Research Article

Perceptual Hashing-Based Image Copy-Move Forgery Detection

Figure 4

A part of experimental results for the proposed scheme. From top to bottom, the first row (a1)–(d1) shows the original images, the second row (a2)–(d2) shows the tampered images, and the last row (a3)–(d3) shows the detection results.