☆26Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for VAE-Stega
Users that are interested in VAE-Stega are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Jun 1, 2020Updated 5 years ago
- ☆27Sep 9, 2021Updated 4 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- ☆14Nov 11, 2025Updated 4 months ago
- ☆13Dec 18, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆101Sep 27, 2022Updated 3 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- ☆12Mar 3, 2025Updated last year
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- Official repository for the paper "Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach"…☆33Dec 30, 2020Updated 5 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆53Nov 15, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- anonymous github for SGSR: Beyond Social Homophily: Score-based Generative Diffusion Models for Social Recommendations☆12Sep 18, 2025Updated 6 months ago
- ☆32Jul 9, 2019Updated 6 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆39Jan 2, 2026Updated 2 months ago
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- Scripts to prepare OXFORD VGG Face dataset☆12Mar 29, 2016Updated 10 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- ☆23Aug 24, 2020Updated 5 years ago
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Oct 19, 2023Updated 2 years ago
- A set of MATLAB scripts to perform pulse compression and produce radargrams from SHARAD EDR data☆10Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Apr 23, 2019Updated 6 years ago
- This repository includes functions by Carlos López and Alberto González that enable the interchange of information between Matlab and Pol…☆10Nov 19, 2016Updated 9 years ago
- The official code repository for our TGRS paper "DiffusionEMIS: Diffusion Model for 3D Electromagnetic Inverse Scattering".☆16Mar 18, 2024Updated 2 years ago
- Pytorch implementation of Deep Convolutional Generative Adversarial Networks (DCGAN) for humanface datasets, which can genarate some bea…☆18Apr 24, 2018Updated 7 years ago
- This repository shows the implementation of the Trained Born Iterative Method (TBIM) applied for electromagnetic imaging.☆12Nov 9, 2022Updated 3 years ago
- ☆17Sep 16, 2023Updated 2 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆51Mar 10, 2020Updated 6 years ago
- Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction☆17Aug 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Jan 25, 2022Updated 4 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆72Oct 27, 2021Updated 4 years ago
- Processing package to stack, sort and run a velocity analysis on seismic and Ground Penetrating Radar data☆13Jun 9, 2019Updated 6 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- A Hybrid Method of Exponential Smoothing and Recurrent Neural Networks for Multivariate Time Series Forecasting☆13Oct 25, 2022Updated 3 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago