rohitgandikota / hiding-audio-in-images
Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis
☆17Updated 3 years ago
Alternatives and similar repositories for hiding-audio-in-images:
Users that are interested in hiding-audio-in-images are comparing it to the libraries listed below
- ☆28Updated 2 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆94Updated 4 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- A general approach for using deep neural network for digital watermarking☆14Updated 4 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆31Updated last year
- Official pytorch implementation of WACV 2023 Paper "Proactive Deepfake Defence via Identity Watermarking" for both training and evaluatio…☆20Updated last year
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆73Updated last year
- This is the official repository for the code and datasets in the paper "Deepfake Network Architecture Attribution", AAAI 2022.☆53Updated last year
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆32Updated last year
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆14Updated 3 years ago
- ☆14Updated 11 months ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆15Updated 7 months ago
- Light Field Messaging with Deep Photographic Steganography☆41Updated 4 years ago
- ☆8Updated last year
- ☆83Updated 3 years ago
- ☆14Updated last year
- This code is the official implementation of WEvade.☆38Updated 10 months ago
- Implementation for the IJCAI2021 work "Beyond the Spectrum: Detecting Deepfakes via Re-synthesis"☆37Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆72Updated 2 years ago
- ☆38Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆52Updated 2 years ago
- ☆25Updated last year
- Official implementation of the paper "GANprintR: Improved Fakes and Evaluation of the State-of-the-Art in Face Manipulation Detection"☆22Updated 4 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Updated 2 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆11Updated 2 years ago
- CNN-based fast source device identification☆20Updated 2 years ago
- This is the official repository for the ECCV 2022 paper "RepMix: Representation Mixing for Robust Attribution of Synthesized Images"☆16Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆84Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆16Updated 5 months ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year