☆33May 30, 2021Updated 4 years ago
Alternatives and similar repositories for Dense-FCN-for-tampering-localization
Users that are interested in Dense-FCN-for-tampering-localization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Feb 4, 2022Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization☆34Nov 8, 2024Updated last year
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated last year
- Source code of the paper: Effective Image Tampering Localization with Multi-Scale ConvNeXt Feature Fusion, JVCIR 2024.☆37Feb 2, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆34Mar 24, 2023Updated 3 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆296Apr 28, 2020Updated 6 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆34Apr 12, 2023Updated 3 years ago
- Official repository for "Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U‐net based on mul…☆42Aug 20, 2022Updated 3 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- ☆39Jan 12, 2021Updated 5 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- ☆142Mar 18, 2024Updated 2 years ago
- Media Forensics / Fake Detection experiments in PyTorch. Implements Fighting Fake News: Image Splice Detection via Learned Self-Consisten…☆25Sep 19, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆142Apr 20, 2023Updated 3 years ago
- Noiseprint, a CNN-based camera model fingerprint☆155Mar 27, 2026Updated last month
- ☆17Jun 14, 2017Updated 8 years ago
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- code for Image Manipulation Detection by Multi-View Multi-Scale Supervision☆325Apr 10, 2023Updated 3 years ago
- Source code of the paper: Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization, IEEE TIFS 2025.☆28Aug 8, 2025Updated 9 months ago
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- QDL-CMFD: a Quality-independent and Deep Learning-based Copy-Move image Forgery Detection method.☆13Nov 19, 2023Updated 2 years ago
- Image Manipulation Detection and Localization☆10Aug 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Comprint: Image Forgery Detection and Localization using Compression Fingerprints☆23Feb 27, 2024Updated 2 years ago
- 基于论文Learning Rich Features for Image Manipulation Detection的学习与代码详解☆22Oct 2, 2020Updated 5 years ago
- ☆172Dec 16, 2021Updated 4 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆173Apr 26, 2022Updated 4 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆24Aug 31, 2021Updated 4 years ago
- code for proposal contrastive learning☆14Feb 19, 2023Updated 3 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 6 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Nov 21, 2022Updated 3 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆30Dec 3, 2021Updated 4 years ago
- ☆52Jan 17, 2023Updated 3 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆67Feb 15, 2022Updated 4 years ago
- ☆22Nov 12, 2018Updated 7 years ago
- This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".☆13Dec 11, 2020Updated 5 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Sep 26, 2020Updated 5 years ago
- Official repository for the AAAI2026 paper (Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image Detection with Forgery …☆27Apr 24, 2026Updated 2 weeks ago