plok5308 / DJPEG
☆9Updated 2 months ago
Alternatives and similar repositories for DJPEG:
Users that are interested in DJPEG are comparing it to the libraries listed below
- ☆11Updated 2 months ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- ☆99Updated 4 years ago
- Noiseprint, a CNN-based camera model fingerprint☆138Updated 2 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 4 years ago
- ☆26Updated 4 years ago
- ☆31Updated 2 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆28Updated 3 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Updated 5 years ago
- Image Manipulation Detection and Localization☆10Updated last year
- ☆60Updated last year
- ☆48Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- ☆15Updated 5 years ago
- Investigating patches for fake image classification☆141Updated 3 years ago
- Repo for our CVPR Paper: Watch your Up-Convolution: CNN Based Generative Deep Neural Networks areFailing to Reproduce Spectral Distributi…☆134Updated 5 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆67Updated last year
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆38Updated 6 years ago
- ☆36Updated 4 years ago
- Python implementation of PRNU extractor☆74Updated 2 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆61Updated 3 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 3 years ago
- The author's unofficial PyTorch re-implementation of Face Xray☆82Updated 4 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆120Updated 2 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- Pytorch implementation of F3Net (ECCV 2020 F3Net: Frequency in Face Forgery Network)☆161Updated 3 years ago
- upload☆14Updated 4 years ago