polimi-ispl / cnn-fast-sdiLinks
CNN-based fast source device identification
☆22Updated 3 years ago
Alternatives and similar repositories for cnn-fast-sdi
Users that are interested in cnn-fast-sdi are comparing it to the libraries listed below
Sorting:
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Updated 2 years ago
- Python implementation of PRNU extractor☆78Updated 2 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Noiseprint, a CNN-based camera model fingerprint☆146Updated 2 years ago
- Robust Camera Trace Extraction (TIFS'23)☆11Updated last year
- ☆26Updated 5 years ago
- ☆50Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆56Updated 5 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Updated 3 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- Implementation and demonstration of the paper: Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos☆86Updated 6 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Updated 5 years ago
- ☆34Updated 2 years ago
- Tampering detection related sources☆41Updated 6 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago
- Solution to Deepfake Detection Challenge☆27Updated 3 years ago
- Implementation of "Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations"☆30Updated 3 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 6 years ago
- ☆13Updated 6 years ago
- ☆84Updated 8 months ago
- MATLAB implementations of popular Image Forensic algorithms☆86Updated 9 years ago
- This is the official repository for the code and datasets in the paper "Deepfake Network Architecture Attribution", AAAI 2022.☆54Updated 2 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 4 years ago
- ☆23Updated 3 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆39Updated 7 years ago