Using machine learning to detect fake digital images
☆27Mar 4, 2018Updated 8 years ago
Alternatives and similar repositories for isthisimagefake
Users that are interested in isthisimagefake are comparing it to the libraries listed below
Sorting:
- Google Chrome Extension that allows you to detect photoshopped images using a CNN.☆11May 28, 2018Updated 7 years ago
- classify recapture images using laplacian filter and CNN network☆12Dec 20, 2019Updated 6 years ago
- ☆23Jan 5, 2017Updated 9 years ago
- RelExt: A Tool for Relation Extraction from Text. 文本实体关系抽取工具。☆51Jun 9, 2022Updated 3 years ago
- Recover the seed of a Minecraft server map☆25Nov 28, 2019Updated 6 years ago
- Fetches YouTube Premium codes from Discord Inventory using tokens (supports bulk)☆11Jun 22, 2022Updated 3 years ago
- Randomizer for Dragon Quest VIII on Nintendo 3DS.☆12Aug 23, 2023Updated 2 years ago
- Sora2 Watermark Remover - AI-powered video watermark removal tool using deep learning. Built with Next.js 15, ComfyUI API & advanced comp…☆24Oct 13, 2025Updated 4 months ago
- Tianchi Competition "Forgeries and Forensics" Track 2☆69Jul 10, 2023Updated 2 years ago
- An NVIDIA Triton Server workflow for OCR and the LayoutLMv3 Transformer Model☆30Sep 14, 2022Updated 3 years ago
- ☆13Mar 3, 2023Updated 3 years ago
- Backtesting fbprophet prediction of Silver prices for 2017☆14Nov 29, 2017Updated 8 years ago
- Mikey-Sakke Crypto library and demonstration code for ECCSI/ SAKKE (RFC 6507 and 6508)☆10Jul 16, 2021Updated 4 years ago
- 机器学习使用过的API中文版及机器学习的理论知识☆13Jun 8, 2025Updated 9 months ago
- Image Tampering Detection using ELA and CNN☆220Jun 28, 2023Updated 2 years ago
- Detecting Photoshopped images with Machine Learning. Created during Data Science Retreat.☆79Jul 13, 2016Updated 9 years ago
- Implementation of the TFHE homomorphic encryption scheme.☆12May 14, 2021Updated 4 years ago
- Using tensorflow object detection api and openCV to calculate real world coordinates from top view with fixed height of the camera.☆10Jun 19, 2021Updated 4 years ago
- 用Paddle复现论文ChineseBERT: Chinese Pretraining Enhanced by Glyph and Pinyin Information(ACL2021)☆10Nov 15, 2021Updated 4 years ago
- Moiré Pattern Removal for Mobile, Texts/Diagrams on Single-colored Background☆11Feb 7, 2022Updated 4 years ago
- Very simple and fast Minecraft server status library using the Server List Ping protocol☆11Feb 12, 2023Updated 3 years ago
- deploy machine learning model in tensorflow sering and docker☆10Dec 5, 2018Updated 7 years ago
- Vichan version running on 55chan☆11Nov 6, 2024Updated last year
- A simple application to calculate similarity between two files (text document) using Smith-Waterman algorithm that is used originally to …☆10Apr 15, 2017Updated 8 years ago
- Serverless AI document extraction using Form Recognizer, Azure Functions, and Azure Blob Storage.☆11May 23, 2024Updated last year
- Identifying Skin Diseases with Deep Learning☆12Apr 30, 2018Updated 7 years ago
- A krunker.io modification☆10Jan 21, 2020Updated 6 years ago
- Python port of polygon clipping algorithm by F. Martinez et al. (with separate C++ binding)☆10Dec 18, 2020Updated 5 years ago
- FUSE based AES-CBC encrypted filesystem and encryption tool☆11Nov 12, 2017Updated 8 years ago
- This linter plugin for SublimeLinter provides an interface to go vet.☆18Apr 24, 2025Updated 10 months ago
- Flask Web Interface to deploy ManTraNet and BusterNet for testing image manipulations☆10Jan 24, 2020Updated 6 years ago
- Parses a document (scanned or phone captured) and returns the underlying question - answer layout structured capture by LayoutXLM model☆10Jun 14, 2021Updated 4 years ago
- ☆14Sep 6, 2024Updated last year
- This is a golang facial recognition project based on the go-face library.☆13Mar 22, 2024Updated last year
- ☆10Jan 3, 2019Updated 7 years ago
- ☆10Jan 15, 2019Updated 7 years ago
- chinese wwm masking and ngram masking based on jieba☆11Jul 25, 2019Updated 6 years ago
- Object tracking using pyqt5 and opencv3☆10Feb 23, 2018Updated 8 years ago
- Face Anti-spoofing demo to detect print, video replay, and mask attack by using LBP features and rPPG features.☆42Apr 3, 2019Updated 6 years ago