Research Article

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations

Figure 8

Ten examples of locating tampered regions: the red blocks in each image represent the detected tampered regions. (a), (b) Under object removal, (c), (d) under object replacement, (e), (f) under object duplication, (g), (h) under object insertion, (i) under both object removal and rotation, (j) under both object duplication and rotation.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)