Official PyTorch implementation of "Shallow Diffuse: Robust and Invisible Watermarking through Low-Dimensional Subspaces in Diffusion Models"
☆24May 14, 2025Updated 9 months ago
Alternatives and similar repositories for Shallow-Diffuse
Users that are interested in Shallow-Diffuse are comparing it to the libraries listed below
Sorting:
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆39Mar 9, 2025Updated 11 months ago
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆70Mar 6, 2025Updated 11 months ago
- [ICCV 2025] Official implementation of 'SEAL: Semantic Aware Image Watermarking'☆19Apr 12, 2025Updated 10 months ago
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 9 months ago
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆36Oct 30, 2024Updated last year
- ☆39Aug 30, 2024Updated last year
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆57Dec 5, 2024Updated last year
- ☆342Mar 21, 2024Updated last year
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated last year
- [CVPR 2024] official code for SimAC☆21Jan 23, 2025Updated last year
- This repo collects the paper list of deep hiding.☆66Jun 15, 2024Updated last year
- collection with description of super-resolution related papers, repositories, datasets, loss functions and etc.☆11Dec 12, 2023Updated 2 years ago
- DiffusionGuard: A Robust Defense Against Malicious Diffusion-based Image Editing (ICLR 2025)☆43May 18, 2025Updated 9 months ago
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆38Jan 2, 2026Updated 2 months ago
- The official implementation of paper "TRCE: Towards Reliable Malicious Concept Erasure in Text-to-Image Diffusion Models"☆16Mar 11, 2025Updated 11 months ago
- http://www.dcjingsai.com/common/cmpt/公交线路准点预测_排行榜.html☆10Aug 28, 2018Updated 7 years ago
- [CVPR 2025] Silence is Golden: Leveraging Adversarial Examples to Nullify Audio Control in LDM-based Talking-Head Generation☆19Dec 18, 2025Updated 2 months ago
- ☆13Dec 18, 2024Updated last year
- ☆13Apr 14, 2025Updated 10 months ago
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆105Nov 30, 2023Updated 2 years ago
- [CVPR 2025] Harnessing Frequency Spectrum Insights for Image Copyright Protection Against Diffusion Models☆12Sep 16, 2025Updated 5 months ago
- Explaining audio differences using language☆16Feb 11, 2025Updated last year
- [Unofficial] RF Inversion implemented for SD3 / SD3.5☆13Nov 4, 2024Updated last year
- ☆15Sep 14, 2025Updated 5 months ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- A curated list of watermarking schemes for generative AI models☆129Nov 26, 2025Updated 3 months ago
- Implementation of reflection symmetry in convolutional layers (Tensorflow 1.X)☆13Oct 15, 2020Updated 5 years ago
- Official Implementation of Data Unlearning in Diffusion Models (ICLR 2025)☆14May 20, 2025Updated 9 months ago
- [ICCV 2025] Diffusion Curriculum (DisCL)☆18Sep 26, 2025Updated 5 months ago
- ☆12Sep 14, 2023Updated 2 years ago
- Official implementation of "Video-Foley: Two-Stage Video-To-Sound Generation via Temporal Event Condition For Foley Sound". IEEE TASLP 20…☆17Updated this week
- ☆53Apr 24, 2023Updated 2 years ago
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- ☆13Oct 22, 2020Updated 5 years ago
- This project aims at the big data challenges for predicting bus arrival time using GPS datasets.☆13Mar 1, 2024Updated 2 years ago
- Gaussian Membership Inference Privacy (NeurIPS 2023)☆12Jul 27, 2024Updated last year
- [AAAI-2024] Official code for work "Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model"☆60Aug 17, 2024Updated last year