Figure 6From: Counter-forensics of SIFT-based copy-move detection by means of keypoint classification Effectiveness of classification-based attack with respect to the state of the art of class-unaware techniques (UCID database). Back to article page