strongman1995 / Fast-Adversarial-Watermark-Attack-on-OCRView external linksLinks
Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"
☆22Dec 27, 2020Updated 5 years ago
Alternatives and similar repositories for Fast-Adversarial-Watermark-Attack-on-OCR
Users that are interested in Fast-Adversarial-Watermark-Attack-on-OCR are comparing it to the libraries listed below
Sorting:
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated last year
- This repository contains code for AdvEWM, as detailed in our paper published in JISA☆18Dec 6, 2023Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆60Jan 15, 2023Updated 3 years ago
- This code is the official implementation of WEvade.☆40Mar 12, 2024Updated last year
- ☆23Nov 9, 2022Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- code share for paper InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance☆46Updated this week
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- [FAccT 2022] Source code for our paper "Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash".☆33Jul 11, 2024Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆155Nov 13, 2024Updated last year
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- ☆10May 18, 2024Updated last year
- ☆12Mar 25, 2024Updated last year
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- Multimodal dataset for evaluating continuous authentication performance in smartphones☆11Feb 1, 2021Updated 5 years ago
- ☆12Sep 17, 2019Updated 6 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- Blind First-Order Perspective Distortion Correction using Parallel Convolutional Neural Networks☆12Nov 19, 2021Updated 4 years ago
- ☆11Feb 27, 2025Updated 11 months ago
- ☆13Sep 26, 2024Updated last year
- ☆12Sep 22, 2023Updated 2 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- Parallelizing Google's PageRank algorithm in C++ with CUDA framework on GPU. Conducted some experiments, tried new ideas. Final Course Pr…☆10May 20, 2021Updated 4 years ago
- Integer FFT(Fast Fourier Transform) in Python☆13Nov 14, 2023Updated 2 years ago
- character recognition, textline recognition☆10Aug 31, 2019Updated 6 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆115Jun 25, 2024Updated last year
- ☆14Jul 3, 2020Updated 5 years ago
- ☆17Dec 1, 2024Updated last year
- ☆10Sep 9, 2021Updated 4 years ago
- A model of Polar encoder/decoder☆11Dec 8, 2022Updated 3 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- Data Science Online Course by Coding Blocks☆10May 18, 2019Updated 6 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- SImple Tensorflow implementations of " Image-to-Image Translation with Conditional Adversarial Networks" (CVPR 2017)☆10Apr 11, 2018Updated 7 years ago