Skip to main content
Fig. 4 | EURASIP Journal on Image and Video Processing

Fig. 4

From: Perceptual hashing method for video content authentication with maximized robustness

Fig. 4

Example of attacks of content distortion manipulations. a is original frame, b is block overlaying, c is pasted and d is reshuffled. Here shown are the examples of attacks on the frames. The upper left panel is the original frame; the upper right panel is the result of block overlaying attack. The lower left panel is the result of being pasted and the lower right panel is the result of reshuffling attack

Back to article page