challenged the current image tampering detection techniques by presenting types of image transformation operation that cannot be detected using the available resampling detection tools.
Among these attacks, resampling with edge-modulated geometric distortion and the dual-path approach are nearly impossible to be detected