tinankh / ZERO
JPEG Grid Detection based on the Number of DCT Zeros and its Application to Automatic and Localized Forgery Detection
☆20Updated 2 years ago
Alternatives and similar repositories for ZERO:
Users that are interested in ZERO are comparing it to the libraries listed below
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆158Updated last year
- Python implementation of PRNU extractor☆72Updated 2 years ago
- Noiseprint, a CNN-based camera model fingerprint☆135Updated last year
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆42Updated 4 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 6 years ago
- MATLAB implementations of popular Image Forensic algorithms☆85Updated 9 years ago
- ☆15Updated 4 years ago
- ☆64Updated 6 years ago
- ☆33Updated 3 years ago
- CNN-based fast source device identification☆20Updated 2 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆102Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- ☆38Updated 4 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Updated 6 years ago
- Adversarial Learning for Constrained Image Splicing Detection and Localization based on Atrous Convolution☆52Updated 5 years ago
- ☆224Updated 5 years ago
- A collection of deep learning approaches and datasets publicly available for image forgery and deepfakes detection☆57Updated 5 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆44Updated 7 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 3 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆38Updated 6 years ago
- Groundtruth images of tampering dataset CASIA 1.0☆58Updated 3 years ago
- A python package for accessing the internal variables of JPEG file format such as DCT coefficients and quantization tables☆75Updated 5 months ago
- Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch☆118Updated 5 months ago
- ☆24Updated 4 years ago
- ☆9Updated 4 years ago
- Groundtruth images of tampering dataset CASIA 2.0☆149Updated 2 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆81Updated 4 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆30Updated last year
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 4 years ago