Research Article

Nonoverlapping Blocks Based Copy-Move Forgery Detection

Figure 5

Establishment of hash tables. We use groups of hash functions to project the feature vectors, respectively. Projecting each feature vector with a group of hash functions can get a set of hash values as their bucket numbers. Finally, we take out all the feature vectors of these hash buckets and calculate the similarity.