Research Article
A New Copy Move Forgery Detection Method Resistant to Object Removal with Uniform Background Forgery
Figure 9
(a) Original image. (b) Forged image is added with Gaussian blur whose kernel is [] and . (c) The result of SIFT (true matched keypoints: 0). (d) The result of SURF (true matched keypoints: 0). (e) The result of sORB (true matched keypoints: 9). (f) The result of proposed method (true matched keypoints: 41). (g) Original image. (h) Forged image is added with Gaussian blur whose kernel is [] and . (i) The result of SIFT method (true matched keypoints: 15). (j) The result of SURF (true matched keypoints: 3). (k) The result of sORB (true matched keypoints: 3). (l) The result of proposed method (true matched keypoints: 84).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |