forgery detection. Proceedings of the 30th ACM international conference on multimedia, 2022, 1299\u20131308.","DOI":"10.1145\/3503161.3547832"},{"key":"10.1016\/j.eswa.2025.129632_bib0026","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"5001","article-title":"Face x-ray for more general face forgery detection","author":"Li","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0027","series-title":"IEEE International workshop on information forensics and security (WIFS)","first-page":"1","article-title":"In ictu oculi: Exposing AI created fake videos by detecting eye blinking","author":"Li","year":"2018"},{"key":"10.1016\/j.eswa.2025.129632_bib0028","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"3204","article-title":"Celeb-DF: A large-scale challenging dataset for deepfake forensics","author":"Li","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0029","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"3673","article-title":"STGAN: A unified selective transfer network for arbitrary image attribute editing","author":"Liu","year":"2019"},{"key":"10.1016\/j.eswa.2025.129632_bib0030","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., & Guo, B. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (pp. 10012\u201310022).","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"10.1016\/j.eswa.2025.129632_bib0031","doi-asserted-by":"crossref","first-page":"4517","DOI":"10.1109\/TIFS.2024.3381823","article-title":"Where deepfakes gaze at? Spatial-temporal gaze inconsistency analysis for video face forgery detection","volume":"19","author":"Peng","year":"2024","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2025.129632_bib0032","doi-asserted-by":"crossref","unstructured":"Peng, C., Sun, F., Liu, D., Wang, N., & Gao, X. (2024). Local artifacts amplification for deepfakes augmentation. Neural Networks, 180, 106692.","DOI":"10.1016\/j.neunet.2024.106692"},{"key":"10.1016\/j.eswa.2025.129632_bib0033","series-title":"European conference on computer vision","first-page":"86","article-title":"Thinking in frequency: Face forgery detection by mining frequency-aware clues","author":"Qian","year":"2020"},{"key":"10.1016\/j.eswa.2025.129632_bib0034","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake detection: A systematic literature review","volume":"10","author":"Rana","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.129632_bib0035","doi-asserted-by":"crossref","first-page":"143","DOI":"10.26556\/jesp.v22i2.1628","article-title":"Deepfakes, deep harms","volume":"22","author":"Rini","year":"2022","journal-title":"Journal of Ethics & Social Philosophy"},{"key":"10.1016\/j.eswa.2025.129632_bib0036","series-title":"proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"2980","article-title":"Focal loss for dense object detection","author":"Ross","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0037","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"1","article-title":"FaceForensics: Learning to detect manipulated facial images","author":"Rossler","year":"2019"},{"key":"10.1016\/j.eswa.2025.129632_bib0038","series-title":"Recurrent convolutional strategies for face manipulation detection in videos, interfaces (GUI)","volume":"vol. 3","author":"Sabir","year":"2019"},{"key":"10.1016\/j.eswa.2025.129632_bib0039","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"618","article-title":"Grad-CAM: Visual explanations from deep networks via gradient-based localization","author":"Selvaraju","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0040","doi-asserted-by":"crossref","unstructured":"Shuai, C., Zhong, J., Wu, S., Chen, Y., Jing, X., Sebe, N. (h). Locate and verify: A two-stream network for improved deepfake detection. Proceedings of the 31st ACM International Conference on Multimedia, 2023, 7131\u20137142.","DOI":"10.1145\/3581783.3612386"},{"key":"10.1016\/j.eswa.2025.129632_bib0041","series-title":"Technical Report","article-title":"StyleDrop: Text-to-image generation in any style","author":"Sohn","year":"2023"},{"key":"10.1016\/j.eswa.2025.129632_bib0042","series-title":"Technical Report","article-title":"Visual representations of physiological signals for fake video detection","author":"Stefanov","year":"2022"},{"key":"10.1016\/j.eswa.2025.129632_bib0043","doi-asserted-by":"crossref","unstructured":"Sun, K., Yao, T., Chen, S., Li, J., Ding, S., Ji, R. (i). Dual contrastive learning for general face forgery detection. Proceedings of the AAAI Conference on Artificial Intelligence, 2022, 2316\u20132324.","DOI":"10.1609\/aaai.v36i2.20130"},{"key":"10.1016\/j.eswa.2025.129632_bib0044","doi-asserted-by":"crossref","unstructured":"Tan, L., Wang, Y., Wang, J., & Zhu, J. (j). Deepfake video detection via facial action dependencies estimation. Proceedings of the AAAI Conference on Artificial Intelligence, 2023, 5276\u20135284.","DOI":"10.1609\/aaai.v37i4.25658"},{"key":"10.1016\/j.eswa.2025.129632_bib0045","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2387","article-title":"Face2Face: Real-time face capture and reenactment of RGB videos","author":"Thies","year":"2016"},{"key":"10.1016\/j.eswa.2025.129632_bib0046","doi-asserted-by":"crossref","first-page":"7943","DOI":"10.1109\/TCSVT.2023.3281475","article-title":"Spatial-temporal frequency forgery clue for video forgery detection in VIS and NIR scenario","volume":"33","author":"Wang","year":"2023","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2025.129632_bib0047","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4129","article-title":"Altfreezing for more general video face forgery detection","author":"Wang","year":"2023"},{"issue":"11","key":"10.1016\/j.eswa.2025.129632_bib0048","doi-asserted-by":"crossref","DOI":"10.22215\/timreview\/1282","article-title":"The emergence of deepfake technology: A review","volume":"9","author":"Westerlund","year":"2019","journal-title":"Technology Innovation Management Review"},{"key":"10.1016\/j.eswa.2025.129632_bib0049","series-title":"Digital Forensics and Watermarking: 15th International Workshop","first-page":"119","article-title":"Recapture image forensics based on Laplacian convolutional neural networks","author":"Yang","year":"2017"},{"issue":"5","key":"10.1016\/j.eswa.2025.129632_bib0050","doi-asserted-by":"crossref","first-page":"4327","DOI":"10.1109\/TDSC.2024.3352049","article-title":"Benchmarking joint face spoofing and forgery detection with visual and physiological cues","volume":"21","author":"Yu","year":"2024","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.1016\/j.eswa.2025.129632_bib0051","series-title":"IEEE 2nd international conference on signal and image processing","first-page":"15","article-title":"Automated face swapping and its detection","author":"Zhang","year":"2017"},{"key":"10.1016\/j.eswa.2025.129632_bib0052","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TIFS.2023.3239223","article-title":"ISTVT: Interpretable spatial-temporal video transformer for deepfake detection","volume":"18","author":"Zhao","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2025.129632_bib0053","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhou, W., Chen, D., Zhang, Y., Li, N., Xu, R. (k). Multi-attentional deepfake detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, 2185\u20132194.","DOI":"10.1109\/CVPR46437.2021.00222"},{"key":"10.1016\/j.eswa.2025.129632_bib0054","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8568","article-title":"DiffSwap: High-fidelity and controllable face swapping via 3D-aware masked diffusion","author":"Zhao","year":"2023"},{"key":"10.1016\/j.eswa.2025.129632_bib0055","series-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics","first-page":"207","article-title":"Attention-based bidirectional long short-term memory networks for relation classification","volume":"2","author":"Zhou","year":"2016"},{"key":"10.1016\/j.eswa.2025.129632_bib0056","series-title":"Proceedings of the 28th ACM International Conference on Multimedia","first-page":"2382","article-title":"WildDeepFake: A challenging real-world dataset for deepfake detection","author":"Zi","year":"2020"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425032476?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425032476?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T08:42:18Z","timestamp":1763541738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425032476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":56,"alternative-id":["S0957417425032476"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129632","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Dual-stream temporal-spatial forgery detection via phase-consistent edge features and 3D visual state-space modeling","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129632","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"129632"}}