Multi-scale Analysis Strategies in PRNU-based Tampering Localization
☆59Dec 3, 2019Updated 6 years ago
Alternatives and similar repositories for multiscale-prnu
Users that are interested in multiscale-prnu are comparing it to the libraries listed below
Sorting:
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆12May 6, 2020Updated 5 years ago
- A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.☆155Dec 3, 2017Updated 8 years ago
- 🌹2019年CVPR论文:ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆37Mar 24, 2023Updated 2 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- Python implementation of PRNU extractor☆82Feb 2, 2023Updated 3 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Dec 12, 2020Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆61Nov 22, 2022Updated 3 years ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- JPEG Grid Detection based on the Number of DCT Zeros and its Application to Automatic and Localized Forgery Detection☆22Oct 25, 2022Updated 3 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Jul 16, 2017Updated 8 years ago
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆297Apr 28, 2020Updated 5 years ago
- ☆75Oct 30, 2018Updated 7 years ago
- Assignment for an Image Processing course.☆15Jul 31, 2017Updated 8 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Jul 19, 2018Updated 7 years ago
- image splicing locailzation using CNN☆23May 29, 2020Updated 5 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- Image Tampering Detection using ELA and CNN☆220Jun 28, 2023Updated 2 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆66Feb 15, 2022Updated 4 years ago
- Paper: CVPR2018, Learning Rich Features for Image Manipulation Detection☆374Aug 30, 2020Updated 5 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆168Apr 26, 2022Updated 3 years ago
- Algorithms published for Image forgery Identificatio in various papers published☆18Feb 20, 2015Updated 11 years ago
- ☆59May 18, 2021Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- ☆22Nov 12, 2018Updated 7 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated 2 months ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Project is about detecting spliced images using extracted features of image and SVM classifier.☆10Mar 28, 2020Updated 5 years ago
- ☆23Feb 4, 2022Updated 4 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- A Python script that extracts the PRNU from images using the DRUNet network as a denoising technique.☆10Nov 30, 2021Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- ☆12Dec 9, 2022Updated 3 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago