EQuiw / 2019-scalingattackLinks
Image-Scaling Attacks and Defenses
β185Updated 2 years ago
Alternatives and similar repositories for 2019-scalingattack
Users that are interested in 2019-scalingattack are comparing it to the libraries listed below
Sorting:
- Preimage attack against NeuralHash π£β673Updated 3 months ago
- building the next-gen watermark with deep learning.β185Updated 4 years ago
- β22Updated 4 years ago
- π₯π₯Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networksβ345Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning π±β149Updated 3 months ago
- π Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on iβ¦β106Updated 4 years ago
- PyTorch Implementation of "Lossless Image Compression through Super-Resolution"β1,054Updated 2 years ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Imagesβ¦β141Updated 2 years ago
- β1,023Updated 3 years ago
- PyTorch implementation of DCGAN, WGAN-GP and SNGAN.β229Updated 3 years ago
- Testing the effectiveness of practical implementations of adversarial examples against facial recognition.β137Updated 10 months ago
- Privacy Testing for Deep Learningβ211Updated 4 months ago
- Black-Box Adversarial Attack on Public Face Recognition Systemsβ415Updated 4 years ago
- Code for the paper: CNN-generated images are surprisingly easy to spot... for now https://peterwang512.github.io/CNNDetection/β977Updated last year
- Perceptual hashing tools for detecting child sexual abuse materialβ194Updated last month
- DeepPrivacy: A Generative Adversarial Network for Face Anonymizationβ1,305Updated 2 years ago
- Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNetβ1,232Updated last year
- β33Updated 5 years ago
- A simple and accurate method to fool deep neural networksβ362Updated 5 years ago
- ARMORY Adversarial Robustness Evaluation Test Bedβ187Updated last year
- AdvHat: Real-world adversarial attack on ArcFace Face ID systemβ337Updated 4 years ago
- β135Updated 4 years ago
- A light version of Tor portable to the browserβ120Updated 5 years ago
- Steps towards physical adversarial attacks on facial recognitionβ84Updated 2 years ago
- β130Updated 4 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networksβ134Updated 7 years ago
- Hiding Images within other images using Deep Learningβ209Updated 7 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning modelsβ84Updated 2 years ago
- Invisible Hyperlinks in Physical Photographsβ808Updated 2 years ago
- An adversarial robustness evaluation library on face recognition.β114Updated 2 years ago