Skip to main content

Table 4 Attack types in COMOFOD dataset

From: A two-stage detection method of copy-move forgery based on parallel feature fusion

Attack types

Attack degree levels

Related parameters

JPEG compression

JC1, JC2, …, JC9

Compression factor = [20, 30, 40, 50, 60, 70, 80, 90, 100]

Blur attack

IB, IB2, IB3

Fuzzy window size = [3 × 3, 5 × 5, 7 × 7]

Contrast change

CA1, CA2, CA3

Adjustment interval = [(0.01, 0.95), (0.01, 0.9), (0.01, 0.8)]

Color adjustment

CR1, CR2, CR3

Variations in brightness for each color channel: [32, 64, 128]

Brightness change

BC1, BC2, BC3

Adjustment interval = [(0.01, 0.95), (0.01, 0.9), (0.01, 0.8)]

Gaussian noise

NA1, NA2, NA3

Mean = 0, variance = [0.0009, 0.005, 0.0005]