Detecting GAN generated Images using Convolutional Neural Networks
☆22Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for GanDetection
Users that are interested in GanDetection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GAN-generated image detection based on CNNs☆47Sep 5, 2023Updated 2 years ago
- Approximate string comparison using Jaro-Winkler distance formula.☆12Sep 18, 2018Updated 7 years ago
- Fake image detection model that can also classify which GAN was used to generate the fake images☆22May 29, 2022Updated 3 years ago
- A tox puppting bridge/client for matrix☆18Mar 27, 2023Updated 3 years ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Deep learning based image steganalysis in spatial domain☆12Apr 9, 2018Updated 8 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- Official repository for the paper "On the use of Benford's law to detect GAN-generated images", ICPR2020☆13Apr 7, 2021Updated 5 years ago
- ☆18Nov 9, 2021Updated 4 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- Detection of Object-Based Forgery in Advanced Video☆14May 7, 2017Updated 8 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Nov 21, 2022Updated 3 years ago
- Prose for a painting source code☆12Oct 8, 2019Updated 6 years ago
- [ICCV 2023] The color checker based harmonization dataset contributed in our paper "Deep Image Harmonization with Globally Guided Feature…☆20Feb 24, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- ☆74Oct 30, 2018Updated 7 years ago
- Reproduced Code for Image Forgery Detection papers.☆22Sep 22, 2021Updated 4 years ago
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Feb 25, 2026Updated 2 months ago
- Ai Object Detection - State of the Art Yolov8 by Ultralytics Integration with Streamlit WebRTC☆18Aug 4, 2024Updated last year
- Media Forensics / Fake Detection experiments in PyTorch. Implements Fighting Fake News: Image Splice Detection via Learned Self-Consisten…☆25Sep 19, 2021Updated 4 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Learning to detect fake face images in the wild. We use a deep fully convolutional network based on Siamese network and contrastive loss.☆95Sep 29, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [2016] A project for video anomaly detection of our ICASSP 2016 paper.☆20Dec 2, 2017Updated 8 years ago
- ☆30May 6, 2017Updated 9 years ago
- a python toolbox for deepfake detection☆29Oct 12, 2020Updated 5 years ago
- This repo lists some researches and applications in PU learning.☆12Mar 12, 2020Updated 6 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- Code from the ICCV'07 paper "Using Color Compatibility for Assessing Image Realism"☆35Jan 10, 2014Updated 12 years ago
- Unofficial implementation of the toy example in JiT https://arxiv.org/abs/2511.13720☆60Nov 21, 2025Updated 5 months ago
- Reverse search algorithm for vertex enumeration/convex hull problems by David Avis. Branch "upstream" created from release archives at ht…☆15Aug 13, 2025Updated 8 months ago
- OpenForensics Dataset☆28Oct 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- deepfake detection codes, distributed pytorch training (AI换脸检测)☆44May 17, 2023Updated 2 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- C++ program to simulate various cpu scheduling algorithms☆14Jun 30, 2024Updated last year
- ☆30Oct 13, 2018Updated 7 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Official Implementation (Pytorch) of "DDMI: Domain-Agnostic Latent Diffusion Models for Synthesizing High-Quality Implicit Neural Represe…☆27Jun 24, 2024Updated last year
- My first Object detection project. Trained a yolov5 for recognizing people, bicycle and cars from infrared images.☆25Apr 15, 2022Updated 4 years ago