dl970220 / Reversible-Image-Watermarking-Using-Interpolation-Technique
可逆水印论文复现
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reversible-Image-Watermarking-Using-Interpolation-Technique
- ☆16Updated 7 years ago
- ☆14Updated 2 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆27Updated 3 years ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Updated 2 years ago
- Distortion Agnostic watermarking based on DCT-Based Transformer☆12Updated last year
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆29Updated last year
- A Siamese CNN for Image Steganalysis☆64Updated 4 years ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆45Updated 4 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆16Updated 3 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆17Updated last year
- ☆31Updated 2 years ago
- From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper☆20Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆49Updated last year
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆12Updated 3 years ago
- Hiding Images in Plain Sight: Deep Steganography☆35Updated 6 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆48Updated 2 months ago
- ☆22Updated 3 years ago
- paper code☆22Updated 4 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Updated 3 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆11Updated 4 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆86Updated 4 months ago
- ☆46Updated 8 months ago
- This is the code for: Fang, Han, et al. "Screen-shooting resilient watermarking." IEEE Transactions on Information Forensics and Security…☆16Updated last year
- FangHanNUS / PIMoG-An-Effective-Screen-shooting-Noise-Layer-Simulation-for-Deep-Learning-Based-Watermarking-NetwThis is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆60Updated last year
- ☆34Updated 3 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆55Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆104Updated last year
- Code for paper: "PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification", IEEE S&P 2024.☆28Updated 3 months ago
- ☆54Updated 11 months ago