Figure 8From: Removal and injection of keypoints for SIFT-based copy-move counter-forensicsExample of copy-move removal-injection attack (1). The number of keypoints and of SIFT-matches when copy-move attack is performed without keypoint removal, with keypoint removal, and with keypoint removal-injection.Back to article page