Figure 10From: Detection of shifted double JPEG compression by an adaptive DCT coefficient modelTampering detection results using our approach compared with two recent state-of-the-art approaches. (a) Another example of JPEG image forgery. (b) Ground truth of (a), the tampered region are bounded by the highlighted contour. (c1 to c3) Tampered region detection by Bianchi I's method with {QF1,QF2} = (c1) {50,90}, (c2) {50,70}, (c3) {50,50}, respectively. (d1 to d3) Tampered region detection by Bianchi II's method with {QF1,QF2} = (d1) {50,90}, (d2) {50,70}, (d3) {50,50}, respectively. (e1 to e3) Tampering region detection by the proposed method with {QF1,QF2} = (e1) {50,90}, (e2) {50,70}, (e3) {50,50}, respectively.Back to article page