From: A two-stage detection method of copy-move forgery based on parallel feature fusion
Attack types | Attack degree levels | Related parameters |
---|---|---|
JPEG compression | JC1, JC2, …, JC9 | Compression factor = [20, 30, 40, 50, 60, 70, 80, 90, 100] |
Blur attack | IB, IB2, IB3 | Fuzzy window size = [3 × 3, 5 × 5, 7 × 7] |
Contrast change | CA1, CA2, CA3 | Adjustment interval = [(0.01, 0.95), (0.01, 0.9), (0.01, 0.8)] |
Color adjustment | CR1, CR2, CR3 | Variations in brightness for each color channel: [32, 64, 128] |
Brightness change | BC1, BC2, BC3 | Adjustment interval = [(0.01, 0.95), (0.01, 0.9), (0.01, 0.8)] |
Gaussian noise | NA1, NA2, NA3 | Mean = 0, variance = [0.0009, 0.005, 0.0005] |