Python implementation of PRNU extractor
☆81Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for prnu-python
Users that are interested in prnu-python are comparing it to the libraries listed below
Sorting:
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- CNN-based fast source device identification☆24Sep 5, 2022Updated 3 years ago
- A Python script that extracts the PRNU from images using the DRUNet network as a denoising technique.☆10Nov 30, 2021Updated 4 years ago
- Extract camera fingerprint using different types of state-of-the-art denoisers☆20Jun 16, 2022Updated 3 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆59Dec 3, 2019Updated 6 years ago
- Official repository for the paper "On the use of Benford's law to detect GAN-generated images", ICPR2020☆13Apr 7, 2021Updated 4 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Sep 26, 2020Updated 5 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆14Feb 25, 2023Updated 3 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- Speedy Camera Fingerprinting Library☆23Feb 17, 2022Updated 4 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Source camera identification with dual-tree complex wavelet transform. IEEE Access, 2020.☆10Jul 9, 2023Updated 2 years ago
- ☆26Jun 14, 2020Updated 5 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated 11 months ago
- Official repository for the AAAI2026 paper (Zooming In on Fakes: A Novel Dataset for Localized AI-Generated Image Detection with Forgery …☆22Feb 4, 2026Updated 3 weeks ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ☆30Feb 1, 2019Updated 7 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17May 7, 2024Updated last year
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- ☆23Nov 9, 2023Updated 2 years ago
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆28Nov 19, 2024Updated last year
- Tampering detection related sources☆42Jul 22, 2019Updated 6 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆127Apr 16, 2023Updated 2 years ago
- Not All Poisons are Created Equal: Robust Training against Data Poisoning (ICML 2022)☆22Aug 8, 2022Updated 3 years ago
- the dataset of electronic commercial image used for saliency etc.☆18Apr 7, 2024Updated last year
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Apr 8, 2018Updated 7 years ago
- MATLAB implementations of popular Image Forensic algorithms☆86Feb 11, 2016Updated 10 years ago
- This is the official repository of the paper "VideoFACT: Detecting Video Forgeries Using Attention, Scene Context, and Forensic Traces" p…☆25Jan 11, 2024Updated 2 years ago
- 天池&ICDAR2023篡改图像检测比赛方案☆23Apr 8, 2023Updated 2 years ago
- Pytorch deep learning object detection using CINIC-10 dataset.☆22Feb 26, 2020Updated 6 years ago
- ☆24Jul 12, 2022Updated 3 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- A pytorch implementation of the paper named "Deep Transfer Across Domains for Face Anti-spoofing".☆19Apr 8, 2019Updated 6 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 5 years ago
- ☆28Aug 21, 2023Updated 2 years ago