[ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".
☆23May 15, 2021Updated 4 years ago
Alternatives and similar repositories for WatermarkFaker
Users that are interested in WatermarkFaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27May 16, 2023Updated 2 years ago
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'☆19Nov 11, 2025Updated 5 months ago
- 🎓 Comparison of different digital image watermarking methods - DCT, DWT, SVD together with hybrids☆16Jan 11, 2021Updated 5 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆52Jul 10, 2023Updated 2 years ago
- Implementation of algorithms DCT, DWT watermarking.☆42Dec 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Oct 17, 2023Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆62Jan 15, 2023Updated 3 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Jul 15, 2021Updated 4 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117May 24, 2023Updated 2 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆26Jan 30, 2021Updated 5 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24May 21, 2022Updated 3 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Mar 3, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20May 6, 2022Updated 3 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆118Jun 25, 2024Updated last year
- Repository related to the Catch the Mark competition of the Multimedia Data Security graduate course of University of Trento, academic ye…☆31Nov 17, 2022Updated 3 years ago
- Python implementation of 'Secure Spread Spectrum Watermarking for Multimedia' (Cox et al., 1997) using Numpy, Scipy, Pillow☆11Jun 29, 2018Updated 7 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"☆32Oct 3, 2023Updated 2 years ago
- ☆21Updated this week
- Copy-Move Image Forgery Detection☆11Oct 2, 2019Updated 6 years ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Nov 14, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Group project for 11-785 Fall 2022 @ CMU☆10Dec 15, 2022Updated 3 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 5 years ago
- ☆28Mar 16, 2025Updated last year
- ☆53Jun 27, 2025Updated 10 months ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Apr 3, 2022Updated 4 years ago
- Label propagation algorithm for community detection based on node importance and label influence☆12Feb 15, 2018Updated 8 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".☆29Nov 16, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unofficial implementation of 《Towards Photo-Realistic VisibleWatermark Removal with Conditional Generative Adversarial Networks》☆12Feb 24, 2023Updated 3 years ago
- Watermarking Deep Neural Networks☆15Jul 18, 2025Updated 9 months ago
- Related medical image dataset from OpenMedLab and others.☆22Dec 26, 2023Updated 2 years ago
- Research and Implementation of Finger Vein Recognition Algorithm☆13May 10, 2021Updated 4 years ago
- zhbook 中文书籍 LaTeX 模板☆31Oct 18, 2025Updated 6 months ago
- Extract the skeleton of an binary image☆10Apr 3, 2018Updated 8 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago