polimi-ispl / prnu-pythonLinks
Python implementation of PRNU extractor
☆76Updated 2 years ago
Alternatives and similar repositories for prnu-python
Users that are interested in prnu-python are comparing it to the libraries listed below
Sorting:
- CNN-based fast source device identification☆21Updated 2 years ago
- Noiseprint, a CNN-based camera model fingerprint☆142Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- The official Tensorflow implementation for ICCV'19 paper 'Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints'☆121Updated 2 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆38Updated 6 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆68Updated last year
- ☆62Updated last year
- The Pytorch Implemention of MesoNet☆70Updated 5 years ago
- ☆50Updated 5 years ago
- ☆33Updated 2 years ago
- Implementation of the Capsule-Forensics-v2☆120Updated 3 years ago
- ☆100Updated 5 years ago
- Code for the ICML 2020 paper: Leveraging Frequency Analysis for Deep Fake Image Recognition.☆187Updated 2 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- ☆68Updated 6 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆103Updated 5 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆160Updated 2 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆29Updated 3 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Updated 5 years ago
- Repository of the PS-Battles Dataset☆38Updated 4 years ago
- ☆32Updated 3 years ago
- HiDDeN: Hiding Data with Deep Networks.☆97Updated 6 years ago
- Implementation and demonstration of the paper: Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos☆86Updated 6 years ago
- Investigating patches for fake image classification☆144Updated 3 years ago
- Tampering detection related sources☆41Updated 5 years ago