Figure 2From: Removal and injection of keypoints for SIFT-based copy-move counter-forensics General framework for keypoint injection. Back to article page