ahchang98 / image-encryption-scheme-attacks
Attacks against proposed image encryption schemes
☆10Updated 4 years ago
Alternatives and similar repositories for image-encryption-scheme-attacks:
Users that are interested in image-encryption-scheme-attacks are comparing it to the libraries listed below
- StegaStamp of pytorch version☆62Updated last year
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆46Updated 4 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆46Updated 2 years ago
- A general approach for using deep neural network for digital watermarking☆14Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆31Updated 5 years ago
- Code for "JPEG-resistant Adversarial Images"☆41Updated 6 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆11Updated 2 years ago
- ☆84Updated 3 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 5 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 7 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆55Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 2 years ago
- ☆20Updated 2 years ago
- Steganography via adversarial training☆14Updated 6 years ago
- A Siamese CNN for Image Steganalysis☆69Updated 4 years ago
- ☆50Updated last year
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆59Updated 3 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆29Updated 4 years ago
- PyTorch implementation of Spatially Transformed Adversarial Examples☆22Updated last year
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆50Updated 4 years ago
- ☆28Updated 4 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆37Updated 2 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆88Updated 2 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆19Updated last year
- ☆39Updated 2 years ago
- This code is the official implementation of WEvade.☆38Updated 11 months ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆109Updated last year
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆31Updated last year
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆26Updated 2 years ago