Kasraarabi / Hidden-in-the-NoiseView external linksLinks
[ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'
☆13May 5, 2025Updated 9 months ago
Alternatives and similar repositories for Hidden-in-the-Noise
Users that are interested in Hidden-in-the-Noise are comparing it to the libraries listed below
Sorting:
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆26Feb 17, 2025Updated last year
- Official PyTorch implementation of "Shallow Diffuse: Robust and Invisible Watermarking through Low-Dimensional Subspaces in Diffusion Mod…☆22May 14, 2025Updated 9 months ago
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆69Mar 6, 2025Updated 11 months ago
- ☆12Sep 14, 2023Updated 2 years ago
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆57Dec 5, 2024Updated last year
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆36Oct 30, 2024Updated last year
- [ICCV 2025] Official implementation of 'SEAL: Semantic Aware Image Watermarking'☆19Apr 12, 2025Updated 10 months ago
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆39Mar 9, 2025Updated 11 months ago
- 🚜 METR: Message Enhanced Tree-Ring☆21Aug 19, 2024Updated last year
- ☆39Aug 30, 2024Updated last year
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆135May 15, 2024Updated last year
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated last year
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆33Nov 19, 2025Updated 2 months ago
- StegTransX: A Lightweight Deep Steganography Method for High-Capacity Hiding and JPEG Compression Resistance☆17May 18, 2025Updated 9 months ago
- ☆340Mar 21, 2024Updated last year
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- 波士顿房价数据集☆14Jan 22, 2022Updated 4 years ago
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆10Sep 7, 2018Updated 7 years ago
- [ICLR 2025] VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking (Official Implementation)☆51May 30, 2025Updated 8 months ago
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆97Sep 15, 2024Updated last year
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 5 months ago
- ☆11Nov 27, 2024Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 2 months ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- Implementation of reflection symmetry in convolutional layers (Tensorflow 1.X)☆13Oct 15, 2020Updated 5 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- Official implementation of the paper "The Stable Signature Rooting Watermarks in Latent Diffusion Models"☆494Dec 16, 2025Updated 2 months ago
- django考勤管理系统☆13Apr 22, 2018Updated 7 years ago
- Quantifying Differential Privacy under Temporal Correlations☆12May 13, 2023Updated 2 years ago
- 本项目实现自《差分隐私下满足一致性的轨迹流量发布方法》,作者蔡剑平☆12Sep 2, 2019Updated 6 years ago
- 离线的LLM文本隐写程序。Offline LLM text steganography program.☆21Sep 7, 2025Updated 5 months ago
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- ☆15Jun 26, 2023Updated 2 years ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Nov 14, 2022Updated 3 years ago
- The code of "dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis"☆23Apr 5, 2024Updated last year
- An implementation of "Data Synthesis via Differentially Private Markov Random Fields"☆15Apr 2, 2024Updated last year