Research Article

Image Anomaly Detection Based on Adaptive Iteration and Feature Extraction in Edge-Cloud IoT

Figure 4

Example of false matching elimination: (a) tampered image, (b) detection results from SIFT, and (c) false matching elimination.
(a)
(b)
(c)