This code is the official implementation of WEvade.
☆41Mar 12, 2024Updated last year
Alternatives and similar repositories for WEvade
Users that are interested in WEvade are comparing it to the libraries listed below
Sorting:
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆33Nov 19, 2025Updated 3 months ago
- Code for our paper "Benchmarking the Robustness of Image Watermarks"☆97Sep 15, 2024Updated last year
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- ☆22Apr 23, 2024Updated last year
- Attack-Resilient Image Watermarking Using Stable Diffusion (NeurIPS2024)☆59Dec 5, 2024Updated last year
- [ICML 2024] Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models☆24Sep 12, 2024Updated last year
- Code of the paper: A Recipe for Watermarking Diffusion Models☆155Nov 13, 2024Updated last year
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆70Mar 6, 2025Updated last year
- Latent Watermark: Inject and Detect Watermarks in Latent Diffusion Space☆23Jan 9, 2025Updated last year
- ☆344Mar 21, 2024Updated last year
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆135May 15, 2024Updated last year
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆26Feb 17, 2025Updated last year
- [ICLR 2025] Permute-and-Flip: An optimally robust and watermarkable decoder for LLMs☆19Mar 20, 2025Updated 11 months ago
- Official PyTorch implementation of "Shallow Diffuse: Robust and Invisible Watermarking through Low-Dimensional Subspaces in Diffusion Mod…☆24May 14, 2025Updated 9 months ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Official implementation of the paper "The Stable Signature Rooting Watermarks in Latent Diffusion Models"☆502Dec 16, 2025Updated 2 months ago
- Code of paper [CVPR'24: Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?]☆23Apr 2, 2024Updated last year
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- A Watermark-Conditioned Diffusion Model for IP Protection (ECCV 2024)☆35Apr 5, 2025Updated 11 months ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆77Apr 16, 2023Updated 2 years ago
- Watermark for Image Generators☆20Aug 10, 2023Updated 2 years ago
- Code for the paper "Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks"☆39Jun 20, 2024Updated last year
- ☆83Aug 3, 2021Updated 4 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Feb 18, 2025Updated last year
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆25Jun 14, 2024Updated last year
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆61Jan 15, 2023Updated 3 years ago
- Official implementation of "Diffusion models meet image counter-forensics"☆11Jan 22, 2024Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- ☆10Dec 18, 2024Updated last year
- [NeurIPS 2024] Invisible Image Watermarks Are Provably Removable Using Generative AI☆257Jan 24, 2025Updated last year
- code share for paper InvisMark: Invisible and Robust Watermarking for AI-generated Image Provenance☆46Feb 11, 2026Updated 3 weeks ago
- Official implementation of "Watermarking Images in Self-Supervised Latent-Spaces"☆118Jan 23, 2023Updated 3 years ago
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Jul 20, 2023Updated 2 years ago
- AutoSplice: A Text-prompt Manipulated Image Dataset for Media Forensics, WMF@CVPR2023☆50Jan 31, 2025Updated last year