daniellerch / python-jpeg-toolbox
The JPEG toolbox for Python
☆12Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for python-jpeg-toolbox
- Code for "JPEG-resistant Adversarial Images"☆40Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 2 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 4 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Updated 6 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆31Updated last year
- Universal Adversarial Networks☆33Updated 6 years ago
- ☆48Updated last year
- Implementation of several Steganography and steganalysis techniques.☆44Updated last year
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Updated 4 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- Light Field Messaging with Deep Photographic Steganography☆41Updated 4 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆56Updated last year
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆56Updated 3 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆52Updated 4 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 3 years ago
- Code for FAB-attack☆32Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Updated 4 years ago
- Code from my research papers☆12Updated 2 years ago
- ☆26Updated 2 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆13Updated 2 years ago
- ☆19Updated 2 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- Hiding Images in Plain Sight: Deep Steganography☆35Updated 6 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18Updated 2 years ago
- Data independent universal adversarial perturbations☆60Updated 4 years ago
- Companion code for the paper "Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks" by Yatsura et a…☆8Updated 3 years ago
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆68Updated last year
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago