polimi-ispl / prnu-anonymization-detectorLinks
IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)
☆10Updated 6 years ago
Alternatives and similar repositories for prnu-anonymization-detector
Users that are interested in prnu-anonymization-detector are comparing it to the libraries listed below
Sorting:
- Python implementation of PRNU extractor☆80Updated 2 years ago
- CNN-based fast source device identification☆23Updated 3 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Updated 6 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 5 years ago
- Copy-move forgery detection using SIFT features (Amerini et al, TIFS 2011)☆23Updated 3 years ago
- Computer Graphics vs Real Photographic Images : A Deep-learning approach☆26Updated 6 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Updated 3 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆42Updated 7 years ago
- Noiseprint, a CNN-based camera model fingerprint☆150Updated 2 years ago
- Implementation of the Capsule-Forensics-v2☆120Updated 3 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆60Updated 3 years ago
- Distinguishing between Natural and Computer-Generated Images Using Convolutional Neural Networks☆11Updated 7 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Updated 4 years ago
- Code repository for TUM Course in Advanced Deep Learning for Computer Vision☆70Updated 7 months ago
- Training codebase for our solution to Kaggle's Deepfake Detection Challenge☆65Updated 4 years ago
- ☆176Updated 5 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Tampering detection related sources☆42Updated 6 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆126Updated 2 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Updated 5 years ago
- MATLAB implementations of popular Image Forensic algorithms☆86Updated 9 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 5 years ago
- Implementation and demonstration of the paper: Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos☆87Updated 6 years ago
- ☆50Updated 5 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆32Updated 2 years ago
- Learning to detect fake face images in the wild. We use a deep fully convolutional network based on Siamese network and contrastive loss.☆96Updated 3 months ago
- The Pytorch Implemention of MesoNet☆70Updated 6 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆43Updated 8 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Updated 4 years ago