Algorithms published for Image forgery Identificatio in various papers published
☆18Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for image-forgery-detection
Users that are interested in image-forgery-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Illuminant inconsistencies for image splicing detection in forensics☆42Jul 16, 2017Updated 8 years ago
- Image copy-move detector☆163Feb 12, 2026Updated 2 months ago
- Assignment for an Image Processing course.☆15Jul 31, 2017Updated 8 years ago
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Image manipulation detection☆12Feb 10, 2022Updated 4 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆154Dec 3, 2017Updated 8 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- Dictionary Alignment with Re-ranking for Low Resolution NIR-VIS Face Recognition☆17Jan 6, 2019Updated 7 years ago
- ☆39Jan 12, 2021Updated 5 years ago
- Code for the paper: Fighting Fake News: Image Splice Detection via Learned Self-Consistency☆197Nov 22, 2022Updated 3 years ago
- Capstone Project for Udacity Machine Learning Nanodegree☆18Aug 14, 2017Updated 8 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Repo for the final project of EECS-545.☆10Dec 18, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆235Jun 26, 2019Updated 6 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- The binary classification problem focused on first IEEE Image forensics challenge-phase 1, to predict the given image is pristine or mani…☆14Aug 10, 2019Updated 6 years ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Jul 28, 2020Updated 5 years ago
- The purpose of this repository is to build a tool to visualize confusion matrices generated during training.☆10Jul 30, 2019Updated 6 years ago
- A simple sprite format for building 1bit styled graphics.☆16Oct 3, 2025Updated 7 months ago
- Django application to send user notifications via email, sms, etc.☆28Jan 26, 2022Updated 4 years ago
- Emotion recognition of Speaker's Speech Data. Employ speaker detection classifiers for emotion recognition, a multiclass classification p…☆16Jun 28, 2015Updated 10 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Telegram Bot for quickly searching and sharing papers on the arXiv☆11Feb 15, 2021Updated 5 years ago
- 示范faster-RCNN-pytorch如何生成20000个anchor box及可视化最终的图像☆13Jul 6, 2019Updated 6 years ago
- Code for the paper "Optimized 3D Lighting Environment Estimation for Image Forgery Detection"☆22Apr 6, 2017Updated 9 years ago
- Splicing image forgery detection based on DCT and Local Binary Pattern☆10Apr 30, 2020Updated 6 years ago
- Camera model identification has earned paramount importance in the field of image forensics with an upsurge of digitally altered images w…☆14Jun 15, 2019Updated 6 years ago
- Neural Network based Source Localization in Underwater Acoustic☆16Nov 21, 2017Updated 8 years ago
- Cmake build of http://gfx.cs.princeton.edu/proj/trimesh2/☆13Sep 11, 2018Updated 7 years ago
- ☆18May 21, 2024Updated last year
- image fraud detection(copy-move forgery)☆16Oct 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official implementation of paper "Semantic Novelty Detection via Relational Reasoning"☆16Jul 10, 2023Updated 2 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆296Apr 28, 2020Updated 6 years ago
- pytorch implementation of fcn in the wild☆26Dec 8, 2022Updated 3 years ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- A collection of awesome resources in haze removal.☆13Feb 14, 2021Updated 5 years ago
- Official code of "Where are my Neighbors? Exploiting Patches Relations in Self-Supervised Vision Transformer", Guglielmo Camporese, Elena…☆21Dec 14, 2022Updated 3 years ago
- Underwater MOT: Underwater Multiple Object Tracking dataset☆17Dec 11, 2020Updated 5 years ago