ikhin / Watermark-JPEG-with-8x8DCT
JPEG digital watermark based on modified DCT mid-frequency coefficient.
☆20Updated 7 years ago
Alternatives and similar repositories for Watermark-JPEG-with-8x8DCT:
Users that are interested in Watermark-JPEG-with-8x8DCT are comparing it to the libraries listed below
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 3 years ago
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆141Updated 7 years ago
- 🍿️some awesome Steganalysis☆35Updated 6 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆45Updated 7 years ago
- This repository embed the message into an Image using optimized DWT-DCT☆54Updated 6 years ago
- A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique☆26Updated 7 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆20Updated last year
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆10Updated 4 years ago
- This is a course proect,using DWT,DCT,LSB & Arnold scrambling to hiding watermark within a RGB picture.☆11Updated 7 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆21Updated 2 years ago
- A robust video watermarking technique using SVD and DWT in Open CV Python☆17Updated 4 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆64Updated 6 years ago
- Matlab code for DCT-based color digital image watermarking.☆8Updated 4 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆28Updated 4 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 8 months ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆92Updated 2 years ago
- This is my master's thesis , it research about watermarking based on DWT frequency domain☆10Updated 6 years ago
- The implement of paper "How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN…☆23Updated 4 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆51Updated 2 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆126Updated 4 years ago
- ☆26Updated 3 years ago
- ☆11Updated last month
- ☆18Updated 2 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆86Updated 7 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆97Updated 4 years ago
- ☆13Updated 6 years ago
- ☆52Updated last year