Tampering detection related sources
☆42Jul 22, 2019Updated 6 years ago
Alternatives and similar repositories for Manipulation-Detection
Users that are interested in Manipulation-Detection are comparing it to the libraries listed below
Sorting:
- ☆26Jun 14, 2020Updated 5 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- ☆39Jan 12, 2021Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Apr 13, 2022Updated 3 years ago
- ☆75Oct 30, 2018Updated 7 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆168Apr 26, 2022Updated 3 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- ☆34Mar 24, 2023Updated 2 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆297Apr 28, 2020Updated 5 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Dec 12, 2020Updated 5 years ago
- Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch☆123Aug 31, 2024Updated last year
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated 11 months ago
- ☆23Feb 4, 2022Updated 4 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆155Dec 3, 2017Updated 8 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Sep 26, 2020Updated 5 years ago
- ☆171Dec 16, 2021Updated 4 years ago
- Noiseprint, a CNN-based camera model fingerprint☆152Mar 24, 2023Updated 2 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- Paper: CVPR2018, Learning Rich Features for Image Manipulation Detection☆374Aug 30, 2020Updated 5 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Apr 8, 2018Updated 7 years ago
- MantraNet implemented by pytorch☆15Nov 17, 2020Updated 5 years ago
- Reproduced Code for Image Forgery Detection papers.☆22Sep 22, 2021Updated 4 years ago
- ☆234Jun 26, 2019Updated 6 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- Based on Learning-rich-features-for-image-manipulation-detection☆44Jan 6, 2020Updated 6 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- Official repository for the AAAI2026 paper (Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image Detection with Forgery …☆22Feb 4, 2026Updated last month
- Using CNN's to detect doctored images☆73Feb 11, 2019Updated 7 years ago
- Rethinking Image Forgery Detection and Localization☆93Mar 3, 2024Updated 2 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- MATLAB implementations of popular Image Forensic algorithms☆86Feb 11, 2016Updated 10 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆33Apr 12, 2023Updated 2 years ago