Research Article
Antitamper Image Watermarking Based on Cellular Network Topology for IoT-Themed Mobile Forensics
Table 4
Detection results of copy and paste attacks.
| Cover images | Results without dilation operation (%) | Results with one dilation operation (%) | Results with two dilation operations (%) | TDR | FPR | FNR | TDR | FPR | FNR | TDR | FPR | FNR |
| Lena | 55.53 | 3.08 | 0.57 | 94.24 | 9.47 | 0.08 | 99.58 | 16.58 | 0.01 | Goldhill | 49.15 | 2.18 | 2.04 | 93.54 | 4.13 | 0.26 | 99.79 | 7.36 | 0.01 |
|
|