Chentingz / LSB-Steganography
基于LSB隐写术将文本隐藏于320x240的灰度图像
☆20Updated 5 years ago
Alternatives and similar repositories for LSB-Steganography:
Users that are interested in LSB-Steganography are comparing it to the libraries listed below
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆149Updated 5 years ago
- 武大信息隐藏实验☆18Updated last year
- 数字水印project,基于DWT的图像水印项目☆8Updated last year
- ☆11Updated last year
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆65Updated 3 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆14Updated 4 years ago
- 深度隐写术☆16Updated 4 years ago
- ☆11Updated 3 weeks ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆34Updated 11 months ago
- Implementation of several Steganography and steganalysis techniques.☆46Updated last year
- ☆24Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 5 years ago
- ☆11Updated 2 years ago
- Watermarking Deep Neural Networks☆13Updated 3 weeks ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆9Updated 3 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆21Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- ☆48Updated last year
- 使用pytorch实现FGSM☆29Updated 3 years ago
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆19Updated last year
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Updated 3 years ago
- Image steganography usings Generative Adverserial Networks☆39Updated 5 months ago
- ☆26Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆51Updated 2 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography"☆9Updated 7 years ago
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Updated 5 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆14Updated 4 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆16Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year