Fig. 13From: A two-stage detection method of copy-move forgery based on parallel feature fusionRunning time comparison of different methodsBack to article page