Research Article

Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics

Figure 3

(a–i) Tampered images with different combinations of geometrical and transformations attacks.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)