Research Article

CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection

Figure 13

Detection results under various attacks. Top to bottom: scale, rotation, Gaussian noise addition, and JPEG compression. Left to right: precision, recall, and F1.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)