ml-research / Learning-to-Break-Deep-Perceptual-HashingLinks
[FAccT 2022] Source code for our paper "Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash".
☆33Updated last year
Alternatives and similar repositories for Learning-to-Break-Deep-Perceptual-Hashing
Users that are interested in Learning-to-Break-Deep-Perceptual-Hashing are comparing it to the libraries listed below
Sorting:
- An open-source toolbox for steganalysis☆188Updated 2 months ago
- ☆236Updated 6 years ago
- TrustMark - Universal Watermarking for Arbitrary Resolution Images☆71Updated 2 months ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆117Updated 2 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- Robust video watermarking with non-differentiable adversaries.☆309Updated 4 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 3 years ago
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- Protect your machine learning models easily and securely with watermarking 🔑☆97Updated last year
- Watermarking Deep Neural Networks (USENIX 2018)☆100Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆118Updated 2 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆92Updated 7 years ago
- code share for paper InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance☆44Updated 6 months ago
- Python implementation of PRNU extractor☆79Updated 2 years ago
- Synthesize photos from PhotoDNA using machine learning 🌱☆148Updated 3 months ago
- A Python library for Secure and Explainable Machine Learning☆190Updated 6 months ago
- IStego100K: Large-scale Image Steganalysis Dataset☆69Updated 5 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16Updated 5 years ago
- ☆43Updated 3 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆111Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆187Updated last year
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆22Updated 2 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆410Updated last year
- This code is the official implementation of WEvade.☆41Updated last year
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆20Updated 4 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆222Updated last week
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Updated 6 years ago
- A python package for accessing the internal variables of JPEG file format such as DCT coefficients and quantization tables☆78Updated last year
- Research code release for the Nightshade project from University of Chicago☆74Updated last year
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆101Updated 2 years ago