Figure 13From: Counter-forensics of SIFT-based copy-move detection by means of keypoint classification Matches of the copy-moved regions of image I 7 after the four attacks. Top left: smoothing; top right: collage; bottom left: RMD; bottom right: classification-based.Back to article page