Python implementation of PRNU extractor
☆83Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for prnu-python
Users that are interested in prnu-python are comparing it to the libraries listed below
Sorting:
- CNN-based fast source device identification☆24Sep 5, 2022Updated 3 years ago
- Official repository for the paper "On the use of Benford's law to detect GAN-generated images", ICPR2020☆13Apr 7, 2021Updated 4 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- Noiseprint, a CNN-based camera model fingerprint☆153Mar 24, 2023Updated 2 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆15Feb 25, 2023Updated 3 years ago
- Source camera identification with dual-tree complex wavelet transform. IEEE Access, 2020.☆10Jul 9, 2023Updated 2 years ago
- Implementation of the ICIP paper "GPU-ACCELERATED SIFT-AIDED SOURCE IDENTIFICATION OF STABILIZED VIDEOS"☆11Oct 6, 2023Updated 2 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- Synthetic Images Analysis☆47Jul 13, 2023Updated 2 years ago
- ☆234Jun 26, 2019Updated 6 years ago
- MATLAB implementations of popular Image Forensic algorithms☆86Feb 11, 2016Updated 10 years ago
- Reproduced Code for Image Forgery Detection papers.☆22Sep 22, 2021Updated 4 years ago
- Official repository for the AAAI2026 paper (Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image Detection with Forgery …☆22Feb 4, 2026Updated last month
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- Code for ICLR 2022 paper. "Promoting Saliency From Depth: Deep Unsupervised RGB-D Saliency Detection".☆17Mar 23, 2022Updated 3 years ago
- A collection of MATLAB tools and utilities☆13Jan 5, 2015Updated 11 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Apr 8, 2018Updated 7 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆162Mar 24, 2023Updated 2 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated 11 months ago
- ☆30Feb 1, 2019Updated 7 years ago
- ☆11Feb 27, 2025Updated last year
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ParIDE — World's first IDE for Werewolf moderators.☆10Dec 6, 2016Updated 9 years ago
- ☆57Mar 24, 2023Updated 2 years ago
- This is the official repository of the paper "VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces" p…☆25Jan 11, 2024Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 6 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Implements the ST-DBSCAN algorithm to find clusters in a spatial-temporal database☆17Sep 27, 2014Updated 11 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- The Backend Optimization of the JPEG-AI Verification Models☆16Dec 14, 2023Updated 2 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- In this report, we propose a filtering method combining Kalman and Wiener filter to remove noises from the video.☆11Sep 12, 2016Updated 9 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- John Langford's original release of Vowpal Wabbit -- a fast online learning algorithm☆16Jul 25, 2017Updated 8 years ago
- PCA-based knowledge distillation towards lightweight and content-style balanced photorealistic style transfer models☆25Dec 4, 2023Updated 2 years ago