xyhcn / DaxingLinks
Smartphone Identification Dataset
☆12Updated last year
Alternatives and similar repositories for Daxing
Users that are interested in Daxing are comparing it to the libraries listed below
Sorting:
- CNN-based fast source device identification☆23Updated 3 years ago
- Robust Camera Trace Extraction (TIFS'23)☆11Updated 2 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- ☆26Updated 5 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Updated 7 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆58Updated 5 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆161Updated 2 years ago
- ☆52Updated 2 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Python implementation of PRNU extractor☆79Updated 2 years ago
- Official TensorFlow-based implementation of adversarial attack for super-resolution models☆17Updated 4 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- PyTorch implementation of EdgeFool: An Adversarial Image Enhancement Filter, ICASSP2020☆26Updated 5 years ago
- A repository to caculate the just noticable difference of an image by Python☆27Updated 4 years ago
- HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection☆13Updated 10 months ago
- ☆29Updated 5 years ago
- Implementation of “Localization of Deep Inpainting Using High-Pass Fully Convolutional Network”☆30Updated 3 years ago
- ☆49Updated 2 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆14Updated 2 years ago
- HiDDeN: Hiding Data with Deep Networks.☆100Updated 6 years ago
- ☆21Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Updated 4 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- ☆33Updated 3 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆24Updated 4 years ago