Repository of the PS-Battles Dataset
☆39Mar 12, 2021Updated 5 years ago
Alternatives and similar repositories for PS-Battles
Users that are interested in PS-Battles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆172Apr 26, 2022Updated 3 years ago
- ☆34Mar 24, 2023Updated 3 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- 🌹2019年CVPR论文:ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆37Mar 24, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code for the paper: Fighting Fake News: Image Splice Detection via Learned Self-Consistency☆197Nov 22, 2022Updated 3 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆296Apr 28, 2020Updated 5 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- Tampering detection related sources☆43Jul 22, 2019Updated 6 years ago
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- ☆171Dec 16, 2021Updated 4 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆154Dec 3, 2017Updated 8 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆42Jul 16, 2017Updated 8 years ago
- Scoring tools for Media Forensics Evaluations☆26Apr 22, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- Why do deep convolutional networks generalize so poorly to small image transformations?☆11Jun 23, 2019Updated 6 years ago
- ☆73Oct 30, 2018Updated 7 years ago
- ☆235Jun 26, 2019Updated 6 years ago
- Noiseprint, a CNN-based camera model fingerprint☆154Mar 27, 2026Updated last week
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Nov 21, 2022Updated 3 years ago
- ☆16Nov 6, 2023Updated 2 years ago
- Lifelong Learning via Progressive Distillation and Retrospection☆14Apr 2, 2019Updated 7 years ago
- ☆26Jun 14, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Feb 25, 2026Updated last month
- A simple adaboost code using decision stumps as weak classifiers☆11Nov 1, 2012Updated 13 years ago
- How to scale Jitsi to handle 2000+ users across 20 conferences, using terraform + gcp☆17Sep 9, 2020Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- The pytorch re-implement of the official BusterNet with demo pretrained weights.☆18Dec 3, 2020Updated 5 years ago
- scripts to convert model formats with blender☆12Aug 5, 2016Updated 9 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆163Mar 24, 2023Updated 3 years ago
- Code for the paper "Optimized 3D Lighting Environment Estimation for Image Forgery Detection"☆22Apr 6, 2017Updated 9 years ago
- Public package to compute translationally and rotationally invariant wavelet-based statistics on images.☆10Aug 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Paper: CVPR2018, Learning Rich Features for Image Manipulation Detection☆376Aug 30, 2020Updated 5 years ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Jul 28, 2020Updated 5 years ago
- A collection of state-of-the-art single image super resolution methods.☆13Apr 26, 2021Updated 4 years ago
- Matlab code for the paper "Representing noisy image without denoising"☆10Jan 21, 2023Updated 3 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 6 years ago