A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd
☆49Dec 19, 2017Updated 8 years ago
Alternatives and similar repositories for image_watermarking
Users that are interested in image_watermarking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of algorithms DCT, DWT watermarking.☆42Dec 16, 2023Updated 2 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆111Mar 11, 2024Updated 2 years ago
- 使用python实现的水印代码。1、LSB 2、DWT+SVD☆148Nov 5, 2017Updated 8 years ago
- Python code for inserting a watermark in the host image using Discrete Wavelet Transform and Singular Value Decomposition☆20May 14, 2019Updated 6 years ago
- DWT image watermarking☆17Apr 27, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The digital watermark for image and pdf.☆80Jun 19, 2019Updated 6 years ago
- An approach to a blind discrete Wavelet Transformation (DWT) domain feature point based image watermarking technique is proposed in this …☆19Dec 23, 2014Updated 11 years ago
- 基于DWT和DCT的鲁棒图像水印系统☆11Mar 25, 2024Updated 2 years ago
- The open-access code of an interpretable machine learning-based method for room temperature prediction in a non-domestic building.☆16Aug 3, 2024Updated last year
- python_wavelet_digital_watermarking☆70Jul 10, 2017Updated 8 years ago
- This is my master's thesis , it research about watermarking based on DWT frequency domain☆10May 9, 2018Updated 7 years ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61May 8, 2020Updated 5 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Blind video watermarking with great invisibility and robustness.☆102Aug 11, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code of the paper "The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields".☆17Mar 3, 2025Updated last year
- Implementation of "Embedding Watermarks into Deep Neural Networks," in Proc. of ICMR'17.☆125Jul 28, 2022Updated 3 years ago
- First Adobe XD Justify Plugin ever!☆13Mar 1, 2022Updated 4 years ago
- A curated list of watermarking schemes for generative AI models☆132Nov 26, 2025Updated 4 months ago
- Perform image and time series classification of various cardiovascular conditions as well as COVID-19 using Electrocardiogram data.☆17Mar 30, 2022Updated 4 years ago
- 💋 Quick and efficient way to apply watermarks to images in django☆76Aug 1, 2023Updated 2 years ago
- Thermodynamics tool for H2O, H2, and CO2☆10May 12, 2023Updated 2 years ago
- Using the cocos2d-x engine and KinectV2 , We can control the movement of the aircraft , evade or eliminate the enemy .☆13May 4, 2018Updated 7 years ago
- python RobustRMC projects☆10Apr 22, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Implementation of the CWoLa Hunting strategy for dijet resonances☆19Mar 8, 2021Updated 5 years ago
- ☆17Jan 26, 2025Updated last year
- A repository for the updated version of CoinRun used to collect MUGEN, a multimodal video-audio-text dataset. This repo contains scripts …☆13Jul 13, 2022Updated 3 years ago
- Deep Reinforcement Learning by using an on-policy adaptation of Maximum a Posteriori Policy Optimization (MPO)☆16Oct 23, 2021Updated 4 years ago
- Safe Model-Based RL HVAC Control Using Epistemic Uncertainty Estimation.☆12Feb 25, 2025Updated last year
- [CVPR'24] Once for Both: Single Stage of Importance and Sparsity Search for Vision Transformer Compression☆15Jul 1, 2024Updated last year
- code for the paper "Adversarial Reinforced Instruction Attacker for Robust Vision-Language Navigation" (TPAMI 2021)☆10Jul 15, 2022Updated 3 years ago
- Reproduce the AHDRNet☆10Sep 2, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Feb 15, 2025Updated last year
- 使用verilog编写sdram控制器☆12Jun 22, 2019Updated 6 years ago
- Simple-ish script which starts an equaliser under pipewire and connects a real output device to it as well as a virtual device to relay a…☆11Nov 21, 2025Updated 4 months ago
- Official implementation of the paper "Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks"☆20Jun 9, 2025Updated 9 months ago
- 🌎NUAA 2018 网络安全 - 端口扫描☆11Jul 2, 2018Updated 7 years ago
- Information Security using Steganography over Cryptography☆14Aug 31, 2024Updated last year
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago