Fig. 10From: A two-stage detection method of copy-move forgery based on parallel feature fusionRobustness comparison on the MICC-F220 datasetBack to article page