Hiding Text and Image inside an Image
☆17Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for Steganography
Users that are interested in Steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jul 27, 2023Updated 2 years ago
- I have starred over 2,700 repos on GitHub, and it's difficult to track/organize them. This is a tool to easily visualize and search your …☆22Mar 12, 2023Updated 3 years ago
- Machine Learning for Cyber Security☆48Dec 25, 2019Updated 6 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- A small script to make sure your status isn't updated to 'Away' in your IM by triggering automated actions when you are afk☆11Aug 19, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Image Steganography☆18Dec 17, 2021Updated 4 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Easily share text and files between devices. Local P2P.☆19Jan 24, 2021Updated 5 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- Circular Hough transform is used for detecting circles in images. This is a basic implementation of CHT using Matlab☆22Jul 30, 2025Updated 7 months ago
- ☆16Feb 13, 2018Updated 8 years ago
- Simple object classification project with deep-learning. We choose CIFAR10, CIFAR100 and Caltech101 as training datasets.☆15Jun 22, 2017Updated 8 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple classifier to classify SVHN images, based on Keras with the Tensorflow backend.☆17Feb 26, 2018Updated 8 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- School Assignment☆32Oct 31, 2020Updated 5 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- TupleNet is a lightweight tool for building virtual-networking☆32Mar 7, 2023Updated 3 years ago
- Gym for training an AI to learn Icy Tower through neuroevolution☆37Aug 29, 2021Updated 4 years ago
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Nov 14, 2021Updated 4 years ago
- ☆25Jun 11, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HackerRank's Solutions☆10Apr 2, 2020Updated 5 years ago
- Ensemble Adversarial Training on MNIST with pytorch☆20Apr 17, 2019Updated 6 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Updated this week
- Simply turns Markdown into presentation☆38May 15, 2025Updated 10 months ago
- Utility to auto-adjust the brightness of i3wm workspaces☆13Jan 1, 2023Updated 3 years ago
- Change all links on blog posts and news articles links' to their archive.org snapshot on the date of publication☆12Mar 16, 2025Updated last year
- search different Streaming Platforms for movie titles.☆36Jun 25, 2021Updated 4 years ago
- AGS Fast Wave Function Collapse Plugin☆15Jun 23, 2020Updated 5 years ago
- Gradle + Android Studio + Robolectric + Espresso + Mockito + EasyMock/PowerMock + JaCoCo☆16Oct 24, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Simple implementation of LOGO☆12Jul 24, 2021Updated 4 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆93Mar 24, 2023Updated 3 years ago
- Super cool two factor authentication command line app☆11Mar 22, 2023Updated 3 years ago
- Detection of human emotions from eeg signals using the amigos dataset☆28Jul 15, 2021Updated 4 years ago
- Tinder Automation Bot☆36Jan 4, 2021Updated 5 years ago
- ☆30May 6, 2017Updated 8 years ago