polimi-ispl / prnu-anonymization-detectorLinks
IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)
☆10Updated 6 years ago
Alternatives and similar repositories for prnu-anonymization-detector
Users that are interested in prnu-anonymization-detector are comparing it to the libraries listed below
Sorting:
- Python implementation of PRNU extractor☆79Updated 2 years ago
- Computer Graphics vs Real Photographic Images : A Deep-learning approach☆26Updated 6 years ago
- Distinguishing between Natural and Computer-Generated Images Using Convolutional Neural Networks☆11Updated 7 years ago
- CNN-based fast source device identification☆23Updated 3 years ago
- ☆23Updated 6 years ago
- ☆18Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆58Updated 5 years ago
- The unofficial https://deepfakedetectionchallenge.ai/ github repo. A quick and easy way to get insight to current progress and previous w…☆89Updated 6 years ago
- ☆30Updated 8 years ago
- Training codebase for our solution to Kaggle's Deepfake Detection Challenge☆65Updated 4 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆42Updated 7 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- Implementation of the Capsule-Forensics-v2☆120Updated 3 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆26Updated 3 years ago
- Copy-move forgery detection using SIFT features (Amerini et al, TIFS 2011)☆23Updated 2 years ago
- ☆59Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- ☆176Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆59Updated 3 years ago
- Code repository for TUM Course in Advanced Deep Learning for Computer Vision☆70Updated 5 months ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 6 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆69Updated last year
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Updated 3 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆123Updated 3 years ago
- Deepfakes with an adversarial twist.☆28Updated 5 years ago
- ☆50Updated 5 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Updated 4 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago