Research Article
CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection
Figure 13
Detection results under various attacks. Top to bottom: scale, rotation, Gaussian noise addition, and JPEG compression. Left to right: precision, recall, and F1.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |