polimi-ispl / prnu-anonymization-detectorLinks
IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)
☆10Updated 5 years ago
Alternatives and similar repositories for prnu-anonymization-detector
Users that are interested in prnu-anonymization-detector are comparing it to the libraries listed below
Sorting:
- Python implementation of PRNU extractor☆77Updated 2 years ago
- Computer Graphics vs Real Photographic Images : A Deep-learning approach☆26Updated 5 years ago
- Distinguishing between Natural and Computer-Generated Images Using Convolutional Neural Networks☆11Updated 7 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆56Updated 5 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆26Updated 3 years ago
- Implementation of the Capsule-Forensics-v2☆120Updated 3 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Updated 2 years ago
- CNN-based fast source device identification☆22Updated 2 years ago
- ☆174Updated 5 years ago
- Old implementation and demonstration of the Capsule-Forensics. The Capsule-Forensics-v2 has been released here: https://github.com/nii-ya…☆36Updated 5 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆39Updated 7 years ago
- HiDDeN: Hiding Data with Deep Networks.☆98Updated 6 years ago
- ☆23Updated 6 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Updated 2 years ago
- ☆18Updated 2 years ago
- Training codebase for our solution to Kaggle's Deepfake Detection Challenge☆65Updated 4 years ago
- Tampering detection related sources☆41Updated 6 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 5 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- a residual network for image steganalysis☆18Updated 7 years ago
- Noiseprint, a CNN-based camera model fingerprint☆144Updated 2 years ago
- Code repository for TUM Course in Advanced Deep Learning for Computer Vision☆70Updated 2 months ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆58Updated 2 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆68Updated last year
- Universal Adversarial Networks☆33Updated 7 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆90Updated 6 years ago
- Steganalysis based deep learning☆57Updated 5 years ago
- Learning to detect fake face images in the wild. We use a deep fully convolutional network based on Siamese network and contrastive loss.☆96Updated 3 years ago
- Deepfakes with an adversarial twist.☆28Updated 5 years ago