EQuiw / 2019-scalingattack
Image-Scaling Attacks and Defenses
β178Updated last year
Related projects β
Alternatives and complementary repositories for 2019-scalingattack
- β22Updated 3 years ago
- Preimage attack against NeuralHash π£β671Updated last year
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.β136Updated 3 years ago
- π Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on iβ¦β105Updated 3 years ago
- duralava is a neural network which can simulate a lava lamp in an infinite loop.β90Updated last year
- A PyTorch implementation of image steganography utilizing deep convolutional neural networksβ119Updated 6 years ago
- building the next-gen watermark with deep learning.β182Updated 3 years ago
- Making In-Browser perceptual ad-blocking practical with Deep Learningβ55Updated 4 years ago
- Protect your machine learning models easily and securely with watermarking πβ91Updated 7 months ago
- Privacy Testing for Deep Learningβ189Updated last year
- β32Updated 4 years ago
- β83Updated last year
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β151Updated last year
- π Play snake using your face! β¬ οΈπβ‘οΈβ117Updated 3 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning modelsβ74Updated last year
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Imagesβ¦β139Updated 11 months ago
- β79Updated 3 years ago
- πΏοΈsome awesome Steganalysisβ33Updated 6 years ago
- Steps towards physical adversarial attacks on facial recognitionβ80Updated last year
- β30Updated 7 years ago
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.β225Updated 2 years ago
- Invisible Hyperlinks in Physical Photographsβ695Updated 11 months ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.β117Updated 2 years ago
- rot13 for the Unicode generationβ124Updated last year
- β15Updated last year
- Implementation of the Biased Boundary Attack for ImageNetβ23Updated 5 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize β¦β57Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning π±β143Updated last month