Figure 3From: Counter-forensics of SIFT-based copy-move detection by means of keypoint classification Proposed attack scheme. SIFT keypoints are detected and classified; the neighborhood of each keypoint is attacked with a specific class-tailored attack and then inserted back into the image. The procedure continues until the specified conditions are met.Back to article page