Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge
☆33Jan 29, 2018Updated 8 years ago
Alternatives and similar repositories for deep-steg
Users that are interested in deep-steg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆55Jan 30, 2018Updated 8 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Hiding Images within other images using Deep Learning☆213Apr 25, 2018Updated 7 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 8 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- ☆30Oct 13, 2018Updated 7 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆426Aug 8, 2024Updated last year
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆204Feb 9, 2022Updated 4 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- An application of genetic algorithms in pathfinding.☆10Oct 28, 2019Updated 6 years ago
- Improved Hypergradient optimizers for ML, providing better generalization and faster convergence.☆16Apr 3, 2024Updated 2 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Jun 26, 2023Updated 2 years ago
- An open-source toolbox for steganalysis☆203Mar 13, 2026Updated last month
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- A collection of my implementations of commonly used Data Structures and Algorithms in programming competitions☆12Sep 5, 2017Updated 8 years ago
- Machine learning steganographic image detection.☆15Feb 8, 2017Updated 9 years ago
- Light Field Messaging with Deep Photographic Steganography☆44Nov 10, 2020Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆84Aug 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Dec 18, 2024Updated last year
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Feb 18, 2025Updated last year
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated last year
- Convert VGG imagenet pre-trained weights for grayscale images☆27Jun 4, 2018Updated 7 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆131Apr 1, 2022Updated 4 years ago
- ☆31Jul 23, 2021Updated 4 years ago