ikhin / Watermark-JPEG-with-8x8DCTLinks
JPEG digital watermark based on modified DCT mid-frequency coefficient.
☆20Updated 7 years ago
Alternatives and similar repositories for Watermark-JPEG-with-8x8DCT
Users that are interested in Watermark-JPEG-with-8x8DCT are comparing it to the libraries listed below
Sorting:
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆143Updated 7 years ago
- 对抗样本☆268Updated 2 years ago
- ☆43Updated 4 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 6 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆87Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- 机器学习安全相关论文、代码☆42Updated 6 years ago
- 🍿️some awesome Steganalysis☆37Updated 7 years ago
- This is my master's thesis , it research about watermarking based on DWT frequency domain☆10Updated 7 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 4 years ago
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆40Updated 5 years ago
- ☆11Updated 2 weeks ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆50Updated 7 years ago
- Image watermark with Convolutional Neural Networks☆17Updated 5 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 7 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 4 years ago
- Adversarial Attacks and Defenses of Image Classifiers, NIPS 2017 competition track☆45Updated 7 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆53Updated 7 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆22Updated 2 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆123Updated 3 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆133Updated 7 years ago
- A novel data-free model stealing method based on GAN☆128Updated 2 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆40Updated 6 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆25Updated 4 years ago
- ☆41Updated last year
- ☆18Updated 2 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Updated 4 years ago