Fig. 12From: A two-stage detection method of copy-move forgery based on parallel feature fusionRobustness comparison of different methods for different attack types. a JPEG attack, b brightness change, c contrast change, d color change, e fuzzy attack, f noise additionBack to article page