GuanshuoXu / caffe_deep_learning_for_steganalysisLinks
☆30Updated 8 years ago
Alternatives and similar repositories for caffe_deep_learning_for_steganalysis
Users that are interested in caffe_deep_learning_for_steganalysis are comparing it to the libraries listed below
Sorting:
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Updated 8 years ago
- Deep learning based image steganalysis in spatial domain☆11Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 5 years ago
- Breaking the Alaska steganalysis challenge☆45Updated 2 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆66Updated 4 years ago
- ☆18Updated 2 years ago
- a residual network for image steganalysis☆18Updated 7 years ago
- Steganalysis based deep learning☆57Updated 5 years ago
- some code for deep steganalysis☆1Updated 7 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 7 years ago
- Hiding Images within other images using Deep Learning☆211Updated 7 years ago
- 🍿️some awesome Steganalysis☆37Updated 7 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆127Updated 7 years ago
- Code from my research papers☆12Updated 3 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
- ☆31Updated 4 years ago
- Computer Graphics vs Real Photographic Images : A Deep-learning approach☆27Updated 5 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆39Updated 7 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆93Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- Python implementation of PRNU extractor☆76Updated 2 years ago
- HiDDeN: Hiding Data with Deep Networks.☆97Updated 6 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆13Updated 2 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 6 years ago
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆10Updated 5 years ago
- Illuminant inconsistencies for image splicing detection in forensics☆44Updated 8 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 6 years ago
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- Image Forgery Detection using Deep Learning, implemented in PyTorch.☆58Updated 2 years ago