Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using images for this exchange? Steganography is what you need! It is one of the techniques of encryption and over the years, steganography has been used to encode a lower resolution image into a higher resolution ima…
☆54Jan 12, 2021Updated 5 years ago
Alternatives and similar repositories for DeepSteganography
Users that are interested in DeepSteganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Feb 27, 2021Updated 5 years ago
- 深度隐写术☆18Oct 28, 2020Updated 5 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆379Mar 23, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆123Jun 21, 2021Updated 4 years ago
- ☆13Dec 18, 2024Updated last year
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- ☆46May 31, 2023Updated 2 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- Machine learning steganographic image detection.☆15Feb 8, 2017Updated 9 years ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- A pytorch implementation of Deep Learning Hierarchical Representation for Image Steganalysis (YeNet)☆22Sep 15, 2022Updated 3 years ago
- ☆27Nov 18, 2018Updated 7 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆102Sep 27, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Robust Encryption of Quantum Medical Images☆11May 20, 2019Updated 6 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆130Apr 1, 2022Updated 4 years ago
- HiDDeN: Hiding Data with Deep Networks.☆105Dec 12, 2018Updated 7 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Wireless spectrum anomaly detector☆15May 10, 2020Updated 5 years ago
- Image steganalysis based on deep learning☆10Nov 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code and tutorial on the E91 quantum key distribution protocol for my Master's thesis and for the "Teach Me QISKit 2018" contest☆13Aug 24, 2021Updated 4 years ago
- The PyTorch implementation of our paper "Password-conditioned Anonymization and Deanonymization with Face Identity Transformers" in ECCV …☆35Mar 4, 2021Updated 5 years ago
- Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing☆11Dec 21, 2018Updated 7 years ago
- Bilinear CNN implementation in keras.☆28Dec 24, 2019Updated 6 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- ☆11Sep 7, 2015Updated 10 years ago
- ☆25Apr 1, 2025Updated last year