[ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'
☆13May 5, 2025Updated 11 months ago
Alternatives and similar repositories for Hidden-in-the-Noise
Users that are interested in Hidden-in-the-Noise are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆72Mar 6, 2025Updated last year
- Official PyTorch implementation of "Shallow Diffuse: Robust and Invisible Watermarking through Low-Dimensional Subspaces in Diffusion Mod…☆25May 14, 2025Updated 10 months ago
- [ICCV 2025] Official implementation of 'SEAL: Semantic Aware Image Watermarking'☆20Apr 12, 2025Updated 11 months ago
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆28Feb 17, 2025Updated last year
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆59Dec 5, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆39Mar 9, 2025Updated last year
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆37Oct 30, 2024Updated last year
- 🚜 METR: Message Enhanced Tree-Ring☆21Aug 19, 2024Updated last year
- ☆12Sep 14, 2023Updated 2 years ago
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated 2 years ago
- ☆39Aug 30, 2024Updated last year
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆138May 15, 2024Updated last year
- [ICLR 2025] VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking (Official Implementation)☆54May 30, 2025Updated 10 months ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆352Mar 21, 2024Updated 2 years ago
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆34Nov 19, 2025Updated 4 months ago
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- StegTransX: A Lightweight Deep Steganography Method for High-Capacity Hiding and JPEG Compression Resistance☆18May 18, 2025Updated 10 months ago
- Official implementation of the paper "The Stable Signature Rooting Watermarks in Latent Diffusion Models"☆506Dec 16, 2025Updated 3 months ago
- ☆11Nov 27, 2024Updated last year
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆99Sep 15, 2024Updated last year
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Stable-Sim2Real: Exploring Simulation of Real-Captured 3D Data with Two-Stage Depth Diffusion (ICCV 2025 Highlight)☆29Mar 15, 2026Updated 3 weeks ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- Official PyTorch implementation of "MM-PoisonRAG: Disrupting Multimodal RAG with Local and Global Poisoning Attacks"☆12Dec 4, 2025Updated 4 months ago
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 6 months ago
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆12Sep 7, 2018Updated 7 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- ☆26Oct 9, 2025Updated 6 months ago
- [ICML 2025] GaussMarker: Robust Dual-Domain Watermarks for Diffusion Models☆13Sep 18, 2025Updated 6 months ago
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code of the paper: A Recipe for Watermarking Diffusion Models☆152Nov 13, 2024Updated last year
- ☆15Jun 26, 2023Updated 2 years ago
- [ICML 2024] Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models☆24Sep 12, 2024Updated last year
- 离线的LLM文本隐写程序。Offline LLM text steganography program.☆21Sep 7, 2025Updated 7 months ago
- Fairness in LLMs resources☆39Mar 20, 2026Updated 2 weeks ago
- django考勤管理系统☆13Apr 22, 2018Updated 7 years ago
- 波士顿房价数据集☆15Jan 22, 2022Updated 4 years ago