Research Article

Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT

Figure 3

Key point extraction and matching for image represented in (a) the original image, (b) the tampered image, (c) the ground truth, (d) SIFT key point detection in grayscale, (e) SIFT key point detection in Lab color space (channel ), and (f) matched key points.
(a)
(b)
(c)
(d)
(e)
(f)