Implementation of a copy move forgery detection algorithm based on the algorithm in Fridrich's paper in 2003.
☆11May 29, 2017Updated 8 years ago
Alternatives and similar repositories for copy_move_forgery_detection
Users that are interested in copy_move_forgery_detection are comparing it to the libraries listed below
Sorting:
- Copy-move forgery detection using SIFT features (Amerini et al, TIFS 2011)☆23Dec 4, 2022Updated 3 years ago
- Code for the paper "Optimized 3D Lighting Environment Estimation for Image Forgery Detection"☆22Apr 6, 2017Updated 8 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- AIGC 系列报告 2022-2023☆11Feb 25, 2024Updated 2 years ago
- This code is the implementation of the paper "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting".…☆10Dec 24, 2020Updated 5 years ago
- Detects abandoned objects in a video, particularly useful for identifying suspicious abandoned luggage in railway stations and bus stands…☆10Apr 24, 2019Updated 6 years ago
- phoenix is a small command line image forensics tool☆49Mar 22, 2018Updated 7 years ago
- ☆14Mar 31, 2021Updated 4 years ago
- ☆15Jul 16, 2025Updated 7 months ago
- Hand tracker and gesture learner based on OpenCV.☆10Apr 18, 2014Updated 11 years ago
- OpenCv-mouse is virtual mouse which follows your finger movement using opencv object tracking and pynput☆10Jul 18, 2021Updated 4 years ago
- PURE-LET image deconvolution☆11Dec 30, 2019Updated 6 years ago
- Dual-tree complex wavelet combined with non-local means ASL fMRI denoising is a software toolbox that can denoise MR images, especially A…☆11Dec 14, 2017Updated 8 years ago
- Labs for USC's COMM 557: Data Science for Communication & Social Networks taught by Emilio Ferrara during the Fall 2020 semester.☆11Apr 19, 2022Updated 3 years ago
- Implementation of Wide Residual Networks in Keras☆10Sep 10, 2016Updated 9 years ago
- Contains the implementation of algorithms that estimate the geographic location of media content based on their content and metadata. It …☆13Nov 21, 2018Updated 7 years ago
- 一段视频,每隔一段时间进行一次目标检测,对检测到的目标进行跟踪,增加实时目标检测的稳定性☆12Jul 25, 2019Updated 6 years ago
- ☆15Mar 7, 2020Updated 5 years ago
- The binary classification problem focused on first IEEE Image forensics challenge-phase 1, to predict the given image is pristine or mani…☆14Aug 10, 2019Updated 6 years ago
- Distinguishing between Natural and Computer-Generated Images Using Convolutional Neural Networks☆12Jul 6, 2018Updated 7 years ago
- SYSU ZYM 专业技术综合实践☆12Aug 11, 2020Updated 5 years ago
- Official Training and Inference Code of Amodal Expander, Proposed in Tracking Any Object Amodally☆19Jul 11, 2024Updated last year
- 🌈use OpenGL and C++ to draw a scene of classroom--用openGL来绘制虚拟教室☆16Dec 25, 2019Updated 6 years ago
- Frames Extraction With OpenCV and Python☆15Aug 26, 2020Updated 5 years ago
- Implementation of Gather-Excite Network based on Mindspore and pytorch☆16Nov 21, 2022Updated 3 years ago
- ☆13Dec 23, 2019Updated 6 years ago
- Code for "Fast Perceptual Image Enhancement" paper☆13Mar 3, 2021Updated 5 years ago
- When you shoot photos for photogrammetry, sometimes you take 5k photos. Looking through them individually would be crazy. This script wi…☆18Aug 19, 2024Updated last year
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- People Live Tracking using YOLOv2 in MATLAB☆17Apr 30, 2018Updated 7 years ago
- Abandoned Object Detection & Illegal Dumping Detection☆14Aug 8, 2018Updated 7 years ago
- A pyspark lib to validate data quality☆18Nov 11, 2022Updated 3 years ago
- Dataset of China's-image-related tweets during COVID-19 with aspect-level sentiment labels.☆17Feb 2, 2021Updated 5 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Oct 22, 2020Updated 5 years ago
- Code for paper: Fangzhou Li, Yaohong Zhao, and Wei Xiang, Single-frame-based column fixed-pattern noise correction in an uncooled infrare…☆18Sep 1, 2020Updated 5 years ago
- Image copy-move detector☆162Feb 12, 2026Updated 3 weeks ago
- Person Re-Identification (ReID) using lightweight Deep Learning model.☆25Jun 21, 2023Updated 2 years ago
- ☆17Jul 3, 2017Updated 8 years ago