etfovac / watermarkLinks
Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%). 
☆14Updated last year
Alternatives and similar repositories for watermark
Users that are interested in watermark are comparing it to the libraries listed below
Sorting:
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
 - This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
 - Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
 - Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Updated 2 years ago
 - Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
 - Adversarial Augmentation Against Adversarial Attacks☆32Updated 2 years ago
 - This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Updated 4 years ago
 - Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆116Updated 2 years ago
 - extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 5 years ago
 - Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆20Updated 3 years ago
 - Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
 - [ICLR 2025] Permute-and-Flip: An optimally robust and watermarkable decoder for LLMs☆19Updated 7 months ago
 - This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆13Updated 2 years ago
 - ☆33Updated 3 years ago
 - ☆34Updated 3 years ago
 - ☆19Updated last year
 - Copy-move forgery detection using SIFT features (Amerini et al, TIFS 2011)☆22Updated 2 years ago
 - ☆26Updated 3 years ago
 - This code is the official implementation of WEvade.☆41Updated last year
 - Official Implementation of the CVPR'23 paper 'Regularization of polynomial networks for image recognition'.☆10Updated 2 years ago
 - This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Updated 11 months ago
 - Code of the paper: A Recipe for Watermarking Diffusion Models☆152Updated 11 months ago
 - ☆20Updated 2 years ago
 - ☆23Updated 6 years ago
 - The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
 - [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Updated 2 years ago
 - Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
 - Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆76Updated 2 years ago
 - [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆13Updated 8 months ago
 - PyTorch reimplementation of the paper "HyperMixer: An MLP-based Green AI Alternative to Transformers" [arXiv 2022].☆17Updated 3 years ago