└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Manipulation-Detection 2 | Tampering detection related sources 3 | 4 | *** 5 | # Code Source 6 | 1.lllumination estimation 7 | 8 | https://github.com/bomb2peng/CASIA_3Dlighting 9 | 10 | https://github.com/lorecioni/ImageSplicingDetection 11 | 12 | 2.Resampling and rotation detection 13 | 14 | https://sites.google.com/site/rewindpolimi/downloads/tools/multimedia-resampling-footprint-detector 15 | 16 | https://github.com/ChenglongChen/image-rotation-angle-estimation 17 | 18 | https://github.com/0x09/resdet 19 | 20 | 3.Inpainting detection 21 | 22 | https://github.com/antoinewdg/inpainting-detection 23 | 24 | 4.Splicing detection 25 | 26 | https://github.com/minyoungg/selfconsistency/tree/master/lib 27 | 28 | 5.Copy-move detection 29 | 30 | https://github.com/isi-vista/BusterNet 31 | 32 | 6.SRM feature extraction 33 | 34 | http://dde.binghamton.edu/download/ 35 | 36 | 7.Multi-scale method 37 | 38 | https://github.com/pkorus/jpeg-mbfdf-forensics 39 | 40 | https://github.com/pkorus/multiscale-prnu 41 | 42 | 8.General methods 43 | 44 | https://github.com/MKLab-ITI/image-forensics 45 | 46 | 9.CNN networks 47 | 48 | https://github.com/PeterWang512/FALdetector 49 | 50 | https://github.com/ISICV/ManTraNet 51 | 52 | PS: There are some other code sources are not listed, you can find them from the group websites listed below. 53 | 54 | # Awesome Groups and Scholars 55 | 1.MKlab 56 | 57 | https://mklab.iti.gr/ 58 | 59 | 2.GPSC David Vázquez-Padín 60 | 61 | http://gpsc.uvigo.es/user/79/ 62 | 63 | 3.Department of Computer Science 5 64 | 65 | https://www5.cs.fau.de/research/groups/computer-vision/image-forensics/ 66 | 67 | 4.Multimedia & Information Security Lab (MISL) 68 | 69 | https://gitlab.com/MISLgit 70 | 71 | 5.GRIP 72 | 73 | http://www.grip.unina.it/research/83-image-forensics.html 74 | 75 | 6.Rewind 76 | 77 | https://sites.google.com/site/rewindpolimi/home 78 | 79 | 7.Jessica J Fridrich 80 | 81 | http://www.ws.binghamton.edu/fridrich/ 82 | 83 | 8.Eric Kee 84 | 85 | http://www.erickee.com/ 86 | 87 | 9.Heny Farid 88 | 89 | https://farid.berkeley.edu/ 90 | 91 | 10.Siwei Lyu 92 | 93 | http://www.cs.albany.edu/~lsw/index.html 94 | 95 | 11 Paweł Korus 96 | 97 | http://kt.agh.edu.pl/~korus/ 98 | 99 | 12.中科院自动化所智能感知与计算研究中心 Dong Jing, Wang Wei 100 | 101 | http://cripac.ia.ac.cn/CN/column/item128.shtml 102 | 103 | 13.北京交通大学 Ni Rongrong 104 | 105 | http://scit.bjtu.edu.cn/cms/staff/7782/?cat=12 106 | 107 | 14.深圳大学 Huang Jiwu 108 | 109 | http://cie.szu.edu.cn/szucie/index.php/archives/144.html 110 | 111 | 112 | # Related Datasets 113 | 1.CASIA 114 | 115 | https://www.kaggle.com/sophatvathana/casia-dataset/version/1 116 | 117 | 2.Columbia Splicing Dataset 118 | 119 | http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/dlform.html 120 | 121 | 3.PS Battle Dataset 122 | 123 | https://github.com/dbisUnibas/PS-Battles 124 | 125 | 4.Realistic Tample Dataset 126 | 127 | http://kt.agh.edu.pl/~korus/downloads/dataset-realistic-tampering/ 128 | 129 | 5.IEEE IFS-TC Image Forensics Challenge 130 | 131 | http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=5 132 | 133 | 6.Image Manipulation Dataset 134 | 135 | http://www5.cs.fau.de/research/data/image-manipulation/ 136 | 137 | 7.Dresden 138 | 139 | http://forensics.inf.tu-dresden.de/ddimgdb/ 140 | 141 | 8.CoMoFoD 142 | 143 | http://www.vcl.fer.hr/comofod/comofod.html 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | --------------------------------------------------------------------------------