Figure 9From: Removal and injection of keypoints for SIFT-based copy-move counter-forensicsExample of copy-move removal-injection attack (2). Extracted keypoints (top) and SIFT matches (bottom) for image Nativity: copy-move attack without keypoint removal (left), with keypoint removal (middle), and with keypoint removal-injection (right).Back to article page