Research Article

Antitamper Image Watermarking Based on Cellular Network Topology for IoT-Themed Mobile Forensics

Table 4

Detection results of copy and paste attacks.

Cover imagesResults without dilation operation (%)Results with one dilation operation (%)Results with two dilation operations (%)
TDRFPRFNRTDRFPRFNRTDRFPRFNR

Lena55.533.080.5794.249.470.0899.5816.580.01
Goldhill49.152.182.0493.544.130.2699.797.360.01