Research Article
Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT
Figure 4
Example of false matching elimination: (a) tampered image, (b) detection results from SIFT, and (c) false matching elimination.
(a) |
(b) |
(c) |