Research Article

Perceptual Hashing-Based Image Copy-Move Forgery Detection

Figure 5

A part of the experimental results for the proposed scheme. From top to bottom, the first row (a1)–(e1) shows the five original images; the second row (a2)–(e2) shows the tampered images that are attacked with adding white Gaussian noises and Gaussian blurring, adjusting contrast ratio, luminance, and hue; the last row (a3)–(e3) shows the detection results of the proposed method.