{"id":"https://openalex.org/W4416251785","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228460","title":"FactorArmor: A Hierarchical Dual-Factor Framework with Attack Resilience for Face Forgery Detection","display_name":"FactorArmor: A Hierarchical Dual-Factor Framework with Attack Resilience for Face Forgery Detection","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251785","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228460"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027877442","display_name":"Wenzheng Liu","orcid":"https://orcid.org/0000-0003-0094-301X"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenzheng Liu","raw_affiliation_strings":["Changsha University of Science &amp; Technology,Hunan International Scientific and Technological Innovation Cooperation Base of Advanced Construction and Maintenance Technology of Highway,Changsha,China,410114"],"affiliations":[{"raw_affiliation_string":"Changsha University of Science &amp; Technology,Hunan International Scientific and Technological Innovation Cooperation Base of Advanced Construction and Maintenance Technology of Highway,Changsha,China,410114","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103172693","display_name":"Shao C. Fang","orcid":"https://orcid.org/0000-0002-8586-1760"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shicheng Fang","raw_affiliation_strings":["Changsha University of Science and Technology,School of Computer Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Changsha University of Science and Technology,School of Computer Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100677122","display_name":"Jie Hu","orcid":"https://orcid.org/0000-0003-4993-5758"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Hu","raw_affiliation_strings":["Changsha University of Science and Technology,School of Computer Science and Technology,Changsha,China"],"affiliations":[{"raw_affiliation_string":"Changsha University of Science and Technology,School of Computer Science and Technology,Changsha,China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028990225","display_name":"Qianqian Xing","orcid":"https://orcid.org/0000-0002-8602-9175"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianqian Xing","raw_affiliation_strings":["National University of Defence Technology,College of Computer,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defence Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333272","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0009-0001-6453-1826"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Wang","raw_affiliation_strings":["National University of Defence Technology,College of Computer,Changsha,China"],"affiliations":[{"raw_affiliation_string":"National University of Defence Technology,College of Computer,Changsha,China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027877442"],"corresponding_institution_ids":["https://openalex.org/I56934997"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34551751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.833299994468689,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.833299994468689,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.06400000303983688,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.030500000342726707,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8902999758720398},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8313000202178955},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.597599983215332},{"id":"https://openalex.org/keywords/tamper-resistance","display_name":"Tamper resistance","score":0.5509999990463257},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4690999984741211},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4065000116825104},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3831000030040741}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8902999758720398},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8313000202178955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7538999915122986},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.597599983215332},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.5509999990463257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5242000222206116},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4821000099182129},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4690999984741211},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4065000116825104},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3831000030040741},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36230000853538513},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.26910001039505005},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322924","display_name":"Changsha University of Science\u00a0and\u00a0Technology","ror":"https://ror.org/03yph8055"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2146916812","https://openalex.org/W2761176843","https://openalex.org/W2883233582","https://openalex.org/W2888519208","https://openalex.org/W2962958939","https://openalex.org/W2963684180","https://openalex.org/W3034196597","https://openalex.org/W3034856584","https://openalex.org/W3034864980","https://openalex.org/W3036426855","https://openalex.org/W3096651815","https://openalex.org/W3096831136","https://openalex.org/W3143336910","https://openalex.org/W3197123936","https://openalex.org/W4214545643","https://openalex.org/W4283817039","https://openalex.org/W4312753047","https://openalex.org/W4312933868","https://openalex.org/W4319299925","https://openalex.org/W4377231695","https://openalex.org/W4387968109","https://openalex.org/W4390872921","https://openalex.org/W4402716358"],"related_works":[],"abstract_inverted_index":{"Conventional":[0],"watermarking":[1,25,168,182],"techniques":[2],"are":[3,27,63],"predicated":[4],"on":[5,58],"the":[6,10,13,41,49,56,93,126,141,152,179,187,198,228],"recovery":[7,60,89],"accuracy":[8],"of":[9,15,44,84,95,155,200,211,221,230],"watermark":[11,101,105],"for":[12,52,216,233],"purpose":[14],"forgery":[16,234],"detection":[17,235],"and":[18,66,133,170,203],"copyright":[19,109],"protection.":[20],"However,":[21],"most":[22,180],"existing":[23],"cutting-edge":[24],"schemes":[26],"susceptible":[28,67],"to":[29,36,68,91,103,107,120,136,150,178,214,223],"black-box":[30,188,237],"query":[31,189,238],"attacks,":[32],"which":[33,62,98],"has":[34,159],"led":[35],"a":[37,76,100,147,164,209,219],"significant":[38],"increase":[39],"in":[40,146,167,174],"misclassification":[42],"rate":[43],"detections.":[45],"We":[46],"believe":[47],"that":[48,161],"primary":[50],"reason":[51],"this":[53,72],"situation":[54],"is":[55],"reliance":[57],"bit":[59,130],"accuracy,":[61],"somewhat":[64],"monolithic":[65],"misjudgement.":[69],"To":[70],"address":[71],"issue,":[73],"we":[74,112,185],"propose":[75],"proactive":[77],"defence":[78],"framework,":[79,218],"FactorArmor.":[80,156],"Firstly,":[81],"it":[82],"consists":[83],"an":[85,96,114],"internal":[86],"factor":[87,116],"(bit":[88],"accuracy)":[90],"assess":[92],"trustworthiness":[94],"image,":[97],"uses":[99],"decoder":[102],"extract":[104],"comparisons":[106],"achieve":[108,121,137],"authentication.":[110],"Then":[111],"introduce":[113],"external":[115],"(mean":[117],"square":[118],"error)":[119],"tamper":[122,138],"localisation.":[123],"It":[124],"evaluates":[125],"image":[127,129],"using":[128],"steganography":[131],"network":[132],"residual":[134],"analysis":[135],"detection.":[139],"Finally,":[140],"two":[142],"factors":[143],"work":[144],"together":[145],"hierarchical":[148],"form":[149],"enhance":[151],"attack":[153],"resistance":[154,191],"Extensive":[157],"experimentation":[158],"demonstrated":[160],"FactorArmor":[162],"provides":[163],"five-fold":[165],"enhancement":[166],"capacity":[169],"approximately":[171],"21%":[172],"improvement":[173],"imperceptibility":[175],"when":[176],"compared":[177,213],"recent":[181],"technologies.":[183],"Additionally,":[184],"assessed":[186],"attacks":[190],"some":[192],"frameworks":[193],"across":[194],"three":[195],"datasets.":[196],"Under":[197],"conditions":[199],"identical":[201],"datasets":[202],"tampering":[204],"methods,":[205],"our":[206],"framework":[207],"achieved":[208],"score":[210],"0.341,":[212],"0.624":[215],"other":[217],"decrease":[220],"up":[222],"45.3%.":[224],"These":[225],"results":[226],"demonstrate":[227],"effectiveness":[229],"FactorArmor,":[231],"especially":[232],"under":[236],"attacks.":[239]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
