ikhin / Watermark-JPEG-with-8x8DCTLinks
JPEG digital watermark based on modified DCT mid-frequency coefficient.
☆20Updated 7 years ago
Alternatives and similar repositories for Watermark-JPEG-with-8x8DCT
Users that are interested in Watermark-JPEG-with-8x8DCT are comparing it to the libraries listed below
Sorting:
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆147Updated 8 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 8 years ago
- 🍿️some awesome Steganalysis☆40Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Updated 7 years ago
- ☆43Updated 4 years ago
- 对抗样本☆276Updated 3 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Updated 3 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- ☆12Updated last month
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆98Updated 3 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆10Updated 4 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆134Updated 7 years ago
- A robust video watermarking technique using SVD and DWT in Open CV Python☆18Updated 5 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆92Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 6 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆58Updated 6 years ago
- Implement some trivial digital watermark and test its robustness☆17Updated 6 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆136Updated 5 years ago
- A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique☆26Updated 8 years ago
- Image watermark with Convolutional Neural Networks☆18Updated 5 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Updated 8 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆55Updated 8 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆69Updated 6 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆70Updated 4 years ago
- ☆20Updated 4 years ago
- a residual network for image steganalysis☆18Updated 8 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Updated 6 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 8 years ago