etfovac / watermarkLinks
Robustness of DWT vs DCT is graded based on the quality of extracted watermark. The measure used is the Correlation coefficient (0-100%).
☆14Updated 2 years ago
Alternatives and similar repositories for watermark
Users that are interested in watermark are comparing it to the libraries listed below
Sorting:
- This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Updated 4 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 3 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆33Updated 2 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- Adversarial Augmentation Against Adversarial Attacks☆32Updated 2 years ago
- Implementation of 'A Watermark for Large Language Models' paper by Kirchenbauer & Geiping et. al.☆24Updated 2 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆70Updated 5 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Updated 2 years ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Updated 4 years ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆117Updated 3 years ago
- This dataset contains results from all rounds of Adversarial Nibbler. This data includes adversarial prompts fed into public generative t…☆25Updated 11 months ago
- Code for "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink" (CVPR 2021)☆34Updated 4 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- ☆93Updated 4 years ago
- ☆57Updated 5 years ago
- Code of the paper: A Recipe for Watermarking Diffusion Models☆155Updated last year
- ☆24Updated 6 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- Developing adversarial examples and showing their semantic generalization for the OpenAI CLIP model (https://github.com/openai/CLIP)☆26Updated 4 years ago
- This code is the official implementation of WEvade.☆40Updated last year
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆18Updated 11 months ago
- ☆27Updated 3 years ago
- Official Pytorch implementation of paper "Reverse Engineering of Generative Models: Inferring Model Hyperparameters from Generated Images…☆141Updated 2 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 5 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Updated 2 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Updated 5 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Updated 2 years ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆41Updated last month