asrafulashiq / doagan_clean
DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization
☆23Updated 3 years ago
Alternatives and similar repositories for doagan_clean
Users that are interested in doagan_clean are comparing it to the libraries listed below
Sorting:
- ☆23Updated 3 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- ☆29Updated 3 years ago
- QDL-CMFD: a Quality-independent and Deep Learning-based Copy-Move image Forgery Detection method.☆13Updated last year
- A general image manipulation detection model.☆24Updated 5 years ago
- ☆33Updated 3 years ago
- ☆17Updated 2 years ago
- ☆32Updated 2 years ago
- ☆37Updated 4 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 4 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆28Updated 3 years ago
- ☆48Updated 2 years ago
- Source code of the paper: Exploring Multi-View Pixel Contrast for General and Robust Image Forgery Localization, IEEE TIFS 2025.☆14Updated last month
- ☆26Updated 4 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆28Updated 2 years ago
- Unofficial implementation of ECCV20 paper "Thinking in frequency: Face forgery detection by mining frequency-aware clues"☆63Updated 2 years ago
- ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization☆35Updated 6 months ago
- ☆19Updated last year
- ☆67Updated 6 years ago
- The unofficial implementation of the core two-stream model from Generalizing Face Forgery Detection with High-frequency Features (CVPR 20…☆19Updated 3 years ago
- ☆17Updated 5 months ago
- ☆117Updated 2 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15Updated 5 years ago
- CNN-based fast source device identification☆20Updated 2 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆61Updated 3 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- Rethinking Image Forgery Detection and Localization☆85Updated last year
- Comprint: Image Forgery Detection and Localization using Compression Fingerprints☆19Updated last year