polimi-ispl / cnn-fast-sdi
CNN-based fast source device identification
☆20Updated 2 years ago
Alternatives and similar repositories for cnn-fast-sdi:
Users that are interested in cnn-fast-sdi are comparing it to the libraries listed below
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 4 years ago
- Noiseprint, a CNN-based camera model fingerprint☆135Updated last year
- Python implementation of PRNU extractor☆72Updated 2 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆120Updated last year
- ☆24Updated 4 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- ☆22Updated 3 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆28Updated 2 years ago
- Implementation of "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations"☆30Updated 2 years ago
- ☆38Updated 4 years ago
- Unofficial implementation of ECCV20 paper "Thinking in frequency: Face forgery detection by mining frequency-aware clues"☆60Updated 2 years ago
- A general image manipulation detection model.☆22Updated 4 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆102Updated 5 years ago
- ☆31Updated last year
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆38Updated 6 years ago
- ☆33Updated 3 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 3 years ago
- The unofficial implementation of the core two-stream model from Generalizing Face Forgery Detection with High-frequency Features (CVPR 20…☆18Updated 3 years ago
- ☆13Updated 6 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- Light Field Messaging with Deep Photographic Steganography☆41Updated 4 years ago
- Unofficial implementation of ManTra-Net (CVPR 2019) with Pytorch including training code. The original paper is a model implemented by ke…☆28Updated last year
- ☆29Updated 3 years ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆20Updated last year
- ☆51Updated 4 years ago
- The author's unofficial PyTorch re-implementation of Face Xray☆82Updated 4 years ago
- This is the official repository for the code and datasets in the paper "Deepfake Network Architecture Attribution", AAAI 2022.☆53Updated last year
- Groundtruth images of tampering dataset CASIA 1.0☆58Updated 3 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆30Updated last year