Mhzzzzz / ADG-steganographyLinks
☆27Updated 4 years ago
Alternatives and similar repositories for ADG-steganography
Users that are interested in ADG-steganography are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 years ago
- ☆25Updated 5 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- ☆20Updated 4 years ago
- ☆11Updated 7 months ago
- ☆23Updated 5 years ago
- ☆12Updated 2 months ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 5 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 6 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- Implementation of several Steganography and steganalysis techniques.☆49Updated 2 weeks ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago
- ☆14Updated last year
- ☆13Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Updated 2 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆19Updated 3 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- Watermarking Text Generated by Black-Box Language Models☆39Updated last year
- Provably Secure Steganography☆12Updated last month
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆44Updated 11 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆102Updated 3 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆196Updated 2 years ago
- ☆22Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- Robust natural language watermarking using invariant features☆26Updated 2 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago