Figure 7From: Removal and injection of keypoints for SIFT-based copy-move counter-forensicsExample of removal-injection procedure. From top left to bottom right: authentic image, cleaned image, injected image, matches between authentic and cleaned images, and matches between authentic and injected images.Back to article page