plok5308 / DJPEG-torch
☆11Updated 2 years ago
Related projects: ⓘ
- Image-to-Image Translation in PyTorch☆27Updated 4 years ago
- Noiseprint, a CNN-based camera model fingerprint☆130Updated last year
- ☆24Updated 4 years ago
- ☆46Updated last year
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated last year
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 3 years ago
- ☆33Updated last year
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆27Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 4 years ago
- Implementation of "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations"☆28Updated 2 years ago
- ☆62Updated 5 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆45Updated 6 years ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Updated 4 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆38Updated 6 years ago
- GAN-generated image detection based on CNNs☆38Updated last year
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆30Updated 11 months ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 5 years ago
- ☆14Updated 4 years ago
- ☆49Updated this week
- Python implementation of PRNU extractor☆68Updated last year
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆120Updated last year
- ☆37Updated 3 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆22Updated 3 years ago
- ☆94Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆101Updated 4 years ago
- ☆50Updated 4 years ago
- The papers of Deepfakes Detection.☆20Updated 3 years ago
- Implementation of the Capsule-Forensics-v2☆119Updated 2 years ago
- Tampering detection related sources☆39Updated 5 years ago
- Light Field Messaging with Deep Photographic Steganography☆41Updated 3 years ago