Call1st0 / DFT-watermarking-methodLinks
DFT watermarking method robust to print-scan, halftoning, and other degradation attacks
☆12Updated 5 years ago
Alternatives and similar repositories for DFT-watermarking-method
Users that are interested in DFT-watermarking-method are comparing it to the libraries listed below
Sorting:
- ☆27Updated 3 years ago
- PyTorch implementation of Local Binary Convolutional Neural Network http://xujuefei.com/lbcnn.html☆47Updated 5 years ago
- Pytorch implementation of Deep Convolutional Generative Adversarial Networks (DCGAN) for humanface datasets, which can genarate some bea…☆18Updated 7 years ago
- Smartphone Identification Dataset☆13Updated last year
- Official Implementation of Convolutional Normalization: Improving Robustness and Training for Deep Neural Networks☆30Updated 3 years ago
- ☆29Updated 5 years ago
- PyTorch implementation of EdgeFool: An Adversarial Image Enhancement Filter, ICASSP2020☆26Updated 5 years ago
- Evolutionary Generative Adversarial Networks (E-GAN)☆77Updated 6 years ago
- ☆10Updated 5 years ago
- Adversarial Images for Variational Autoencoders☆13Updated 9 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 7 years ago
- [AAAI 2021] Slimmable Generative Adversarial Networks☆23Updated 3 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- ☆24Updated 6 years ago
- CNN-based fast source device identification☆24Updated 3 years ago
- ☆48Updated 8 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47Updated 4 years ago
- Local Binary Convolutional Neural Networks by pytorch☆29Updated 5 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago
- Pytorch version of the CVPR 2020 paper: Blindly Assess Image Quality in the Wild Guided by A Self-Adaptive Hyper Network☆13Updated 5 years ago
- Code for the implemenation of the Patch Augmentation technique☆11Updated 6 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Updated 4 years ago
- Light Field Messaging with Deep Photographic Steganography☆43Updated 5 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- ☆13Updated 3 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Updated 2 years ago