Skip to main content

Table 2 Type of geometric attack in MICC-F220 dataset

From: A two-stage detection method of copy-move forgery based on parallel feature fusion

 

H1

H2

H3

H4

H5

H6

H7

H8

H9

H10

\(\theta\)

0

10

20

30

40

0

0

0

10

20

Sx

1

1

1

1

1

1.2

1.3

1.4

1.2

1.4

Sy

1

1

1

1

1

1.2

1.3

1.4

1.2

1.4