Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"
☆43Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for Constrained-CNN
Users that are interested in Constrained-CNN are comparing it to the libraries listed below
Sorting:
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- MantraNet implemented by pytorch☆15Nov 17, 2020Updated 5 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 5 years ago
- Pytorch implementation of F3Net (ECCV 2020 F3Net: Frequency in Face Forgery Network)☆173Mar 16, 2022Updated 3 years ago
- ☆39Jan 12, 2021Updated 5 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- ☆33May 30, 2021Updated 4 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Dec 12, 2020Updated 5 years ago
- Noiseprint, a CNN-based camera model fingerprint☆152Mar 24, 2023Updated 2 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆168Apr 26, 2022Updated 3 years ago
- ☆29Aug 29, 2022Updated 3 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆33Apr 12, 2023Updated 2 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- Python implementation of PRNU extractor☆81Feb 2, 2023Updated 3 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆297Apr 28, 2020Updated 5 years ago
- ☆140Mar 18, 2024Updated last year
- ☆171Dec 16, 2021Updated 4 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated 11 months ago
- A Python framework for reliably assessing synthetic image detection methods☆49Jul 16, 2025Updated 7 months ago
- Code for the paper: Fighting Fake News: Image Splice Detection via Learned Self-Consistency☆197Nov 22, 2022Updated 3 years ago
- This is the official repository of the paper "VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces" p…☆25Jan 11, 2024Updated 2 years ago
- ☆22Nov 12, 2018Updated 7 years ago
- [ACM MM 2023 ]DFIL Codes☆25Jan 2, 2024Updated 2 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- 基于论文Learning Rich Features for Image Manipulation Detection的学习与代码详解☆22Oct 2, 2020Updated 5 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- The code of multi-attention deepfake detection☆275Feb 18, 2022Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago