Research Article

Antitamper Image Watermarking Based on Cellular Network Topology for IoT-Themed Mobile Forensics

Figure 8

Tampering localization of copy and paste attack: (a), (b), (c), (d) for “Lena”; (e), (f), (g), (h) for “Goldhill.”