etfovac / watermarkLinks
Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%).
☆14Updated last year
Alternatives and similar repositories for watermark
Users that are interested in watermark are comparing it to the libraries listed below
Sorting:
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Updated 4 years ago
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Updated 2 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- ☆20Updated 2 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆15Updated 9 months ago
- ☆23Updated 6 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- Adversarial Augmentation Against Adversarial Attacks☆32Updated 2 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Updated 2 years ago
- This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative t…☆24Updated 10 months ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Updated 4 years ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆117Updated 2 years ago
- ☆26Updated 3 years ago
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated 3 months ago
- Code of the paper: A Recipe for Watermarking Diffusion Models☆154Updated last year
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Updated 4 years ago
- ☆19Updated last year
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- Privacy backdoors☆52Updated last year
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆66Updated last year
- ☆15Updated 9 months ago
- ☆43Updated 2 years ago
- ☆21Updated 3 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Updated 5 years ago
- (ICLR 2023 Spotlight) MPCFormer: fast, performant, and private transformer inference with MPC☆102Updated 2 years ago
- ☆49Updated 4 years ago