[ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".
☆23May 15, 2021Updated 4 years ago
Alternatives and similar repositories for WatermarkFaker
Users that are interested in WatermarkFaker are comparing it to the libraries listed below
Sorting:
- ☆27May 16, 2023Updated 2 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- 🎓 Comparison of different digital image watermarking methods - DCT, DWT, SVD together with hybrids☆15Jan 11, 2021Updated 5 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆61Jan 15, 2023Updated 3 years ago
- ☆21Sep 16, 2024Updated last year
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'☆18Nov 11, 2025Updated 3 months ago
- ☆16Jul 17, 2022Updated 3 years ago
- Detection of copy-move forgery in an image with CMDF methods. (SIFT, SURF, AKAZE, RANSAC)☆39Mar 2, 2025Updated last year
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117May 24, 2023Updated 2 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆50Jul 10, 2023Updated 2 years ago
- ☆22Sep 16, 2022Updated 3 years ago
- ☆20May 6, 2022Updated 3 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Dec 6, 2023Updated 2 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆25Jun 14, 2024Updated last year
- Media Forensics / Fake Detection experiments in PyTorch. Implements Fighting Fake News: Image Splice Detection via Learned Self-Consisten…☆25Sep 19, 2021Updated 4 years ago
- ☆24Apr 14, 2019Updated 6 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆115Jun 25, 2024Updated last year
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- Code of masked relation learning for deepfake detection☆29May 25, 2024Updated last year
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆37May 26, 2025Updated 9 months ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆25Jan 30, 2021Updated 5 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Repository related to the Catch the Mark competition of the Multimedia Data Security graduate course of University of Trento, academic ye…☆31Nov 17, 2022Updated 3 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 2 weeks ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆32Oct 3, 2023Updated 2 years ago
- ☆12May 6, 2022Updated 3 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- The official repository of Real Text Manipulation (RTM)☆43Mar 18, 2025Updated 11 months ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- This is the basic django app that extracts text from an image into a .txt and .csv file. In simple words this is OCR web app. The text in…☆11Nov 22, 2022Updated 3 years ago
- [IEEE TIP] Offical implementation for the work "BadCM: Invisible Backdoor Attack against Cross-Modal Learning".☆14Aug 30, 2024Updated last year
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago