Code for the paper "Optimized 3D Lighting Environment Estimation for Image Forgery Detection"
☆22Apr 6, 2017Updated 8 years ago
Alternatives and similar repositories for CASIA_3Dlighting
Users that are interested in CASIA_3Dlighting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- Detection of Object-Based Forgery in Advanced Video☆14May 7, 2017Updated 8 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- Implementation of a copy move forgery detection algorithm based on the algorithm in Fridrich's paper in 2003.☆11May 29, 2017Updated 8 years ago
- Code from the ICCV'07 paper "Using Color Compatibility for Assessing Image Realism"☆35Jan 10, 2014Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Feb 25, 2026Updated last month
- ☆13Aug 12, 2019Updated 6 years ago
- MATLAB implementations of popular Image Forensic algorithms☆87Feb 11, 2016Updated 10 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- MATLAB implementation of our llumination estimation technique from a single image (ICCV'09 and IJCV'12 papers)☆55Nov 25, 2018Updated 7 years ago
- ☆235Jun 26, 2019Updated 6 years ago
- The MATLAB source for the DTCWT toolbox (1,2,3)D and keypoints.☆11Feb 10, 2014Updated 12 years ago
- Faint edge detection with shape score based on triangle partition of the images.☆10Oct 10, 2021Updated 4 years ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Image manipulation detection☆12Feb 10, 2022Updated 4 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- 2019CCF爱奇艺视频拷贝(版权)检测算法☆15Dec 11, 2019Updated 6 years ago
- PURE-LET image deconvolution☆11Dec 30, 2019Updated 6 years ago
- Scoring tools for Media Forensics Evaluations☆27Apr 22, 2021Updated 4 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- Dual-tree complex wavelet combined with non-local means ASL fMRI denoising is a software toolbox that can denoise MR images, especially A…☆11Dec 14, 2017Updated 8 years ago
- anisodiff.m refers to the matlab code of Image Denoising using anisotropic diffusion by perona malik and further it has been modified to …☆11Feb 25, 2018Updated 8 years ago
- SIRV-Based High-Resolution PolSAR Image Speckle Suppression via Dual-Domain Filtering☆12Aug 5, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Probabilistic Forecasting with Temporal Convolutional Neural Network☆11Nov 7, 2019Updated 6 years ago
- Experiments on using ChatGPT for failure mode classification☆12Sep 20, 2023Updated 2 years ago
- MPCA: Multilinear Principal Component Analysis of Tensor Data☆17Feb 10, 2018Updated 8 years ago
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated 11 months ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- Sub-window variance filter for Multi-scale Image Decomposition☆16Sep 23, 2021Updated 4 years ago
- 机器视觉作业 sift-kmeans-SVM图像分类☆15Nov 21, 2020Updated 5 years ago
- Rank the pages in the corpus by considering the inlinks and outlinks. Also handling dead ends and spider traps. Topic Specific Page Rank …☆10Feb 10, 2018Updated 8 years ago
- Algorithms published for Image forgery Identificatio in various papers published☆18Feb 20, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jan 17, 2024Updated 2 years ago
- Autoencoder trained on ImageNet Using Torch 7☆19Oct 19, 2019Updated 6 years ago
- Repository of the PS-Battles Dataset☆39Mar 12, 2021Updated 5 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆171Apr 26, 2022Updated 3 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- ☆10Oct 28, 2016Updated 9 years ago