[ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".
β23May 15, 2021Updated 4 years ago
Alternatives and similar repositories for WatermarkFaker
Users that are interested in WatermarkFaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'β19Nov 11, 2025Updated 4 months ago
- π Comparison of different digital image watermarking methods - DCT, DWT, SVD together with hybridsβ15Jan 11, 2021Updated 5 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.β51Jul 10, 2023Updated 2 years ago
- Implementation of algorithms DCT, DWT watermarking.β42Dec 16, 2023Updated 2 years ago
- Detection of copy-move forgery in an image with CMDF methods. (SIFT, SURF, AKAZE, RANSAC)β39Mar 2, 2025Updated last year
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attackβ33Oct 17, 2023Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.β61Jan 15, 2023Updated 3 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLPβ13Aug 17, 2023Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".β117May 24, 2023Updated 2 years ago
- β16Dec 3, 2021Updated 4 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).β24May 21, 2022Updated 3 years ago
- This repository contains code for AdvEWM, as detailed in our paper published in JISAβ18Mar 3, 2026Updated 3 weeks ago
- β20May 6, 2022Updated 3 years ago
- Repository related to the Catch the Mark competition of the Multimedia Data Security graduate course of University of Trento, academic yeβ¦β31Nov 17, 2022Updated 3 years ago
- β18Nov 13, 2021Updated 4 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Backβ¦β22Sep 8, 2021Updated 4 years ago
- β22Sep 16, 2022Updated 3 years ago
- Code for "A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection"β32Oct 3, 2023Updated 2 years ago
- β21Sep 16, 2024Updated last year
- a digital rights management system based on DWT/LSB steganography and blockchainβ15Nov 14, 2022Updated 3 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"β11Apr 22, 2021Updated 4 years ago
- β54Jun 27, 2025Updated 8 months ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHYβ10Dec 19, 2019Updated 6 years ago
- This repository was created as an implementation approach for a project on "Watermarking Deep Neural Networks".β29Nov 16, 2020Updated 5 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NCβ111Mar 11, 2024Updated 2 years ago
- Watermarking Deep Neural Networksβ15Jul 18, 2025Updated 8 months ago
- This is my master's thesis , it research about watermarking based on DWT frequency domainβ10May 9, 2018Updated 7 years ago
- This is a project for watermarking using DWT and SVDγβ19May 30, 2018Updated 7 years ago
- zhbook δΈζδΉ¦η± LaTeX 樑ζΏβ30Oct 18, 2025Updated 5 months ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)β44Oct 1, 2022Updated 3 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)β26Jun 14, 2024Updated last year
- β16Feb 19, 2022Updated 4 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).β122Jun 21, 2021Updated 4 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Feiβ422Aug 8, 2024Updated last year
- Learn to Design a New Font by Fusing Different Calligraphyβ12Mar 23, 2022Updated 4 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.β26Jul 22, 2023Updated 2 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".β14Oct 17, 2022Updated 3 years ago
- β20Aug 7, 2023Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Featuresβ38Feb 19, 2022Updated 4 years ago