东南大学网络空间安全学院-信息隐藏与数字水印课程实验
☆19Dec 1, 2020Updated 5 years ago
Alternatives and similar repositories for -LSB-
Users that are interested in -LSB- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 数字水印算法(利用matlab实现)☆30Jun 3, 2019Updated 6 years ago
- 基于DCT的未压缩域视频水印嵌入,东南大学网络信息安全与信息隐藏课程实验☆19Nov 24, 2021Updated 4 years ago
- 基于MatLab实现LSB(最低有效位)算法完成图片数字水印隐写功能☆15Sep 18, 2022Updated 3 years ago
- 信息隐藏与数字水印,实验和quizQ&A整理,期末知识点复习整理☆12Sep 16, 2020Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implementation and Performance Analysis of LSB Steganography Algorithm. The test shows that it has excellent imperceptibility (PSNR value…☆19May 25, 2020Updated 5 years ago
- 该课题为基于MATLAB的数字水印系统。包括离散余弦DCT和小波变换DWT两种算法的对比,有一个GUI界面,包括嵌入,加噪,旋转,剪切,压缩等多种攻击,提取候,具有评价指标PSNR,NC等来评价算法的鲁棒性。☆19Jan 10, 2021Updated 5 years ago
- 构建一个加密图像检索系统,通过使用深度学习算法对存储的图像进行分类和标记,并以此作为图 像检索的依据,并设计一个检索算法,进而提高加密图像检索的准确性和效率。该算法主要运行在图像检索服务器端。 框架:Pytorch☆15Dec 8, 2022Updated 3 years ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- 基于深度学习的验证码破解、对抗与反对抗研究☆21Mar 28, 2019Updated 6 years ago
- JEI 2017: Cross-utilizing hyperchaotic and DNA sequences for image encryption☆17Jan 15, 2017Updated 9 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆16Mar 25, 2021Updated 5 years ago
- This is the Last Working Google Translate Chrome Extension That Works With Brave etc. DO NOT EVER DOWNLOAD THE UPDATED VERSION!! IF YOU H…☆18Oct 24, 2024Updated last year
- 毕设,分层自嵌入数字水印☆12Sep 2, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- 整理的一些hw前期准备工作 以及针对攻击者的溯源思路 水平较菜,如有错误或者遗漏的地方还请各位指正 参考资料较多 动态 IP 移动基站 代理池IP(谷歌、百度 是否有处于代理池C段) 国外扫描傀儡机(被标记时间普遍较久、扫描目标众多) 动态域名服务商(如花生壳、公云等) …☆21Apr 3, 2021Updated 4 years ago
- 各类网络安全思维导图收藏☆19Feb 5, 2020Updated 6 years ago
- cve-2021-22986 f5 rce 漏洞批量检测 poc☆27Mar 27, 2021Updated 4 years ago
- 个人博客系统毕业设计☆32Apr 9, 2018Updated 7 years ago
- 汽车之家口碑网某车型的评论数据情感分析☆30May 22, 2019Updated 6 years ago
- 简单爬取抖音评论中点赞数,用户ID等信息;使用BERT等预训练模型,针对抖音评论进行简单的多分类情感分析任务。☆25Oct 19, 2022Updated 3 years ago
- 《信息隐藏技术》第三次大作业——基于图像块分组的加密域可逆信息隐藏(研读文献)☆28Mar 29, 2018Updated 7 years ago
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Implementation of the paper Keys to Accurate Feature Extraction Using Residual Spiking Neural Networks☆35Dec 28, 2023Updated 2 years ago
- ☆36Sep 26, 2020Updated 5 years ago
- AWD平台☆24Aug 18, 2021Updated 4 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆33May 25, 2021Updated 4 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Sep 6, 2019Updated 6 years ago
- 更好的ctf密码学加解密及编解码工具☆21Oct 19, 2017Updated 8 years ago
- 一个图像加解密android app,其中的图像加解密原理是基于 《基于排序变换的混沌图像置乱算法》优化后实现。☆147Aug 16, 2018Updated 7 years ago
- 基于bert-base-chinese微调的中文情感分析任务,在WeiboSenti100k 数据集上训练5个epoch并且收敛☆39Jul 27, 2023Updated 2 years ago
- ARM设备武器化指南☆32May 6, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 基于logistics混沌加密算法的图像加密☆36Mar 22, 2020Updated 6 years ago
- 一个SM2,SM4国密实现的加密p2p通信,具有隐写图片传输,音频录制传输的p2p即时通信。☆19Jul 31, 2021Updated 4 years ago
- 锐捷网络技能大赛使用到的公共资料☆28Jun 8, 2024Updated last year
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Jul 2, 2017Updated 8 years ago
- Data for "An Image Encryption Scheme Based on a Hybrid Model of DNA Computing, Chaotic Systems and Hash Functions"☆39Feb 24, 2020Updated 6 years ago
- A simple spider and sentiment analysis for JD (爬取京东商品评论+情感分析+数据可视化)☆48May 22, 2023Updated 2 years ago
- 网络安全等级保护2.0极简教程☆41Sep 25, 2020Updated 5 years ago