Figure 1From: Removal and injection of keypoints for SIFT-based copy-move counter-forensicsSIFT-based copy-move detection. Work-flow of the detector of[3] impaired by the counter-forensic attack of[13].Back to article page