Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge
☆33Jan 29, 2018Updated 8 years ago
Alternatives and similar repositories for deep-steg
Users that are interested in deep-steg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆139Apr 10, 2018Updated 8 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆30Oct 13, 2018Updated 7 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆430Aug 8, 2024Updated last year
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆39Jan 2, 2026Updated 4 months ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆205Feb 9, 2022Updated 4 years ago
- Adversarial Images for Variational Autoencoders☆13Nov 30, 2016Updated 9 years ago
- My solutions to the machine learning course by Andrew Ng on coursera☆10Oct 22, 2018Updated 7 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆25Oct 1, 2020Updated 5 years ago
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models☆12Aug 17, 2021Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Improved Hypergradient optimizers for ML, providing better generalization and faster convergence.☆16Apr 3, 2024Updated 2 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- ☆15Jun 26, 2023Updated 2 years ago
- An open-source toolbox for steganalysis☆204Mar 13, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Python interface for Syndrome Trellis Codes Steganography☆21Mar 3, 2025Updated last year
- A collection of my implementations of commonly used Data Structures and Algorithms in programming competitions☆12Sep 5, 2017Updated 8 years ago
- Machine learning steganographic image detection.☆15Feb 8, 2017Updated 9 years ago
- A steganalysis tool for detecting LSB steganography in images☆240Aug 14, 2018Updated 7 years ago
- ☆11Apr 3, 2020Updated 6 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Source code for "Mononizing Binocular Videos" (SIGGRAPH Asia 2020)☆40Aug 4, 2021Updated 4 years ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆58Oct 7, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆83Aug 29, 2023Updated 2 years ago
- ☆11Dec 18, 2024Updated last year
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Feb 18, 2025Updated last year
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated last year
- Image steganalysis based on deep learning☆10Nov 7, 2021Updated 4 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- An invertible generative model that converts color images into grayscale variant such that the original color is still restorable. [SIGGR…☆59Aug 11, 2022Updated 3 years ago