YangzlTHU / Linguistic-Steganography-and-SteganalysisLinks
☆33Updated 2 years ago
Alternatives and similar repositories for Linguistic-Steganography-and-Steganalysis
Users that are interested in Linguistic-Steganography-and-Steganalysis are comparing it to the libraries listed below
Sorting:
- ☆27Updated 4 years ago
- ☆25Updated 5 years ago
- ☆23Updated 5 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆23Updated 5 years ago
- ☆20Updated 4 years ago
- collection of the SOTA linguistic steganalysis methods☆25Updated last year
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 6 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- ☆15Updated 5 years ago
- ☆12Updated 2 months ago
- ☆11Updated 8 months ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- IStego100K: Large-scale Image Steganalysis Dataset☆68Updated 5 years ago
- Implementation of several Steganography and steganalysis techniques.☆49Updated 2 weeks ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆96Updated 3 years ago
- ☆11Updated 5 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆53Updated 8 years ago
- An implementation of S-UNIWARD steganography in python☆22Updated 5 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
- ☆18Updated 2 years ago
- 深度隐写术☆17Updated 5 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- A Siamese CNN for Image Steganalysis☆77Updated 5 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆27Updated 2 years ago
- Pytorch implementation of paper "HiDDeN: Hiding Data With Deep Networks" by Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei☆399Updated last year
- ☆13Updated 2 years ago