ikhin / Watermark-JPEG-with-8x8DCTLinks
JPEG digital watermark based on modified DCT mid-frequency coefficient.
☆20Updated 7 years ago
Alternatives and similar repositories for Watermark-JPEG-with-8x8DCT
Users that are interested in Watermark-JPEG-with-8x8DCT are comparing it to the libraries listed below
Sorting:
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆145Updated 7 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆22Updated 2 years ago
- 对抗样本☆273Updated 2 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- 🍿️some awesome Steganalysis☆38Updated 7 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆88Updated 7 years ago
- ☆43Updated 4 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆50Updated 7 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆21Updated 2 years ago
- This repository embed the message into an Image using optimized DWT-DCT☆55Updated 7 years ago
- A robust video watermarking technique using SVD and DWT in Open CV Python☆18Updated 5 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆53Updated 8 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆22Updated 2 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- ☆18Updated 2 years ago
- Implementation of algorithms DCT, DWT watermarking.☆40Updated last year
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- Image watermark with Convolutional Neural Networks☆18Updated 5 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆95Updated 3 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 4 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆136Updated 4 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 4 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆57Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- Basic watermarking libraries for images and videos with python 3.☆46Updated 7 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆119Updated 4 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆68Updated 6 years ago