Research Article
Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics
Table 14
Comparison of the proposed fusion-based models with baseline models.
| Approach | FPR (%) | TPR (%) |
| SIFT [37] | 8 | 100 | SURF [38] | 3.64 | 73.64 | DCT [39] | 84 | 89 | PCA [40] | 86 | 87 | CSLBP [41] | 2.89 | 96 | SYMMETRY [42] | 5.45 | 83.64 | CLUSTERING strategy [43] | 7.63 | 97.87 | Pretrained fusion model (proposed) | 17.27 | 99.09 | Fine-tuned fusion model (proposed) | 13.63 | 100 |
|
|