Research Article

Region Duplication Forgery Detection Technique Based on SURF and HAC

Figure 4

Copy paste detection results in the presence of 10 different rotation and scaling attacks applied on the image.
267691.fig.004a
(a)
267691.fig.004b
(b)
267691.fig.004c
(c)
267691.fig.004d
(d)
267691.fig.004e
(e)
267691.fig.004f
(f)
267691.fig.004g
(g)
267691.fig.004h
(h)
267691.fig.004i
(i)