pamelaajohnston / ImageTamperLinks
Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.
☆13Updated 6 years ago
Alternatives and similar repositories for ImageTamper
Users that are interested in ImageTamper are comparing it to the libraries listed below
Sorting:
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- ☆26Updated 5 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Updated 6 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆11Updated last year
- ☆50Updated 5 years ago
- ☆68Updated 6 years ago
- Repository of the PS-Battles Dataset☆38Updated 4 years ago
- Camera Trace Erasing in CVPR 2020☆9Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Python implementation of PRNU extractor☆76Updated 2 years ago
- Noiseprint, a CNN-based camera model fingerprint☆142Updated 2 years ago
- ☆33Updated 3 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆121Updated 2 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆160Updated 2 years ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Updated 4 years ago
- The Pytorch Implemention of MesoNet☆70Updated 5 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆29Updated 3 years ago
- Official repository of the paper Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors☆20Updated 2 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆31Updated last year
- ☆32Updated 3 years ago
- CNN-based fast source device identification☆21Updated 2 years ago
- ☆34Updated 2 years ago
- ☆50Updated 2 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆14Updated 3 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago