Groundtruth images of tampering dataset CASIA 2.0
☆171Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for casia2groundtruth
Users that are interested in casia2groundtruth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Groundtruth images of tampering dataset CASIA 1.0☆67Feb 15, 2022Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆296Apr 28, 2020Updated 5 years ago
- Official repository for "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" (CVPRW 2019)☆114Mar 30, 2025Updated 11 months ago
- ☆39Jan 12, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch☆123Aug 31, 2024Updated last year
- ☆171Dec 16, 2021Updated 4 years ago
- Official code for CAT-Net: Compression Artifact Tracing Network. Image manipulation detection and localization.☆300Jul 29, 2025Updated 8 months ago
- MantraNet implemented by pytorch☆15Nov 17, 2020Updated 5 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Apr 13, 2022Updated 3 years ago
- code for Image Manipulation Detection by Multi-View Multi-Scale Supervision☆320Apr 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Resolves severe noise in the widely spread CASIA2.0 dataset ground-truth for Image Manipulation Detection☆42Mar 19, 2024Updated 2 years ago
- Repository of the PS-Battles Dataset☆39Mar 12, 2021Updated 5 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- ☆33May 30, 2021Updated 4 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆33Apr 12, 2023Updated 2 years ago
- ☆140Apr 20, 2023Updated 2 years ago
- ☆26Jun 14, 2020Updated 5 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Sep 26, 2020Updated 5 years ago
- ☆34Mar 24, 2023Updated 3 years ago
- A model to detecd Image splicing forgeries based on the VGG16 pre-trained model☆17Feb 25, 2026Updated last month
- Unofficial implementation of MVSS-Net (ICCV 2021) with Pytorch including training code.☆70Sep 26, 2023Updated 2 years ago
- Noiseprint, a CNN-based camera model fingerprint☆153Mar 24, 2023Updated 3 years ago
- Corrections of resolution issue for common image manipulation localization datasets. (CASIA, Coverage, IMD2020)☆37Mar 19, 2024Updated 2 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆154Dec 3, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆23Feb 4, 2022Updated 4 years ago
- ☆74Oct 30, 2018Updated 7 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 6 years ago
- 🌹2019年CVPR论文:ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆37Mar 24, 2023Updated 3 years ago
- Available datasets for training and testing the method about Image Forgery Detection and Localization☆109Feb 20, 2025Updated last year
- ☆15Mar 7, 2020Updated 6 years ago
- Image forgery detection using convolutional neural networks. Group 10's final project for TU Delft's course CS4180 Deep Learning 2019.☆173Jul 6, 2023Updated 2 years ago