Research Article
Perceptual Hashing-Based Image Copy-Move Forgery Detection
Figure 4
A part of experimental results for the proposed scheme. From top to bottom, the first row (a1)–(d1) shows the original images, the second row (a2)–(d2) shows the tampered images, and the last row (a3)–(d3) shows the detection results.