Chentingz / LSB-SteganographyLinks
基于LSB隐写术将文本隐藏于320x240的灰度图像
☆20Updated 6 years ago
Alternatives and similar repositories for LSB-Steganography
Users that are interested in LSB-Steganography are comparing it to the libraries listed below
Sorting:
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆176Updated 5 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Updated last month
- ☆13Updated 2 years ago
- 数字水印project,基于DWT的图像水印项目☆11Updated 2 years ago
- 对抗样本☆274Updated 2 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆69Updated 4 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Updated 4 years ago
- ☆11Updated 8 months ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 6 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆190Updated 3 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Updated 3 years ago
- 武大信息隐藏实验☆20Updated 2 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- Establishing Robust Generative Image Steganography via Popular Stable Diffusion☆49Updated 10 months ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- ☆27Updated 4 years ago
- ☆11Updated 3 years ago
- 这是一个基于同态加密算法实现的隐私保护电子投票系统☆59Updated 3 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆24Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 9 months ago
- ☆50Updated last year
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆97Updated 3 years ago
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Updated 5 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆20Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Updated 2 years ago
- ☆25Updated 5 years ago
- 使用pytorch实现FGSM☆31Updated 4 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago