raouf-aghrout / head-first-java
Head First Java, 2nd Edition - Book exercises.
☆45Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for head-first-java
- ☆27Updated last year
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 5 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆16Updated 7 months ago
- Implementation of several Steganography and steganalysis techniques.☆44Updated last year
- ☆10Updated 2 years ago
- A curated list of watermarking schemes for generative AI models☆55Updated 4 months ago
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆20Updated last year
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆11Updated 2 years ago
- ☆46Updated 8 months ago
- ☆8Updated 10 months ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆18Updated 3 months ago
- Watermark for Image Generators☆16Updated last year
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆29Updated 3 years ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆8Updated 3 years ago
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆32Updated 3 months ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆40Updated 8 months ago
- ☆22Updated 2 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆12Updated 5 months ago
- ☆38Updated 2 years ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆30Updated 4 months ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆49Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆49Updated last year
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆26Updated 2 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆14Updated 5 months ago
- ☆22Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆31Updated last year
- ☆18Updated 2 years ago
- ☆18Updated 2 years ago
- Code and Datasets for the paper "An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape" [IEEE S&P, 2…☆13Updated 6 months ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Updated last year