{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:15:20Z","timestamp":1774052120104,"version":"3.50.1"},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province","doi-asserted-by":"publisher","award":["2025JJA170234"],"award-info":[{"award-number":["2025JJA170234"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017691","name":"Guangxi Key Research and Development Program","doi-asserted-by":"publisher","award":["FN2504240011"],"award-info":[{"award-number":["FN2504240011"]}],"id":[{"id":"10.13039\/501100017691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jisa.2026.104432","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T19:19:59Z","timestamp":1772479199000},"page":"104432","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["SCIFL-Net: Seam carving-based image forgery localization network"],"prefix":"10.1016","volume":"99","author":[{"given":"Yanjie","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2681-4622","authenticated-orcid":false,"given":"Zhenhua","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7689-4686","authenticated-orcid":false,"given":"Xuejun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104432_bib0001","series-title":"Proceedings of the computer vision and pattern recognition conference","first-page":"28831","article-title":"Sida: social media image deepfake detection, localization and explanation with large multimodal model","author":"Huang","year":"2025"},{"key":"10.1016\/j.jisa.2026.104432_bib0002","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"7024","article-title":"Can we get rid of handcrafted feature extractors? sparsevit: nonsemantics-centered, parameter-efficient image manipulation localization through spare-coding transformer","volume":"vol. 39","author":"Su","year":"2025"},{"key":"10.1016\/j.jisa.2026.104432_bib0003","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"10781","article-title":"Towards modern image manipulation localization: a large-scale dataset and novel methods","author":"Qu","year":"2024"},{"key":"10.1016\/j.jisa.2026.104432_bib0004","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/LSP.2023.3348689","article-title":"Feature aggregation and region-aware learning for detection of splicing forgery","volume":"31","author":"Xu","year":"2024","journal-title":"IEEE Signal Process Lett"},{"key":"10.1016\/j.jisa.2026.104432_bib0005","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/TIFS.2020.3045903","article-title":"Copy move source-target disambiguation through multi-branch CNNs","volume":"16","author":"Barni","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104432_bib0006","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"13696","article-title":"Prior guided gan based semantic inpainting","author":"Lahiri","year":"2020"},{"key":"10.1016\/j.jisa.2026.104432_bib0007","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"5549","article-title":"Maskgan: towards diverse and interactive facial image manipulation","author":"Lee","year":"2020"},{"issue":"3","key":"10.1016\/j.jisa.2026.104432_bib0008","first-page":"1","article-title":"Detection of recolored image by texture features in chrominance components","volume":"19","author":"Zhang","year":"2023","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0009","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"710","article-title":"Shadowformer: global context helps shadow removal","volume":"vol. 37","author":"Guo","year":"2023"},{"key":"10.1016\/j.jisa.2026.104432_bib0010","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"1","article-title":"Seetheseams: localized detection of seam carving based image forgery in satellite imagery","author":"Gudavalli","year":"2022"},{"key":"10.1016\/j.jisa.2026.104432_bib0011","series-title":"Seminal graphics papers: pushing the boundaries, volume 2","first-page":"609","article-title":"Seam carving for content-aware image resizing","author":"Avidan","year":"2023"},{"key":"10.1016\/j.jisa.2026.104432_bib0012","unstructured":"ImageMagick. Accessed: 2025-09-20. 2025. https:\/\/imagemagick.org\/."},{"key":"10.1016\/j.jisa.2026.104432_bib0013","unstructured":"GIMP. Liquid rescale plugin. 2025. Accessed: 2025-09-20http:\/\/liquidrescale.wikidot.com\/en:examples."},{"key":"10.1016\/j.jisa.2026.104432_bib0014","unstructured":"Photoshop. 2025. Accessed: 2025-09-20. https:\/\/www.adobe.com\/products\/photoshop.html."},{"issue":"1","key":"10.1016\/j.jisa.2026.104432_bib0015","article-title":"Seam-carved image tampering detection based on the cooccurrence of adjacent LBPs","volume":"2020","author":"Zhang","year":"2020","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2026.104432_bib0016","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"9543","article-title":"Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features","author":"Wu","year":"2019"},{"key":"10.1016\/j.jisa.2026.104432_bib0017","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"20606","article-title":"Trufor: leveraging all-round clues for trustworthy image forgery detection and localization","author":"Guillaro","year":"2023"},{"key":"10.1016\/j.jisa.2026.104432_bib0018","series-title":"ICASSP 2023-2023 IEEE International conference on acoustics, speech and signal processing (ICASSP)","first-page":"1","article-title":"A discriminative multi-channel noise feature representation model for image manipulation localization","author":"Zhou","year":"2023"},{"key":"10.1016\/j.jisa.2026.104432_bib0019","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2025.3531103","article-title":"Dense feature interaction network for image inpainting localization","author":"Yao","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104432_bib0020","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.patrec.2013.09.026","article-title":"A patch analysis method to detect seam carved images","volume":"36","author":"Wei","year":"2014","journal-title":"Pattern Recognit Lett"},{"issue":"12","key":"10.1016\/j.jisa.2026.104432_bib0021","doi-asserted-by":"crossref","first-page":"2477","DOI":"10.1109\/TIFS.2015.2464776","article-title":"Tamper detection of JPEG image due to seam modifications","volume":"10","author":"Wattanachote","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"10.1016\/j.jisa.2026.104432_bib0022","doi-asserted-by":"crossref","first-page":"3308","DOI":"10.1109\/TCSVT.2020.3037662","article-title":"Deep convolutional neural network for identifying seam-carving forgery","volume":"31","author":"Nam","year":"2020","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10.1016\/j.jisa.2026.104432_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104135","article-title":"A convolutional neural network based on noise residual for seam carving detection","volume":"100","author":"Zhang","year":"2024","journal-title":"J Vis Commun Image Represent"},{"key":"10.1016\/j.jisa.2026.104432_bib0024","article-title":"Spnet: seam carving detection via spatial-phase learning","volume":"89","author":"Chen","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0025","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","first-page":"0","article-title":"Rru-net: the ringed residual u-net for image splicing forgery detection","author":"Bi","year":"2019"},{"key":"10.1016\/j.jisa.2026.104432_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111914","article-title":"Image manipulation detection and localization using multi-scale contrastive learning","volume":"163","author":"Bai","year":"2024","journal-title":"Appl Soft Comput"},{"key":"10.1016\/j.jisa.2026.104432_bib0027","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"13713","article-title":"Coordinate attention for efficient mobile network design","author":"Hou","year":"2021"},{"issue":"5","key":"10.1016\/j.jisa.2026.104432_bib0028","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TIFS.2012.2202227","article-title":"Image forgery localization via fine-grained analysis of CFA artifacts","volume":"7","author":"Ferrara","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"10.1016\/j.jisa.2026.104432_bib0029","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.imavis.2009.02.001","article-title":"Using noise inconsistencies for blind image forensics","volume":"27","author":"Mahdian","year":"2009","journal-title":"Image Vis Comput"},{"issue":"4","key":"10.1016\/j.jisa.2026.104432_bib0030","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2015.2506548","article-title":"Illuminant-based transformed spaces for image forensics","volume":"11","author":"Carvalho","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104432_bib0031","series-title":"2015 IEEE International conference on image processing (ICIP)","first-page":"2940","article-title":"Image splicing detection with local illumination estimation","author":"Fan","year":"2015"},{"key":"10.1016\/j.jisa.2026.104432_bib0032","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"1053","article-title":"Learning rich features for image manipulation detection","author":"Zhou","year":"2018"},{"key":"10.1016\/j.jisa.2026.104432_bib0033","series-title":"2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW)","first-page":"1831","article-title":"Two-stream neural networks for tampered face detection","author":"Zhou","year":"2017"},{"issue":"14","key":"10.1016\/j.jisa.2026.104432_bib0034","doi-asserted-by":"crossref","first-page":"18269","DOI":"10.1007\/s11042-017-5374-6","article-title":"Copy-move forgery detection based on convolutional kernel network","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0035","series-title":"European conference on computer vision","first-page":"312","article-title":"Span: spatial pyramid attention network for image manipulation localization","author":"Hu","year":"2020"},{"issue":"11","key":"10.1016\/j.jisa.2026.104432_bib0036","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"Pscc-net: progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"3","key":"10.1016\/j.jisa.2026.104432_bib0037","doi-asserted-by":"crossref","first-page":"3539","DOI":"10.1109\/TPAMI.2022.3180556","article-title":"Mvss-net: multi-view multi-scale supervised networks for image manipulation detection","volume":"45","author":"Dong","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"8","key":"10.1016\/j.jisa.2026.104432_bib0038","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1007\/s11263-022-01617-5","article-title":"Learning jpeg compression artifacts for image manipulation detection and localization","volume":"130","author":"Kwon","year":"2022","journal-title":"Int J Comput Vis"},{"key":"10.1016\/j.jisa.2026.104432_bib0039","series-title":"ICASSP 2024-2024 IEEE International conference on acoustics, speech and signal processing (ICASSP)","first-page":"4895","article-title":"Effective image tampering localization via enhanced transformer and co-attention fusion","author":"Guo","year":"2024"},{"key":"10.1016\/j.jisa.2026.104432_bib0040","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2024.3432551","article-title":"Hdf-net: capturing homogeny difference features to localize the tampered image","author":"Han","year":"2024","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10.1016\/j.jisa.2026.104432_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112545","article-title":"Auto-focus tracing: image manipulation detection with artifact graph contrastive","volume":"304","author":"Pan","year":"2024","journal-title":"Knowl Based Syst"},{"key":"10.1016\/j.jisa.2026.104432_bib0042","series-title":"European conference on computer vision","first-page":"18","article-title":"Noise-assisted prompt learning for image forgery detection and localization","author":"Li","year":"2024"},{"key":"10.1016\/j.jisa.2026.104432_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2025.105114","article-title":"Msf-net: multi-stream fusion network for image manipulation detection and localization","volume":"161","author":"Dou","year":"2025","journal-title":"Digit Signal Process"},{"key":"10.1016\/j.jisa.2026.104432_bib0044","series-title":"Proceedings of the 11th ACM workshop on multimedia and security","first-page":"107","article-title":"Detection of seam carving and localization of seam insertions in digital images","author":"Sarkar","year":"2009"},{"issue":"12","key":"10.1016\/j.jisa.2026.104432_bib0045","doi-asserted-by":"crossref","first-page":"2102","DOI":"10.1002\/sec.1158","article-title":"Detection of seam carving-based video retargeting using forensics hash","volume":"8","author":"Fei","year":"2015","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2026.104432_bib0046","series-title":"Proceedings of the thirteenth ACM multimedia workshop on multimedia and security","first-page":"9","article-title":"Seam carving estimation using forensic hash","author":"Lu","year":"2011"},{"key":"10.1016\/j.jisa.2026.104432_bib0047","series-title":"Media forensics and security II","first-page":"359","article-title":"Detecting content adaptive scaling of images for forensic applications","volume":"vol. 7541","author":"Fillion","year":"2010"},{"issue":"5","key":"10.1016\/j.jisa.2026.104432_bib0048","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1587\/transinf.E97.D.1304","article-title":"Detecting trace of seam carving for forensic analysis","volume":"97","author":"Ryu","year":"2014","journal-title":"IEICE Trans Inf Syst"},{"key":"10.1016\/j.jisa.2026.104432_bib0049","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.cose.2015.09.003","article-title":"Detecting seam carving based image resizing using local binary patterns","volume":"55","author":"Yin","year":"2015","journal-title":"Comput Secur"},{"key":"10.1016\/j.jisa.2026.104432_bib0050","first-page":"135","article-title":"Detection of image seam carving by using weber local descriptor and local binary patterns","volume":"36","author":"Zhang","year":"2017","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0051","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.eswa.2017.11.023","article-title":"Exploring the location of object deleted by seam-carving","volume":"95","author":"Han","year":"2018","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0052","series-title":"2018 IEEE 12th international symposium on applied computational intelligence and informatics (SACI)","first-page":"000195","article-title":"Seam carving detection using convolutional neural networks","author":"Cieslak","year":"2018"},{"key":"10.1016\/j.jisa.2026.104432_bib0053","series-title":"International workshop on digital watermarking","first-page":"3","article-title":"A convolutional neural network based seam carving detection scheme for uncompressed digital images","author":"Ye","year":"2018"},{"key":"10.1016\/j.jisa.2026.104432_bib0054","series-title":"2019 IEEE International conference on image processing (ICIP)","first-page":"106","article-title":"Content-aware image resizing detection using deep neural network","author":"Nam","year":"2019"},{"key":"10.1016\/j.jisa.2026.104432_bib0055","series-title":"Machine learning, deep learning and computational intelligence for wireless communication: proceedings of MDCWC 2020","first-page":"381","article-title":"Seam carving detection and localization using two-stage deep neural networks","author":"Nataraj","year":"2021"},{"key":"10.1016\/j.jisa.2026.104432_bib0056","article-title":"Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning","volume":"75","author":"Xia","year":"2023","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104432_bib0057","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2023.109819","article-title":"Haar wavelet downsampling: a simple but effective downsampling module for semantic segmentation","volume":"143","author":"Xu","year":"2023","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.jisa.2026.104432_bib0058","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018"},{"key":"10.1016\/j.jisa.2026.104432_bib0059","series-title":"Proceedings of the IEEE\/CVF winter conference on applications of computer vision workshops","first-page":"71","article-title":"Imd2020: a large-scale annotated dataset tailored for detecting manipulated images","author":"Novozamsky","year":"2020"},{"key":"10.1016\/j.jisa.2026.104432_bib0060","series-title":"International workshop on information hiding","first-page":"59","article-title":"\u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS","author":"Bas","year":"2011"},{"key":"10.1016\/j.jisa.2026.104432_bib0061","article-title":"The point where reality meets fantasy: mixed adversarial generators for image splice detection","volume":"32","author":"Kniaz","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.jisa.2026.104432_bib0062","series-title":"Storage and retrieval methods and applications for multimedia 2004","first-page":"472","article-title":"Ucid: an uncompressed color image database","volume":"vol. 5307","author":"Schaefer","year":"2003"},{"key":"10.1016\/j.jisa.2026.104432_bib0063","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"5685","article-title":"Mun: image forgery localization based on m3 encoder and un decoder","volume":"vol. 39","author":"Liu","year":"2025"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000621?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000621?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T23:54:38Z","timestamp":1774050878000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":63,"alternative-id":["S2214212626000621"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104432","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SCIFL-Net: Seam carving-based image forgery localization network","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104432","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104432"}}