hurunyi / MaskMarkLinks
Mask Image Watermarking (Official Implementation)
☆34Updated 3 weeks ago
Alternatives and similar repositories for MaskMark
Users that are interested in MaskMark are comparing it to the libraries listed below
Sorting:
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆32Updated 4 months ago
- [ECCV 2024] Robust-Wide: Robust Watermarking against Instruction-driven Image Editing (Official Implementation)☆27Updated 2 months ago
- [ICLR 2025] VideoShield: Regulating Diffusion-based Video Generation Models via Watermarking (Official Implementation)☆43Updated 2 months ago
- ☆34Updated 11 months ago
- Official implementation of Geometry Cloak [NeurIPS'24]☆19Updated 3 months ago
- ☆28Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆148Updated 8 months ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆51Updated 11 months ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆36Updated last year
- [AAAI 2021] Initiative Defense against Facial Manipulation☆36Updated 2 years ago
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Updated 2 years ago
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆48Updated 11 months ago
- ☆61Updated 3 years ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆22Updated last year
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆30Updated 5 months ago
- This code is the official implementation of WEvade.☆40Updated last year
- A collection of resources on attacks and defenses targeting text-to-image diffusion models