Chenlang2018 / Audio-Steganography-using-GANView external linksLinks
These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"
☆15Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for Audio-Steganography-using-GAN
Users that are interested in Audio-Steganography-using-GAN are comparing it to the libraries listed below
Sorting:
- The source code of "Audio steganalysis with Improved CNN"☆15Jul 13, 2019Updated 6 years ago
- Hide image in audio. Image in audio steganography with deep learning. Deep learning-based psychoacoustic steganography within earshot.☆27Sep 28, 2022Updated 3 years ago
- [ACM MM 24] GROOT:Generating Robust Watermark for Diffusion-Model-Based Audio Synthesis☆20Mar 24, 2025Updated 10 months ago
- ☆42Jan 17, 2021Updated 5 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆22Mar 21, 2023Updated 2 years ago
- Image steganography usings Generative Adverserial Networks☆42Oct 12, 2024Updated last year
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆50Nov 16, 2022Updated 3 years ago
- Robust Neural Audio Watermarking with Invertible Dual-Embedding☆30Nov 11, 2024Updated last year
- [AAAI 2024] StegFormer: Rebuilding the Glory of the Autoencoder-Based Steganography☆33Apr 23, 2024Updated last year
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- StegTransX: A Lightweight Deep Steganography Method for High-Capacity Hiding and JPEG Compression Resistance☆17May 18, 2025Updated 8 months ago
- ☆31Jul 23, 2021Updated 4 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Official Implementation of VoxTracer (MM' 23)☆11Oct 27, 2023Updated 2 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆369Mar 23, 2023Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 8 months ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- CSGO饰品 buff igxe max平台数据爬取☆10Jul 1, 2022Updated 3 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated last year
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 6 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- 数字水印project,基于DWT的图像水印项目☆11Jun 22, 2023Updated 2 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago