Review Article

A Survey of Partition-Based Techniques for Copy-Move Forgery Detection

Figure 3

Common pipeline for block-based detection of copy-move forgeries.
975456.fig.003