ikhin / Watermark-JPEG-with-8x8DCTLinks
JPEG digital watermark based on modified DCT mid-frequency coefficient.
☆20Updated 7 years ago
Alternatives and similar repositories for Watermark-JPEG-with-8x8DCT
Users that are interested in Watermark-JPEG-with-8x8DCT are comparing it to the libraries listed below
Sorting:
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆147Updated 8 years ago
- 🍿️some awesome Steganalysis☆40Updated 7 years ago
- Image watermark with Convolutional Neural Networks☆18Updated 5 years ago
- ☆43Updated 4 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Updated 7 years ago
- A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique☆26Updated 8 years ago
- 对抗样本☆275Updated 3 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Updated 3 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆92Updated 7 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Updated 2 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 8 years ago
- Implement some trivial digital watermark and test its robustness☆17Updated 6 years ago
- 机器学习安全相关论文、代码☆42Updated 6 years ago
- This repository embed the message into an Image using optimized DWT-DCT☆56Updated 7 years ago
- python_wavelet_digital_watermarking☆69Updated 8 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆69Updated 6 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆136Updated 5 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Updated last year
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 6 years ago
- ☆19Updated 4 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- ☆27Updated 4 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆134Updated 7 years ago
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆124Updated 3 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 5 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Updated 6 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆34Updated 4 years ago