dbisUnibas / PS-BattlesView external linksLinks
Repository of the PS-Battles Dataset
☆39Mar 12, 2021Updated 4 years ago
Alternatives and similar repositories for PS-Battles
Users that are interested in PS-Battles are comparing it to the libraries listed below
Sorting:
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆168Apr 26, 2022Updated 3 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆297Apr 28, 2020Updated 5 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- ☆75Oct 30, 2018Updated 7 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆155Dec 3, 2017Updated 8 years ago
- ☆171Dec 16, 2021Updated 4 years ago
- Scoring tools for Media Forensics Evaluations☆27Apr 22, 2021Updated 4 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- Noiseprint, a CNN-based camera model fingerprint☆151Mar 24, 2023Updated 2 years ago
- ☆26Jun 14, 2020Updated 5 years ago
- Why do deep convolutional networks generalize so poorly to small image transformations?☆11Jun 23, 2019Updated 6 years ago
- ☆234Jun 26, 2019Updated 6 years ago
- upload☆17May 21, 2020Updated 5 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- Lifelong Learning via Progressive Distillation and Retrospection☆14Apr 2, 2019Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆65Feb 15, 2022Updated 4 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Nov 21, 2022Updated 3 years ago
- Paper: CVPR2018, Learning Rich Features for Image Manipulation Detection☆374Aug 30, 2020Updated 5 years ago
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Jul 19, 2018Updated 7 years ago
- Code for the paper "Optimized 3D Lighting Environment Estimation for Image Forgery Detection"☆22Apr 6, 2017Updated 8 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 5 years ago
- 基于论文Learning Rich Features for Image Manipulation Detection的学习与代码详解☆22Oct 2, 2020Updated 5 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆162Mar 24, 2023Updated 2 years ago
- ☆31Dec 3, 2022Updated 3 years ago
- Tianchi Competition "Forgeries and Forensics" Track 2☆69Jul 10, 2023Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- A simple adaboost code using decision stumps as weak classifiers☆11Nov 1, 2012Updated 13 years ago
- ☆10Jun 19, 2024Updated last year
- ☆10Feb 7, 2022Updated 4 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Apr 13, 2022Updated 3 years ago
- ☆31Oct 21, 2019Updated 6 years ago
- Tensorflow 2 implementations of the C-SimCLR and C-BYOL self-supervised visual representation methods from "Compressive Visual Representa …☆37Jan 18, 2022Updated 4 years ago
- torch7 wrapper for knn CUDA code☆10Dec 1, 2014Updated 11 years ago