Splicing image forgery detection based on DCT and Local Binary Pattern
☆10Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Splicing-Image-Detection
Users that are interested in Splicing-Image-Detection are comparing it to the libraries listed below
Sorting:
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Updated this week
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated 11 months ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- DCT-based detection of copy-move forgery in images.☆35Jun 19, 2020Updated 5 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- An example Vue project displaying a PDF viewer☆11Jan 6, 2023Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Official repository for "Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U‐net based on mul…☆43Aug 20, 2022Updated 3 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆168Apr 26, 2022Updated 3 years ago
- 🌹2019年CVPR论文:ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆37Mar 24, 2023Updated 2 years ago
- ☆10Sep 2, 2023Updated 2 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- A project created for an AR-VR elective course in Sem 5☆12Dec 11, 2020Updated 5 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- 安全帽,安全背心,实验服识别☆10Jul 19, 2020Updated 5 years ago
- 基于微信的加密聊天工具☆10Feb 22, 2019Updated 7 years ago
- This project focuses on detecting a specific form of image forgery known as a copy-move attack, in which a portion of an image is copied …☆11Jun 27, 2022Updated 3 years ago
- h-index-reader is a module that allows you to retrieve author's h-index information from different sources including Google Scholar.☆13Oct 22, 2020Updated 5 years ago
- Project is about detecting spliced images using extracted features of image and SVM classifier.☆10Mar 28, 2020Updated 5 years ago
- T-shirt online designer☆11Aug 16, 2025Updated 6 months ago
- The purpose of this repository is to build a tool to visualize confusion matrices generated during training.☆10Jul 30, 2019Updated 6 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- Copy-Move Image Forgery Detection☆11Oct 2, 2019Updated 6 years ago
- Dependency-Based Self-Attention for Transformer NMT☆12Mar 27, 2024Updated last year
- Baresip docker container (baresip git + libre + librem )☆16Oct 21, 2020Updated 5 years ago
- Image Processing and feature detection are the two most important areas of research in Computer Vision. In our one year project we succes…☆12Jul 26, 2017Updated 8 years ago
- file compressor using huffman coding and JavaScript☆11Dec 2, 2021Updated 4 years ago
- Cython中文教程☆10May 24, 2019Updated 6 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- An article scraper and opener for medium to bypass the article limit☆12Nov 3, 2019Updated 6 years ago
- The binary classification problem focused on first IEEE Image forensics challenge-phase 1, to predict the given image is pristine or mani…☆14Aug 10, 2019Updated 6 years ago
- 一款端对端加密QQ聊天通讯的程序 QQ Chat With AES End-to-end Encryption☆15Aug 8, 2019Updated 6 years ago
- 示范faster-RCNN-pytorch如何生成20000个anchor box及可视化最终的图像☆13Jul 6, 2019Updated 6 years ago