xyhcn / DaxingLinks
Smartphone Identification Dataset
☆12Updated last year
Alternatives and similar repositories for Daxing
Users that are interested in Daxing are comparing it to the libraries listed below
Sorting:
- Robust Camera Trace Extraction (TIFS'23)☆11Updated last year
- [CVPR'19, ICLR'20] A Python toolbox for modeling and optimization of photo acquisition & distribution pipelines (camera ISP, compression,…☆161Updated 2 years ago
- CNN-based fast source device identification☆22Updated 3 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Updated 7 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆56Updated 5 years ago
- ☆26Updated 5 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Updated 4 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection☆13Updated 8 months ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- Python implementation of PRNU extractor☆78Updated 2 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Updated 6 years ago
- Web Photo Source Identification based on Neural Enhanced Camera Fingerprint (WWW2023)☆14Updated 2 years ago
- PyTorch implementation of EdgeFool: An Adversarial Image Enhancement Filter, ICASSP2020☆26Updated 5 years ago
- ☆50Updated 2 years ago
- A repository to caculate the just noticable difference of an image by Python☆27Updated 4 years ago
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆24Updated 4 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- PyTorch code for No-Reference Image Quality Assessment on KonIQ-10k☆63Updated last year
- ☆91Updated 4 years ago
- ☆23Updated 6 years ago
- Official TensorFlow-based implementation of adversarial attack for super-resolution models☆17Updated 4 years ago
- ☆29Updated 4 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Updated 2 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆39Updated 7 years ago
- ☆22Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago
- HiDDeN: Hiding Data with Deep Networks.☆98Updated 6 years ago
- StegaStamp of pytorch version☆65Updated last year