Abstract: With the continuous advancement of image tampering techniques, traditional hash-based tampering detection algorithms face numerous challenges, particularly in handling complex tampering ...