Mhzzzzz / ADG-steganographyView external linksLinks
☆27Sep 9, 2021Updated 4 years ago
Alternatives and similar repositories for ADG-steganography
Users that are interested in ADG-steganography are comparing it to the libraries listed below
Sorting:
- collection of the SOTA linguistic steganalysis methods☆27Dec 29, 2023Updated 2 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- ☆26Jun 1, 2020Updated 5 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- ☆12Mar 3, 2025Updated 11 months ago
- ☆23Jun 1, 2020Updated 5 years ago
- Text steganography based on Markov chains☆34Mar 1, 2014Updated 11 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 5 months ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- STEGASURAS: STEGanography via Arithmetic coding and Strong neURAl modelS☆204Jun 18, 2025Updated 7 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- [KBS] PCAE: A Framework of Plug-in Conditional Auto-Encoder for Controllable Text Generation PyTorch Implementation☆26Apr 10, 2023Updated 2 years ago
- This repository contains a pytorch implementation for the paper: Disentangling factors of variation in deep representations using adversa…☆32Aug 14, 2018Updated 7 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Aug 7, 2025Updated 6 months ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- Pytorch version of Continuous Language Generative Flow (ACL 2021)☆11Sep 14, 2021Updated 4 years ago
- ☆36May 29, 2024Updated last year
- ☆42Nov 21, 2023Updated 2 years ago
- Pytorch implementation of CoCon: A Self-Supervised Approach for Controlled Text Generation☆93Jun 3, 2021Updated 4 years ago
- 计算TFIDF的三种方法:Python、sklearn、gensim☆11Feb 26, 2019Updated 6 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- Effective Attention Sheds Light On Interpretability - Findings of ACL2021☆11May 16, 2021Updated 4 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated last year
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 6 years ago
- Data for evaluating GPT-4V☆11Oct 26, 2023Updated 2 years ago
- ☆29Nov 16, 2025Updated 3 months ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- Source code of the paper "The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields".☆17Mar 3, 2025Updated 11 months ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- [EMNLP'23 Oral] ReSee: Responding through Seeing Fine-grained Visual Knowledge in Open-domain Dialogue PyTorch Implementation☆13Dec 4, 2023Updated 2 years ago
- Video Steganography / Watermarking Demo Tool☆10Jan 16, 2022Updated 4 years ago
- ☆57Nov 20, 2020Updated 5 years ago
- Temporary Email Service Within Terminal☆11Aug 4, 2020Updated 5 years ago