huitailangyz / Just_Noticeable_DifferenceView external linksLinks
A repository to caculate the just noticable difference of an image by Python
☆27Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for Just_Noticeable_Difference
Users that are interested in Just_Noticeable_Difference are comparing it to the libraries listed below
Sorting:
- [IEEE TIP 2022] KLT-JND☆35Aug 13, 2024Updated last year
- Matlab and OpenCV Code Calculate JND of an image.☆14Apr 9, 2015Updated 10 years ago
- Supplementary material for the paper "BL-JUNIPER: A CNN Assisted Framework for Perceptual Video Coding Leveraging Block Level JND", IEEE …☆12Aug 1, 2023Updated 2 years ago
- Learning-based Just-noticeable-quantization-distortion Model for perceptual video coding☆32Dec 2, 2020Updated 5 years ago
- ☆19Jan 24, 2022Updated 4 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- Official Tensorflow implementation for "Improving the Transferability of Adversarial Samples by Path-Augmented Method" (CVPR 2023).☆12Jun 16, 2023Updated 2 years ago
- Universal Perturbation Attack on differentiable no-reference image- and video-quality metrics☆14Oct 16, 2023Updated 2 years ago
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'☆18Nov 11, 2025Updated 3 months ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆18Mar 24, 2023Updated 2 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 5 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated last year
- Point cloud version for "No-Reference Quality Assessment for 3D Colored Point Cloud and Mesh models".☆33Sep 20, 2022Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- [TIP2025] The implementation of "Uncertainty Guided Refinement for Fine-grained Salient Object Detection"☆15Apr 20, 2025Updated 9 months ago
- ☆11Mar 11, 2024Updated last year
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- ☆36Feb 23, 2024Updated last year
- imageC / EVAnalyzer2 - High throughput biological image processor☆10Feb 1, 2026Updated last week
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Program for adding, removing, editing and visualising events related to history☆10Feb 25, 2023Updated 2 years ago
- The code and data for "Summary-Oriented Vision Modeling for Multimodal Abstractive Summarization"☆11May 16, 2023Updated 2 years ago
- A modified version of the SfM pipeline given in the link. The modifications are for a certain heuristics to reconstruct 3D from ambiguous…☆10Nov 29, 2017Updated 8 years ago
- HierCGRA: An Open-Source Framework for Large-Scale CGRA with Hierarchical Modeling and Automated Exploration☆14Mar 6, 2023Updated 2 years ago
- A simple program to convert gdsII files to vector output formats. Currently used to create laser-cut models of standard cells.☆12May 30, 2023Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Aug 30, 2020Updated 5 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- A C++11 Thread pool with 3 priorities☆10Sep 13, 2019Updated 6 years ago
- GPU (CUDA) accelerated filters using 2D convolution for high resolution images.☆11Feb 1, 2025Updated last year
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- ☆12Jun 2, 2025Updated 8 months ago
- Generative label fused network for image–text matching☆10Jan 13, 2023Updated 3 years ago
- [NeurIPS2022] Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop☆14Apr 13, 2023Updated 2 years ago
- A fast, adaptive approach to estimating contrast sensitivity function parameters☆15Mar 27, 2023Updated 2 years ago