Base paper :
HICHEM FELOUAT JUNICHI YAMAGISHI 1,2, HUY H. NGUYEN 1,2, (Member, IEEE), TRUNG -NGHIA LE 1,5, (Senior
Member, IEEE), AND ISAO ECHIZEN 1,2,6, (Senior Member, IEEE)
accepted 15 February 2024, date of publication 23 February 2024, date of current version 1 March 2024.
Reference Paper:
1.P. Kumar, M. Vatsa, and R. Singh, ‘‘Detecting Face2Face facial reenactment in videos,’’ in Proc. IEEE Winter
Conf. Appl. Comput. Vis. (WACV), Mar. 2020, pp. 2578–2586
2.K.Carta, C. Barral, N. El Mrabet, and S. Mouille, ‘‘Video injection attacks on remote digital identity verification
solution using face recognition,’’ in Proc. 13th Int. Multi-Conference Complex., Informat. Cybern. (IMCIC), Mar.
2022, pp. 92–97.
3.T.-L. Do, M.-K. Tran, H. H. Nguyen, and M.-T. Tran, ‘‘Potential attacks of DeepFakeon eKYCsystems and
remedy for eKYCwith DeepFakedetection using two-stream network of facial appearance and motion
features,’’ Social Netw. Comput. Sci., vol. 3, no. 6, pp. 1–17, Sep. 2022.
4.A. Nanda, S. W. A. Shah, J. J. Jeong, R. Doss, and J. Webb, ‘‘Towards higher levels of assurance in remote
identity proofing,’’ IEEE Consum. Electron. Mag., vol. 13, no. 1, pp. 1–8, Jan. 2023.
5.D. Dagarand D. K. Vishwakarma, ‘‘A literature review and perspectives in deepfakes: Generation, detection,
and applications,’’ Int. J. Multimedia Inf. Retr., vol. 11, no. 3, pp. 219–289, Sep. 2022.