Figure 6From: Removal and injection of keypoints for SIFT-based copy-move counter-forensicsHistograms of correct matches. Left: before removal, middle: following injection by means of Smoothing attack, and right: following injection by means of 2D-AD (similar behaviour for omitted methods).Back to article page