YassineYousfi / alaskaLinks
Breaking the Alaska steganalysis challenge
☆45Updated 2 years ago
Alternatives and similar repositories for alaska
Users that are interested in alaska are comparing it to the libraries listed below
Sorting:
- ☆30Updated 8 years ago
- A python package for accessing the internal variables of JPEG file format such as DCT coefficients and quantization tables☆79Updated last year
- IStego100K: Large-scale Image Steganalysis Dataset☆70Updated 5 years ago
- ☆27Updated 3 years ago
- The unofficial https://deepfakedetectionchallenge.ai/ github repo. A quick and easy way to get insight to current progress and previous w…☆89Updated 6 years ago
- Hiding Images within other images using Deep Learning☆210Updated 7 years ago
- Pytorch implementation of convolutional neural network adversarial attack techniques☆364Updated 7 years ago
- Training codebase for our solution to Kaggle's Deepfake Detection Challenge☆65Updated 4 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Updated 9 years ago
- Repo of simple adversarial examples on vanilla neural networks trained on MNIST☆121Updated 5 years ago
- Computer Graphics vs Real Photographic Images : A Deep-learning approach☆26Updated 6 years ago
- Copy-Move forgery database with similar but Genuine objects. ICIP2016 paper☆43Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- Keras implementation of BlurPool layers described in "Making Convolutional Networks Shift-Invariant Again" (Zhang)☆39Updated 3 years ago
- Code from my research papers☆12Updated 3 years ago
- Data independent universal adversarial perturbations☆63Updated 5 years ago
- Countering Adversarial Image using Input Transformations.☆497Updated 4 years ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆71Updated 4 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 7 years ago
- a residual network for image steganalysis☆18Updated 8 years ago
- ☆18Updated 2 years ago
- Some notes, tutorials, and some experimentation with the fast.ai library (https://github.com/fastai/fastai)☆58Updated 7 years ago
- A simpler version of the self-attention layer from SAGAN, and some image classification results.☆214Updated 6 years ago
- 🕵️♂️ Interpreting Convolutional Neural Network (CNN) Results.☆176Updated last year
- Keras Implementation of EfficientNets☆185Updated 5 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- Code for reproducing 2nd place solution for Kaggle competition IEEE's Signal Processing Society - Camera Model Identification☆67Updated 7 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130Updated 2 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆71Updated 7 years ago
- ☆66Updated 7 years ago