[CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression, forensics, manipulation detection)
☆163Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for neural-imaging
Users that are interested in neural-imaging are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Jul 28, 2020Updated 5 years ago
- Copy–Move forgery or Cloning is a type of Image tampering where a part of the image is copied and pasted on another part of same image…☆18Oct 23, 2021Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ReconfigISP: Reconfigurable Camera Image Processing Pipeline☆26Aug 21, 2022Updated 3 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16May 8, 2020Updated 5 years ago
- A simple and light-weight camera image processing pipeline☆351Jul 6, 2023Updated 2 years ago
- PyTorch & Matlab code for the paper: CIE XYZ Net: Unprocessing Images for Low-Level Computer Vision Tasks (TPAMI 2021).☆82Feb 25, 2023Updated 3 years ago
- Generating RGB photos from RAW image files with PyNET (PyTorch)☆388Aug 23, 2025Updated 8 months ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- ☆67May 6, 2021Updated 4 years ago
- camera pipeline☆390Jan 18, 2018Updated 8 years ago
- JPEG Grid Detection based on the Number of DCT Zeros and its Application to Automatic and Localized Forgery Detection☆22Oct 25, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- open cv software isp study☆17Nov 9, 2020Updated 5 years ago
- ☆33Jun 4, 2022Updated 3 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Nov 21, 2022Updated 3 years ago
- ☆21Feb 17, 2020Updated 6 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- [CVPR 2020--Oral] CycleISP: Real Image Restoration via Improved Data Synthesis☆568Sep 24, 2024Updated last year
- ManTra-Net: Manipulation Tracing Network For Detection And Localization of Image Forgeries With Anomalous Features☆296Apr 28, 2020Updated 6 years ago
- fast-openISP: a faster re-implementation of openISP☆310Jun 21, 2023Updated 2 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Feb 12, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- code for proposal contrastive learning☆14Feb 19, 2023Updated 3 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Apr 8, 2018Updated 8 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Noise Flow: Noise Modeling with Conditional Normalizing Flows☆156May 4, 2021Updated 4 years ago
- Repository of the PS-Battles Dataset☆39Mar 12, 2021Updated 5 years ago
- Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch☆125Aug 31, 2024Updated last year
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Dec 24, 2018Updated 7 years ago
- Implementation of the paper A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer☆22Apr 1, 2017Updated 9 years ago
- ☆172Dec 16, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- phoenix is a small command line image forensics tool☆50Mar 22, 2018Updated 8 years ago
- Paper: CVPR2018, Learning Rich Features for Image Manipulation Detection☆376Aug 30, 2020Updated 5 years ago
- ☆39Jan 12, 2021Updated 5 years ago
- Rethinking Image Forgery Detection and Localization☆95Mar 12, 2026Updated last month
- ☆34Mar 24, 2023Updated 3 years ago
- Matlab code for the paper "A survey of orthogonal moments for image representation: Theory, implementation, and evaluation"☆30Nov 25, 2021Updated 4 years ago
- AvatarShield: Visual Reinforcement Learning for Human-Centric Video Forgery Detection☆22Jun 3, 2025Updated 10 months ago