etfovac / watermarkLinks
Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%).
☆13Updated last year
Alternatives and similar repositories for watermark
Users that are interested in watermark are comparing it to the libraries listed below
Sorting:
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆32Updated last year
- This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Updated 4 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 5 years ago
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Updated 2 years ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆113Updated 2 years ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆20Updated 3 years ago
- ☆19Updated last year
- Adversarial Augmentation Against Adversarial Attacks☆31Updated 2 years ago
- ☆32Updated 3 years ago
- ☆20Updated 2 years ago
- ☆33Updated 3 years ago
- This code is the official implementation of WEvade.☆40Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆148Updated 8 months ago
- Watermarking Deep Neural Networks (USENIX 2018)☆98Updated 4 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆13Updated last year
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆66Updated 4 years ago
- ☆14Updated 5 months ago
- The Hybrid Fake Face (HFF) dataset is built by exploiting the PGGAN, StyleGAN, Glow, and StarGAN.☆16Updated last year
- HiDDeN: Hiding Data with Deep Networks.☆97Updated 6 years ago
- Official Implementation of "Style Generator Inversion for Image Enhancement and Animation".☆13Updated 3 years ago
- 40 face attributes prediction on CelebA benchmark with PyTorch Implementation.☆20Updated 3 years ago
- Official code for DefakeHop: A Light-Weight High-Performance Deepfake Detector☆78Updated 2 years ago
- code share for paper InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance☆30Updated 2 months ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆61Updated 4 years ago
- ☆22Updated 5 years ago
- Robust Principles: Architectural Design Principles for Adversarially Robust CNNs☆24Updated last year
- Zero-Shot Detection of AI-Generated Images☆64Updated 10 months ago