GithubHelp home page GithubHelp logo

nhsjgczryf / tampering-detection-and-localization Goto Github PK

View Code? Open in Web Editor NEW

This project forked from grasses/tampering-detection-and-localization

1.0 0.0 0.0 11.06 MB

Code for Paper "Image Tampering Detection and Localization via Reliability Fusion Map"

License: GNU General Public License v3.0

Jupyter Notebook 78.65% Python 21.35%

tampering-detection-and-localization's Introduction

Reliability Fusing Map (RFM)

This repository is implementation of "Image Tampering Detection and Localization via Reliability Fusion Map” (RFM). The main contributions are summarized as follows (1) obtaining higher accuracy; (2) reducing computational complexity of clustering; (3) improving localization fineness from 64 x 64 to 32 x 32.


Prerequisites

  • tensorflow == 1.7.0
  • pandas == 0.23.4
  • scipy == 1.1.0
  • sklearn == 0.19.2
  • matplotlib == 2.2.3
  • Pillow == 5.2.0

Usage

  • Run pretrain model:
  1. You can download pretrain model at: Baidu disk, password=mxqr Google drive

    put unzip folder into code/model/{scope_name}, see {scope_name} in code.config.py

  2. Run pre-train test using command:

    python main.py --code.config --action test

    where code.config.py is config file including CNN architecture, dataset name, and so on.

    The CNN module pre-train output is a csv file, which format with:

    {f1,f2,f3...,predict_label,true_label,quality_factory}, where f1,f2... is CNN confidence of each camera model.

  3. Post-train in experiment folder



  • You can train your personal pretrain model:
  1. Download Drensden dataset into /code/dataset

    python main.py --code.config --action download --name Dresden

  2. Generate a tensorflow records file:

    python main.py --code.config --action generator

  3. For training process, running command:

    python main.py --conf code.config --action train

  4. Making your personal tampering dataset:

    python main.py --conf code.config --action splicing


Result

Results of comparative experiment with method proposed by Bondi et al. and our RFM method. (a)-(c) illustrates cover image, forged image, and ground truth image. (d) and (e) illustrates first iteration and output of RFM algorithm, (f) show result of Bondi et al.

Results of comparative experiment with method proposed by Bondi et al. and our RFM method. (a)-(c) illustrates cover image, forged image, and ground truth image. (d) and (e) illustrates result of cover image and forged image with RFM algorithm, (f) show result of Bondi et al. We improve localization fineness from 64 x 64 to 32 x 32 (see (e) and (f)).


License

This library is under the GPL V3 license. For the full copyright and license information, please view the LICENSE file that was distributed with this source code.

tampering-detection-and-localization's People

Stargazers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.