no code implementations • 26 May 2021 • João P. Cardenuto, Anderson Rocha
To mitigate this bottleneck, we present an extendable open-source library that reproduces the most common image forgery operations reported by the research integrity community: duplication, retouching, and cleaning.