Attacks against proposed image encryption schemes
☆10Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for image-encryption-scheme-attacks
Users that are interested in image-encryption-scheme-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- The codes of EncryptGAN. EncryptGAN: Towards Assymmetric Image Encryption and Hiding☆15Dec 17, 2021Updated 4 years ago
- This code is for paper "Multiple-image encryption and hiding with an optical diffractive neural network"☆31Dec 29, 2019Updated 6 years ago
- Code for the Secure Triplet Loss approach for biometric template security.☆10Apr 22, 2021Updated 4 years ago
- ☆27Nov 18, 2018Updated 7 years ago
- FHCCS based chaotic image encryption.☆11Oct 7, 2023Updated 2 years ago
- Yet Another Color Gamut Visualizer☆12Jun 1, 2019Updated 6 years ago
- This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, plea…☆13Apr 26, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Image Encryption and Decryption using Neural Networks☆16Oct 14, 2019Updated 6 years ago
- Steganography tools for JPEG images☆10Jul 30, 2013Updated 12 years ago
- MIT Deep Learning Book in PDF format☆18Jan 19, 2017Updated 9 years ago
- Zicx's Notebook.☆10Nov 7, 2025Updated 4 months ago
- crawl profiles of Japanese PornStars from Javhoo.com☆12Feb 8, 2020Updated 6 years ago
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆13Oct 25, 2019Updated 6 years ago
- vins + open_quadtree_mapping☆25Dec 17, 2018Updated 7 years ago
- Official code for "Weakly Supervised Two-Stage Training Scheme for Deep Video Fight Detection Model"☆12Oct 29, 2022Updated 3 years ago
- 无服务端多线程图像加密系统☆16Apr 15, 2025Updated 11 months ago
- Official repository of "TDSD: Text-Driven Scene-Decoupled Weakly Supervised Video Anomaly Detection"☆11May 25, 2025Updated 9 months ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Jul 3, 2019Updated 6 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- ☆21Oct 19, 2017Updated 8 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- TriggerSync is a C++ timing library synchronising the timestamps of multiple triggered sensors with respect to a common clock.☆37Jun 29, 2015Updated 10 years ago
- 计算机图形学课程设计带报告,OpenGL、Qt,图形绘制系统,画图板,release版,exe直接运行☆11Feb 9, 2022Updated 4 years ago
- Add-on library for Keras to train on encrypted images for humans 🛡️☆18Jun 4, 2021Updated 4 years ago
- 自适应中值滤波器对椒盐图像去噪处理☆18Mar 6, 2018Updated 8 years ago
- ☆15Jul 9, 2019Updated 6 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Official code for "FedVAD: Enhancing Federated Video Anomaly Detection with GPT-Driven Semantic Distillation"☆15Jul 13, 2024Updated last year
- Use different orders of N-gram model to play Hangman game.☆16Jun 26, 2021Updated 4 years ago
- Download and create a tfreader for the audioset dataset☆16Apr 16, 2020Updated 5 years ago
- Multimodal late fusion for deepfake detection using video and audio data☆12May 7, 2019Updated 6 years ago
- ☆39Mar 12, 2024Updated 2 years ago
- Models and code for the ICLR 2020 workshop paper "Towards Understanding Normalization in Neural ODEs"☆16Apr 27, 2020Updated 5 years ago
- Reference implementation of divergence triangle https://arxiv.org/abs/1812.10907☆15Mar 24, 2023Updated 2 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆22Jul 6, 2023Updated 2 years ago