Research Article
Perceptual Hashing-Based Image Copy-Move Forgery Detection
Figure 5
A part of the experimental results for the proposed scheme. From top to bottom, the first row (a1)–(e1) shows the five original images; the second row (a2)–(e2) shows the tampered images that are attacked with adding white Gaussian noises and Gaussian blurring, adjusting contrast ratio, luminance, and hue; the last row (a3)–(e3) shows the detection results of the proposed method.