☆28Sep 9, 2021Updated 4 years ago
Alternatives and similar repositories for ADG-steganography
Users that are interested in ADG-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- ☆26Jun 1, 2020Updated 5 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Apr 21, 2021Updated 4 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Steganographic text via language models☆25Nov 21, 2022Updated 3 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 10 months ago
- ☆15Jun 26, 2023Updated 2 years ago
- ☆12Mar 3, 2025Updated last year
- Text steganography based on Markov chains☆36Mar 1, 2014Updated 12 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- ☆23Jun 1, 2020Updated 5 years ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆46Nov 2, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Provably Secure Steganography☆14Sep 13, 2025Updated 7 months ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Nov 14, 2022Updated 3 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- [KBS] PCAE: A Framework of Plug-in Conditional Auto-Encoder for Controllable Text Generation PyTorch Implementation☆26Apr 10, 2023Updated 3 years ago
- 数字水印project,基于DWT的图像水印项目☆11Jun 22, 2023Updated 2 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- ☆14Apr 11, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Attacks against proposed image encryption schemes☆10Apr 27, 2020Updated 5 years ago
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- ☆11Nov 27, 2024Updated last year
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Code for paper "Dependency-based Mixture Language Models" by Zhixian Yang, and Xiaojun Wan. This paper is accepted by ACL 2022 Main Confe…☆26May 27, 2022Updated 3 years ago
- 本项目旨在构建一套多场景下可复用的辅助决策型智能 Agent 系统。通过提取用户输入的关键信息,结合历史数据进行智能匹配,系统可在教育路径、法律咨询、金融投资、心理健康、企业经营、供应链优化、危机应对、智能客服等多个领域提供个性化决策建议。系统采用统一的决策流程设计,具备高…☆25Mar 7, 2026Updated last month
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆13Oct 25, 2019Updated 6 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆22Mar 21, 2023Updated 3 years ago
- Pytorch implementation of CoCon: A Self-Supervised Approach for Controlled Text Generation☆93Jun 3, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆74Mar 6, 2025Updated last year
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- text generation from keywords using transformer model☆12Nov 2, 2019Updated 6 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Steganography with help of LLM☆13Apr 28, 2025Updated 11 months ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago