strongman1995 / Fast-Adversarial-Watermark-Attack-on-OCRLinks
Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"
☆19Updated 4 years ago
Alternatives and similar repositories for Fast-Adversarial-Watermark-Attack-on-OCR
Users that are interested in Fast-Adversarial-Watermark-Attack-on-OCR are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- This code is the official implementation of WEvade.☆40Updated last year
- CNN-based fast source device identification☆22Updated 2 years ago
- PyTorch implementation of Adversarial Patch☆15Updated 2 years ago
- ☆41Updated 3 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆76Updated 2 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆89Updated 2 years ago
- ☆18Updated 2 years ago
- [ICME 2021] Official implementation of "Watermark Faker: Towards Forgery of Digital Image Watermarking".☆24Updated 4 years ago
- ☆10Updated 2 years ago
- ☆33Updated 3 years ago
- ☆88Updated 4 years ago
- This is the code repo of our CVPR2021 on protecting the IPR of Generative Adversarial Networks (GANs) from Ambiguity Attack☆32Updated last year
- An adversarial robustness evaluation library on face recognition.☆111Updated 2 years ago
- Noiseprint, a CNN-based camera model fingerprint☆143Updated 2 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- The 1st solution for the DeepFake Game Competition (DFGC) @ IJCB 2021 Detection track.☆35Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago
- ☆43Updated 4 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- StegaStamp of pytorch version☆65Updated last year
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Updated last year
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- ☆42Updated 5 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Updated 2 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 6 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆57Updated last year