muntakimrafi / Application-of-DenseNet-in-Camera-Model-Identification-and-Post-processing-Detection
Camera model identification has earned paramount importance in the field of image forensics with an upsurge of digitally altered images which are constantly being shared through websites, media, and social applications. But, the task of identification becomes quite challenging if metadata are absent from the image and/or if the image has been po…
☆14Updated 5 years ago
Alternatives and similar repositories for Application-of-DenseNet-in-Camera-Model-Identification-and-Post-processing-Detection:
Users that are interested in Application-of-DenseNet-in-Camera-Model-Identification-and-Post-processing-Detection are comparing it to the libraries listed below
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 3 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- CNN-based fast source device identification☆20Updated 2 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 4 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆19Updated 9 months ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Adversarial attacks including DeepFool and C&W☆13Updated 5 years ago
- ☆26Updated last year
- Camera Trace Erasing in CVPR 2020☆9Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 8 months ago
- ☆26Updated 4 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆30Updated last year
- A Siamese CNN for Image Steganalysis☆72Updated 4 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆12Updated 7 years ago
- ☆36Updated 4 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- ☆13Updated 6 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆29Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆61Updated 5 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆60Updated 2 years ago
- Resources for face forgery detection☆11Updated 2 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆126Updated 4 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Updated 3 years ago
- ☆67Updated 6 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 5 years ago
- Train several classical classification networks in cifar10 dataset by PyTorch☆24Updated 4 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Updated 2 years ago
- Image Manipulation Detection and Localization☆10Updated last year
- Tampering detection related sources☆41Updated 5 years ago