Fig. 4From: Perceptual hashing method for video content authentication with maximized robustnessExample of attacks of content distortion manipulations. a is original frame, b is block overlaying, c is pasted and d is reshuffled. Here shown are the examples of attacks on the frames. The upper left panel is the original frame; the upper right panel is the result of block overlaying attack. The lower left panel is the result of being pasted and the lower right panel is the result of reshuffling attackBack to article page