From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper
☆21Apr 2, 2022Updated 3 years ago
Alternatives and similar repositories for From-Image-to-Imuge-Immunized-Image-Generation
Users that are interested in From-Image-to-Imuge-Immunized-Image-Generation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Oct 10, 2024Updated last year
- ☆17Jul 23, 2022Updated 3 years ago
- SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection☆66Mar 8, 2024Updated 2 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆62Jan 15, 2023Updated 3 years ago
- ☆46May 31, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆116Jun 25, 2024Updated last year
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆422Aug 8, 2024Updated last year
- This is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆76Dec 7, 2022Updated 3 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆33Dec 30, 2020Updated 5 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆130Apr 1, 2022Updated 3 years ago
- ☆11Jan 24, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- (AAAI 24) Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models☆11Oct 12, 2024Updated last year
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- Distortion Agnostic watermarking based on DCT-Based Transformer☆13Dec 13, 2022Updated 3 years ago
- Simple Serial Port Tool Based on pyqt6,基于 pyqt6 的简单串口工具☆10May 11, 2024Updated last year
- 2022年华为软件精英赛初赛☆11Apr 2, 2022Updated 3 years ago
- ☆53Apr 24, 2023Updated 2 years ago
- ☆13Jul 5, 2024Updated last year
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆51Jul 10, 2023Updated 2 years ago
- Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction☆17Aug 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Dec 8, 2018Updated 7 years ago
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- Code for ijcai-24 paper "Federated Adaptation for Foundation Model-based Recommendations"☆12Apr 18, 2025Updated 11 months ago
- ☆14Jun 12, 2022Updated 3 years ago
- 天池&ICDAR2023篡改图像检测比赛方案☆23Apr 8, 2023Updated 2 years ago
- The source code of the paper "Compressed Federated Learning Based on Adaptive Local Differential Privacy".