xyhcn / DaxingLinks
Smartphone Identification Dataset
☆12Updated last year
Alternatives and similar repositories for Daxing
Users that are interested in Daxing are comparing it to the libraries listed below
Sorting:
- CNN-based fast source device identification☆22Updated 3 years ago
- Robust Camera Trace Extraction (TIFS'23)☆11Updated 2 years ago
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆161Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆57Updated 5 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- ☆26Updated 5 years ago
- PyTorch implementation of EdgeFool: An Adversarial Image Enhancement Filter, ICASSP2020☆26Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆24Updated 4 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Updated 7 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- PyTorch implementation of saliency map-aided GAN for Auto-demosaic+denosing☆26Updated last year
- Official TensorFlow-based implementation of adversarial attack for super-resolution models☆17Updated 4 years ago
- ☆50Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆32Updated 4 years ago
- HiDDeN: Hiding Data with Deep Networks.☆100Updated 6 years ago
- Python implementation of PRNU extractor☆79Updated 2 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- A repository to caculate the just noticable difference of an image by Python☆27Updated 4 years ago
- ☆12Updated 6 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Updated 4 years ago
- Image-to-Image Translation in PyTorch☆27Updated 5 years ago
- PyTorch code for No-Reference Image Quality Assessment on KonIQ-10k☆63Updated last year
- ☆91Updated 4 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆14Updated 2 years ago
- ☆29Updated 4 years ago