dl970220 / Reversible-Image-Watermarking-Using-Interpolation-Technique
可逆水印论文复现
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reversible-Image-Watermarking-Using-Interpolation-Technique
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆27Updated 3 years ago
- From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper☆20Updated 2 years ago
- ☆22Updated 3 years ago
- ☆16Updated 7 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆17Updated last year
- Reversible Data Hiding in Color Image With Grayscale Invariance☆28Updated last year
- This is the code for: Fang, Han, et al. "Screen-shooting resilient watermarking." IEEE Transactions on Information Forensics and Security…☆16Updated last year
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 3 years ago
- ☆14Updated 2 years ago
- ☆78Updated 3 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆28Updated last year
- Distortion Agnostic watermarking based on DCT-Based Transformer☆12Updated last year
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆85Updated 4 months ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Updated 2 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆18Updated 11 months ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Updated 4 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆40Updated 4 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆20Updated 2 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆103Updated last year
- 联邦学习隐私保护综述☆31Updated 3 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆12Updated last year
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆54Updated 3 years ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆45Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 2 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆88Updated 2 years ago
- FangHanNUS / PIMoG-An-Effective-Screen-shooting-Noise-Layer-Simulation-for-Deep-Learning-Based-Watermarking-NetwThis is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆59Updated last year
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆17Updated 3 years ago
- [ICLR2024] "Backdoor Federated Learning by Poisoning Backdoor-Critical Layers"☆17Updated 9 months ago
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆26Updated last year