Skip to main content

Table 1 Pseudocode for tamper localization

From: Robust image hashing through DWT-SVD and spectral residual method