Research Article

Nonoverlapping Blocks Based Copy-Move Forgery Detection

Figure 9

Detection results under 3 kinds of attacks. The three rows from (a–c), (d–f), and (g–i) are JPEG compression, rotation, and scaling, respectively. The three columns from (a–g), (b–h), and (c–i) give the precision, recall, and score, respectively.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)