Dataset for ID Document Verification systems
☆27Dec 9, 2024Updated last year
Alternatives and similar repositories for SIDTD_Dataset
Users that are interested in SIDTD_Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Synthetic identity documents dataset☆35Mar 4, 2025Updated last year
- Official Repository for "GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response"☆11Jul 8, 2024Updated last year
- ☆13Oct 2, 2024Updated last year
- A Python implementation of the Hopfield network used to solve the traveling salesman problem☆10Apr 11, 2019Updated 6 years ago
- My small contribution to this new agentic world☆14Aug 22, 2025Updated 7 months ago
- ☆12Jun 17, 2025Updated 9 months ago
- [AAAI2025] Revisiting Tampered Scene Text Detection in the Era of Generative AI☆64Mar 3, 2026Updated 3 weeks ago
- [ACM MM 2025] InstructFLIP: Exploring Unified Vision-Language Model for Face Anti-spoofing☆20Aug 4, 2025Updated 7 months ago
- [NeurIPS 2024] Official Code for the Paper OoD-ViT-NAS: Vision Transformer Neural Architecture Search for Out-of-Distribution Generalizat…☆13Dec 3, 2024Updated last year
- Applied Reinforcement Learning course☆12Feb 14, 2023Updated 3 years ago
- [WACV2025] source code of StrDA: https://arxiv.org/abs/2410.09913☆18Apr 15, 2025Updated 11 months ago
- Node.js + Express used with Sequelize Object-Relational Mapping (ORM) to perform promise-based Create, Read, Update & Delete (CRUD) oper…☆10Dec 14, 2022Updated 3 years ago
- GAN-enhanced Conditional Echocardiogram Generation☆14Mar 24, 2023Updated 3 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆24Aug 31, 2021Updated 4 years ago
- Unofficial Python client for Azure cognitive search☆11Jun 7, 2019Updated 6 years ago
- Implementation of multi-output conformal regression methods☆13Sep 23, 2025Updated 6 months ago
- code for Image Manipulation Detection by Multi-View Multi-Scale Supervision☆320Apr 10, 2023Updated 2 years ago
- ☆21May 30, 2023Updated 2 years ago
- Source code for the Foundations of Agentic AI for Retail Book☆21Jan 13, 2026Updated 2 months ago
- Source code of the paper: A Lightweight and Effective Image Tampering Localization Network with Vision Mamba, IEEE SPL 2025.☆25Aug 8, 2025Updated 7 months ago
- Official implementation of the paper "FLIP: Cross-domain Face Anti-spoofing with Language Guidance". (ICCV 2023)☆86Mar 26, 2024Updated last year
- A curated list of image manipulation detection and localization and related resources.☆287Oct 27, 2025Updated 4 months ago
- A simple authentication API using Express.js and PostgreSQL DB☆12Apr 26, 2021Updated 4 years ago
- Capture and store ambient data (air, light, sound...), visualize it. Arduino, Raspberry Pi. Fast Fourier transform. Multithreaded Python …☆14Feb 5, 2020Updated 6 years ago
- A PyTorch implementation of PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition☆25Jan 31, 2024Updated 2 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- A python implementation of the paper "Scalable Recognition with a Vocabulary Tree, D. Nister, H. Stewenius, 2006"☆17May 4, 2023Updated 2 years ago
- ☆34Jun 14, 2023Updated 2 years ago
- MRZ recognition from visa and passport documents.☆25Jan 13, 2026Updated 2 months ago
- Text-Guided Inpainting Forgery Dataset☆20Feb 23, 2026Updated last month
- Demo project to show how to implement two factor authentication using Node.js and Vue☆15Jan 16, 2022Updated 4 years ago
- Create visual graphs out of your Notion workspace☆11Aug 21, 2022Updated 3 years ago
- Simple demo using Semantic Kernel and AutoGen to create an airline booking app powered by AI agents☆25Dec 14, 2023Updated 2 years ago
- Machine learning with emphasis on Deep Learning hands-on class.☆18Oct 25, 2018Updated 7 years ago
- GBDF: Gender Balanced DeepFake Dataset☆11Jul 22, 2022Updated 3 years ago
- Implementation of "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations"☆30Jun 21, 2022Updated 3 years ago
- Implementation of a Wasserstein Generative Adversarial Network with Gradient Penalty to enforce lipchitz constraint. The WGAN utilizes th…☆14Aug 30, 2020Updated 5 years ago
- VLAD-VSA: Cross-Domain Face Presentation Attack Detection with Vocabulary Separation and Adaptation☆13Mar 4, 2022Updated 4 years ago
- We're generating faces with Pytorch GAN implementations☆15Dec 18, 2019Updated 6 years ago