{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:45:59Z","timestamp":1773330359355,"version":"3.50.1"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202141"],"award-info":[{"award-number":["62202141"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013066","name":"Key Scientific Research Project of Colleges and Universities in Henan Province","doi-asserted-by":"publisher","award":["26A413001"],"award-info":[{"award-number":["26A413001"]}],"id":[{"id":"10.13039\/501100013066","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019091","name":"Key Research and Development Program of Hunan Province of China","doi-asserted-by":"publisher","award":["241111212800"],"award-info":[{"award-number":["241111212800"]}],"id":[{"id":"10.13039\/501100019091","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Visual Communication and Image Representation"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.jvcir.2026.104767","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T07:56:51Z","timestamp":1772697411000},"page":"104767","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["JPEG-scaling operation chain forensics: JPEG compression detection and scaling factor estimation"],"prefix":"10.1016","volume":"117","author":[{"given":"Yakun","family":"Niu","sequence":"first","affiliation":[]},{"given":"Xiangru","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.jvcir.2026.104767_b1","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIFS.2015.2455334","article-title":"Efficient dense-field copy\u2013move forgery detection","volume":"10","author":"Cozzolino","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.jvcir.2026.104767_b2","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/TCSVT.2022.3220630","article-title":"CNN-transformer based generative adversarial network for copy-move source\/target distinguishment","volume":"33","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104767_b3","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.jksuci.2022.12.014","article-title":"A robust detection and localization technique for copy-move forgery in digital images","volume":"35","author":"Alhaidery","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.jvcir.2026.104767_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108051","article-title":"Multi-semantic CRF-based attention model for image forgery detection and localization","volume":"183","author":"Rao","year":"2021","journal-title":"Signal Process."},{"issue":"11","key":"10.1016\/j.jvcir.2026.104767_b5","doi-asserted-by":"crossref","first-page":"7505","DOI":"10.1109\/TCSVT.2022.3189545","article-title":"PSCC-Net: Progressive spatio-channel correlation network for image manipulation detection and localization","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104767_b6","article-title":"Contrastive learning based multi-task network for image manipulation detection","volume":"201","year":"2022","journal-title":"Signal Process."},{"issue":"12","key":"10.1016\/j.jvcir.2026.104767_b7","doi-asserted-by":"crossref","first-page":"3050","DOI":"10.1109\/TIFS.2017.2730822","article-title":"Localization of diffusion-based inpainting in digital images","volume":"12","author":"Li","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"10.1016\/j.jvcir.2026.104767_b8","doi-asserted-by":"crossref","first-page":"4131","DOI":"10.1109\/TCSVT.2020.3046240","article-title":"Spatiotemporal trident networks: detection and localization of object removal tampering in video passive forensics","volume":"31","author":"Yang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"10.1016\/j.jvcir.2026.104767_b9","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TCSVT.2021.3075039","article-title":"IID-Net: Image inpainting detection network via neural architecture search and attention","volume":"32","author":"Wu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104767_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107430","article-title":"An improved first quantization matrix estimation for nonaligned double compressed JPEG images","volume":"170","author":"Yao","year":"2020","journal-title":"Signal Process."},{"issue":"5","key":"10.1016\/j.jvcir.2026.104767_b11","doi-asserted-by":"crossref","first-page":"3279","DOI":"10.1109\/TCSVT.2021.3097351","article-title":"Detection of double JPEG compression with the same quantization matrix via convergence analysis","volume":"32","author":"Niu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104767_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103269","article-title":"A novel deep learning framework for double JPEG compression detection of small size blocks","volume":"80","author":"Hussain","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2026.104767_b13","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.jvcir.2018.01.011","article-title":"Median filtering detection of small-size image based on CNN","volume":"51","author":"Tang","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.jvcir.2026.104767_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2024.104135","article-title":"A convolutional neural network based on noise residual for seam carving detection","volume":"100","author":"Zhang","year":"2024","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"10.1016\/j.jvcir.2026.104767_b15","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TSP.2004.839932","article-title":"Exposing digital forgeries by detecting traces of resampling","volume":"53","author":"Popescu","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"issue":"8","key":"10.1016\/j.jvcir.2026.104767_b16","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1016\/j.sigpro.2011.01.022","article-title":"Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics","volume":"91","author":"Bravo-Solorio","year":"2011","journal-title":"Signal Process."},{"key":"10.1016\/j.jvcir.2026.104767_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.102083","article-title":"Towards multi-operation image anti-forensics with generative adversarial networks","volume":"100","author":"Wu","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jvcir.2026.104767_b18","doi-asserted-by":"crossref","first-page":"6852","DOI":"10.1109\/TMM.2022.3215000","article-title":"Image operation chain detection with machine translation framework","volume":"25","author":"Li","year":"2022","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"10.1016\/j.jvcir.2026.104767_b19","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TIFS.2010.2051426","article-title":"JPEG error analysis and its applications to digital image forensics","volume":"5","author":"Luo","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.jvcir.2026.104767_b20","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TIFS.2015.2389148","article-title":"Revealing the trace of high-quality JPEG compression through quantization noise analysis","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2026.104767_b21","series-title":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","first-page":"842","article-title":"A new detector for JPEG decompressed bitmap identification","author":"Wu","year":"2017"},{"issue":"12","key":"10.1016\/j.jvcir.2026.104767_b22","doi-asserted-by":"crossref","first-page":"2890","DOI":"10.1109\/TIFS.2017.2725201","article-title":"Statistical detection of JPEG traces in digital images in uncompressed formats","volume":"12","author":"Pasquini","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2026.104767_b23","doi-asserted-by":"crossref","unstructured":"M. Kirchner, Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue, in: Proceedings of the 10th ACM Workshop on Multimedia and Security, 2008, pp. 11\u201320.","DOI":"10.1145\/1411328.1411333"},{"key":"10.1016\/j.jvcir.2026.104767_b24","series-title":"The 2nd Canadian Conference on Computer and Robot Vision","first-page":"65","article-title":"Detection of linear and cubic interpolation in JPEG compressed images","author":"Gallagher","year":"2005"},{"issue":"3","key":"10.1016\/j.jvcir.2026.104767_b25","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TIFS.2004.924603","article-title":"Blind authentication using periodic properties of interpolation","volume":"3","author":"Mahdian","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jvcir.2026.104767_b26","series-title":"2009 First IEEE International Workshop on Information Forensics and Security","first-page":"21","article-title":"On resampling detection in re-compressed images","author":"Kirchner","year":"2009"},{"key":"10.1016\/j.jvcir.2026.104767_b27","series-title":"2012 IEEE International Workshop on Information Forensics and Security","first-page":"127","article-title":"Reverse engineering of double JPEG compression in the presence of image resizing","author":"Bianchi","year":"2012"},{"issue":"3","key":"10.1016\/j.jvcir.2026.104767_b28","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1109\/TCSVT.2019.2893353","article-title":"Downscaling factor estimation on pre-JPEG compressed images","volume":"30","author":"Liu","year":"2020","journal-title":"\u201dIEEE Trans. Circuits Syst. Video Technology\u201d"},{"key":"10.1016\/j.jvcir.2026.104767_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107371","article-title":"On the robustness of JPEG post-compression to resampling factor estimation","volume":"168","author":"Zhang","year":"2020","journal-title":"Signal Process."},{"issue":"10","key":"10.1016\/j.jvcir.2026.104767_b30","doi-asserted-by":"crossref","first-page":"10814","DOI":"10.1109\/TCYB.2021.3069999","article-title":"Robust estimation of upscaling factor on double JPEG compressed images","volume":"52","author":"Lu","year":"2021","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"10.1016\/j.jvcir.2026.104767_b31","doi-asserted-by":"crossref","first-page":"2811","DOI":"10.1109\/TIP.2017.2682963","article-title":"Blind forensics of successive geometric transformations in digital images using spectral method: theory and applications","volume":"26","author":"Chen","year":"2017","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"10.1016\/j.jvcir.2026.104767_b32","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/TCSVT.2004.839995","article-title":"DCT quantization noise in compressed images","volume":"15","author":"Robertson","year":"2005","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jvcir.2026.104767_b33","first-page":"197","article-title":"Median filtering: Deterministic properties","author":"Tyan","year":"2006","journal-title":"Two-Dimensional Digit. Signal Prcessing II: Transform. Median. Filters"},{"key":"10.1016\/j.jvcir.2026.104767_b34","doi-asserted-by":"crossref","unstructured":"T. Gloe, R. B\u00f6hme, The \u2019Dresden Image Database\u2019 for benchmarking digital image forensics, in: Proceedings of the 2010 ACM Symposium on Applied Computing, 2010, pp. 1584\u20131590.","DOI":"10.1145\/1774088.1774427"}],"container-title":["Journal of Visual Communication and Image Representation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000623?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1047320326000623?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T02:39:10Z","timestamp":1773283150000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320326000623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":34,"alternative-id":["S1047320326000623"],"URL":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104767","relation":{},"ISSN":["1047-3203"],"issn-type":[{"value":"1047-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"JPEG-scaling operation chain forensics: JPEG compression detection and scaling factor estimation","name":"articletitle","label":"Article Title"},{"value":"Journal of Visual Communication and Image Representation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jvcir.2026.104767","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104767"}}