JisongXie / StegaStamp_pytorchView external linksLinks
StegaStamp of pytorch version
☆71Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for StegaStamp_pytorch
Users that are interested in StegaStamp_pytorch are comparing it to the libraries listed below
Sorting:
- ☆24Mar 26, 2024Updated last year
- ☆23Nov 9, 2022Updated 3 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆415Aug 8, 2024Updated last year
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆115Jun 25, 2024Updated last year
- This is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆73Dec 7, 2022Updated 3 years ago
- Improved the original repo, 'Invisible Hyperlinks in Physical Photographs', embedded with longer string than the original☆39May 27, 2024Updated last year
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆51Mar 10, 2020Updated 5 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆33Dec 30, 2020Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆121Jun 21, 2021Updated 4 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Nov 2, 2021Updated 4 years ago
- This code is the official implementation of paper "Certifiably Robust Image Watermark".☆15Aug 7, 2024Updated last year
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆105Nov 30, 2023Updated 2 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆201Feb 9, 2022Updated 4 years ago
- ☆53Apr 24, 2023Updated 2 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Nov 15, 2022Updated 3 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆135Apr 10, 2018Updated 7 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Jun 26, 2021Updated 4 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆50Jul 10, 2023Updated 2 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆129Apr 1, 2022Updated 3 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆371Mar 23, 2023Updated 2 years ago
- HiDDeN: Hiding Data with Deep Networks.☆104Dec 12, 2018Updated 7 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆65Mar 8, 2024Updated last year
- ☆16Sep 20, 2022Updated 3 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 5 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- ☆33Jun 4, 2022Updated 3 years ago
- ☆46May 31, 2023Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆105Aug 2, 2022Updated 3 years ago
- Implement some trivial digital watermark and test its robustness☆17Apr 12, 2019Updated 6 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- try to Reproduce Pixel-anchor☆14Jan 10, 2020Updated 6 years ago
- Official implementation of Geometry Cloak [NeurIPS'24]☆24Apr 16, 2025Updated 10 months ago