Research Article

Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT

Algorithm 1

The proposed adaptive iterative algorithm.
Input:
: the tested image;
: the maximum number of iteration;
: algorithm termination threshold;
Obtaining the candidate tampering area using formula (1);
whiledo
PCT feature extraction, PM matching and dense linear filtering;
corrosion;
expansion;
;
PCT feature extraction, PM matching and dense linear filtering;
;
morphology open operation;
ifthen
  //calculate the first derivative;
  ifthen
   break;
  end if
end if
;
end while
Output: the tamper localization .