MengxiGuo / A-Novel-Two-stage-Separable-Deep-Learning-Framework-for-Practical-Blind-WatermarkingView external linksLinks
The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"
☆51Mar 10, 2020Updated 5 years ago
Alternatives and similar repositories for A-Novel-Two-stage-Separable-Deep-Learning-Framework-for-Practical-Blind-Watermarking
Users that are interested in A-Novel-Two-stage-Separable-Deep-Learning-Framework-for-Practical-Blind-Watermarking are comparing it to the libraries listed below
Sorting:
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆115Jun 25, 2024Updated last year
- This is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆73Dec 7, 2022Updated 3 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆33Dec 30, 2020Updated 5 years ago
- Distortion Agnostic watermarking based on DCT-Based Transformer☆13Dec 13, 2022Updated 3 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆50Jul 10, 2023Updated 2 years ago
- ☆54Jun 27, 2025Updated 7 months ago
- ☆17Jul 23, 2022Updated 3 years ago
- ☆23Nov 9, 2022Updated 3 years ago
- ☆53Apr 24, 2023Updated 2 years ago
- A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression☆25Jun 29, 2024Updated last year
- StegaStamp of pytorch version☆71Oct 31, 2023Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆14Oct 17, 2022Updated 3 years ago
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'☆18Nov 11, 2025Updated 3 months ago
- DWT image watermarking☆17Apr 27, 2017Updated 8 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆50Nov 16, 2022Updated 3 years ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆117Jan 23, 2023Updated 3 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆100Sep 27, 2022Updated 3 years ago
- This is the code for: Fang, Han, et al. "Screen-shooting resilient watermarking." IEEE Transactions on Information Forensics and Security…☆23Dec 5, 2022Updated 3 years ago
- Embed Data Into a Picture reversibly using difference expansion☆10Dec 20, 2013Updated 12 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆129Apr 1, 2022Updated 3 years ago
- ☆27May 16, 2023Updated 2 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- ☆57Nov 20, 2020Updated 5 years ago
- Robust video watermarking with non-differentiable adversaries.☆313Oct 12, 2021Updated 4 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆38Jan 2, 2026Updated last month
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆19Dec 6, 2021Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- Code for "JPEG-resistant Adversarial Images"☆43Apr 25, 2018Updated 7 years ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Dec 2, 2021Updated 4 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- ☆23Oct 4, 2024Updated last year
- ☆93Mar 23, 2021Updated 4 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Nov 15, 2022Updated 3 years ago
- Audio Watermark using DWT-DCT approach and scrambling image for embedding of binary or grayscale image into audio signal☆28Apr 9, 2020Updated 5 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago