Research Article
Reversible Privacy Protection with the Capability of Antiforensics
Figure 8
Examples from the UCID database. Rows 1, 3, 5, 7, and 9: from left to right, the first image is the original image, and the second to the fifth images represent the inpainted image by references [16, 48] and our method, respectively. Rows 2, 4, 6, 8, 10: from left to right, the first image is ground truth, and the second to the fifth images represent the localization result calculated by forensic algorithm 2.
(a) |
(b) |
(c) |
(d) |
(e) |