The pytorch re-implement of the official BusterNet with demo pretrained weights.
☆18Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for BusterNet_pytorch
Users that are interested in BusterNet_pytorch are comparing it to the libraries listed below
Sorting:
- ☆30Dec 3, 2021Updated 4 years ago
- ☆75Oct 30, 2018Updated 7 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- ☆34Mar 24, 2023Updated 2 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- code for proposal contrastive learning☆14Feb 19, 2023Updated 3 years ago
- Classifying Forged vs Authentic using Domain Adaptation across in new domains in unsupervised settings☆15May 6, 2020Updated 5 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆24Aug 31, 2021Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆66Feb 15, 2022Updated 4 years ago
- Arduino repository☆14Aug 24, 2022Updated 3 years ago
- ☆140Mar 18, 2024Updated last year
- A large scale inpainting & t2i anime image dataset☆14Oct 18, 2025Updated 4 months ago
- Official Code for Large-vocabulary forensic pathological analyses via prototypical cross-modal contrastive learning☆16Jul 24, 2025Updated 7 months ago
- Adaption of Salome Geometry module into an addon library of OpenCASCADE☆11Sep 23, 2020Updated 5 years ago
- ☆10Jul 25, 2018Updated 7 years ago
- word template update based on python-docx☆11Feb 17, 2021Updated 5 years ago
- Animated charts for Godot Engine (3.x versions)☆11Feb 6, 2019Updated 7 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- 这是基于Linux系统的 ftp系统能实现文件的上传和下载☆12May 10, 2018Updated 7 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- [IJCV 2025] The official implementation of "AnyPattern: Towards In-context Image Copy Detection"☆10Oct 24, 2025Updated 4 months ago
- Open source version of a practice case I made☆10Feb 21, 2021Updated 5 years ago
- Code for "The Layer Laboratory: A Calculus for Additive and Subtractive Composition of Anisotropic Surface Reflectance" (SIGGRAPH 2018) b…☆10Apr 7, 2021Updated 4 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- Offical implement of NCL-IML (Pre-training-free Image Manipulation Localization through Non-Mutually Contrastive Learning), ICCV2023☆48Feb 16, 2025Updated last year
- Official repository of "Deep Image Composition Meets Image Forgery"☆13May 30, 2024Updated last year
- 农作物病害检测 2018 ai challenger☆12Aug 8, 2021Updated 4 years ago
- CIFAR-10 Object Detection with improved accuracy using Fractional MaxPooling with Convolutional Neural Networks☆12Aug 6, 2017Updated 8 years ago
- ForensicsSAM: Toward Robust and Unified Image Forgery Detection and Localization Resisting to Adversarial Attack☆18Jan 25, 2026Updated last month
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- Electromagnetics codes to compute radiative heat transfer, Green's functions, and reflection/transmission for multilayer structures☆11Nov 1, 2013Updated 12 years ago
- The histogram of oriented gradients (HOG) implemented in tensorflow.☆11Feb 8, 2020Updated 6 years ago
- AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics, WMF@CVPR2023☆50Jan 31, 2025Updated last year
- Geometry Radio Frequency Library by Chris Tralie☆10Jan 6, 2016Updated 10 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago