The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"
☆20Feb 18, 2025Updated last year
Alternatives and similar repositories for wdm
Users that are interested in wdm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- Official Implementation for: "RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images (Videos) with Provable Gu…☆37Oct 30, 2024Updated last year
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆59Dec 5, 2024Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆152Nov 13, 2024Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- competition☆16Aug 1, 2020Updated 5 years ago
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆24Jan 9, 2025Updated last year
- ☆12Mar 3, 2025Updated last year
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆39May 26, 2025Updated 10 months ago
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆34Apr 5, 2025Updated last year
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- source code for "ROBIN: Robust and Invisible Watermarks for Diffusion Models with Adversarial Optimization"☆39Mar 9, 2025Updated last year
- ☆33Nov 4, 2023Updated 2 years ago
- ☆22May 9, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The official TensorFlow implementation for ICLR'22 Spotlight paper 'Responsible Disclosure of Generative Models Using Scalable Fingerprin…☆33Apr 16, 2023Updated 2 years ago
- Official implementation of "Prompt-Agnostic Adversarial Perturbation for Customized Diffusion Models"☆25May 30, 2025Updated 10 months ago
- Watermark for Image Generators☆20Aug 10, 2023Updated 2 years ago
- ☆352Mar 21, 2024Updated 2 years ago
- ☆50Jun 19, 2024Updated last year
- The official implementation of MuST: Robust Image Watermarking for Multi-source Tracing☆26Dec 27, 2023Updated 2 years ago
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆74Mar 6, 2025Updated last year
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- Official implementation of the paper "The Stable Signature Rooting Watermarks in Latent Diffusion Models"☆506Dec 16, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 10 months ago
- ☆95Mar 23, 2021Updated 5 years ago
- ☆22Apr 23, 2024Updated last year
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated 2 years ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆43Jul 14, 2024Updated last year
- [ACM MM 24] GROOT:Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis☆20Mar 24, 2025Updated last year
- WAFFLE: Watermarking in Federated Learning☆23Aug 21, 2023Updated 2 years ago
- 🛡️[ICLR'2024] Toward effective protection against diffusion-based mimicry through score distillation, a.k.a SDS-Attack☆63Apr 7, 2024Updated 2 years ago
- ☆54Apr 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆33Jul 18, 2024Updated last year
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆426Aug 8, 2024Updated last year
- Glaze is a tool to help artists to prevent their artistic styles from being learned and mimicked by new AI-art models such as MidJourney,…☆33Mar 24, 2023Updated 3 years ago
- Anti-DreamBooth: Protecting users from personalized text-to-image synthesis (ICCV 2023)☆268Mar 27, 2026Updated 2 weeks ago
- ☆39Aug 30, 2024Updated last year
- 基于DWT和DCT的鲁棒图像水印系统☆11Mar 25, 2024Updated 2 years ago