☆12Mar 3, 2025Updated last year
Alternatives and similar repositories for Cross-Modal-Steganography
Users that are interested in Cross-Modal-Steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Nov 11, 2025Updated 4 months ago
- ☆13Sep 1, 2025Updated 6 months ago
- Pulsar: Secure Steganography for Diffusion Models☆15Oct 15, 2024Updated last year
- ☆19Sep 27, 2021Updated 4 years ago
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆23Nov 17, 2024Updated last year
- A new model-based algorithm for offline inverse reinforcement learning☆15Feb 20, 2023Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- ☆27Sep 9, 2021Updated 4 years ago
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- The official implementation of "Intellectual Property Protection of Diffusion Models via the Watermark Diffusion Process"☆20Feb 18, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sampling profiler for Python programs☆10Jun 19, 2020Updated 5 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- 中国行政区域数据☆15Jul 25, 2023Updated 2 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 9 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆22Mar 21, 2023Updated 3 years ago
- ☆19Mar 14, 2023Updated 3 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Apr 21, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 基于DWT和DCT的鲁棒图像水印系统☆11Mar 25, 2024Updated 2 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- 数字水印project,基于DWT的图像水印项目☆11Jun 22, 2023Updated 2 years ago
- A list of research towards security&privacy in AI-Generated Content☆16Jan 10, 2025Updated last year
- Patch-Diffusion Code (AAAI2022)☆13Mar 3, 2022Updated 4 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- Official code for "IRWArt: Levering Watermarking Performance for Protecting High-quality Artwork Images" (thewebconf 2023)☆12May 23, 2023Updated 2 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- kidney function classification and prediction through ultrasound-based kidney imaging: from deep learning to mass screening of chronic ki…☆12May 20, 2019Updated 6 years ago
- Code implementation for "CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion" (CVPR 2024)☆16Mar 25, 2024Updated 2 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"☆62Aug 1, 2023Updated 2 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Video Steganography / Watermarking Demo Tool☆10Jan 16, 2022Updated 4 years ago