plok5308 / DJPEGLinks
☆9Updated 4 months ago
Alternatives and similar repositories for DJPEG
Users that are interested in DJPEG are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 months ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- Noiseprint, a CNN-based camera model fingerprint☆141Updated 2 years ago
- ☆26Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- ☆100Updated 4 years ago
- CNN-based fast source device identification☆21Updated 2 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- A python package for accessing the internal variables of JPEG file format such as DCT coefficients and quantization tables☆78Updated 9 months ago
- ☆50Updated 2 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆28Updated 3 years ago
- Repo for our CVPR Paper: Watch your Up-Convolution: CNN Based Generative Deep Neural Networks areFailing to Reproduce Spectral Distributi…☆134Updated 5 years ago
- Image Manipulation Detection and Localization☆10Updated last year
- ☆34Updated 2 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Updated 5 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆121Updated 2 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆11Updated last year
- [ECCV 2022: Oral] In this work, we discover that color is a crtical transferable forensic feature (T-FF) in universal detectors for detec…☆15Updated 2 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- Python implementation of PRNU extractor☆75Updated 2 years ago
- upload☆15Updated 5 years ago
- ☆38Updated 4 years ago
- ☆13Updated 6 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆61Updated 3 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆160Updated 2 years ago
- Investigating patches for fake image classification☆145Updated 3 years ago