Research Article

Perceptual Hashing-Based Image Copy-Move Forgery Detection

Figure 6

Comparison of different copy-move forgery schemes with 5 kinds of attacks. The two columns represent the result of DAR and FPR, respectively. (a), (b) Adding white Gaussian noise. (c), (d) Gaussian blurring. (e), (f) Adjusting contrast ratio. (g), (h) Adjusting luminance. (i), (j) Adjusting hue.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)