Attacks against proposed image encryption schemes
☆10Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for image-encryption-scheme-attacks
Users that are interested in image-encryption-scheme-attacks are comparing it to the libraries listed below
Sorting:
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- The codes of EncryptGAN. EncryptGAN: Towards Assymmetric Image Encryption and Hiding☆15Dec 17, 2021Updated 4 years ago
- ☆28Nov 18, 2018Updated 7 years ago
- This code is for paper "Multiple-image encryption and hiding with an optical diffractive neural network"☆31Dec 29, 2019Updated 6 years ago
- FHCCS based chaotic image encryption.☆11Oct 7, 2023Updated 2 years ago
- Code for training and evaluation on the "Industrial Language-Image Dataset (ILID)".☆10Jun 4, 2025Updated 8 months ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- ☆10Mar 24, 2023Updated 2 years ago
- Official repository of "TDSD: Text-Driven Scene-Decoupled Weakly Supervised Video Anomaly Detection"☆11May 25, 2025Updated 9 months ago
- Code for the Secure Triplet Loss approach for biometric template security.☆10Apr 22, 2021Updated 4 years ago
- Official code for "Weakly Supervised Two-Stage Training Scheme for Deep Video Fight Detection Model"☆12Oct 29, 2022Updated 3 years ago
- Image Encryption and Decryption using Neural Networks☆16Oct 14, 2019Updated 6 years ago
- Yet Another Color Gamut Visualizer☆12Jun 1, 2019Updated 6 years ago
- ☆11Sep 8, 2024Updated last year
- 计算机图形学课程设计带报告,OpenGL、Qt,图形绘制系统,画图板,release版,exe直接运行☆11Feb 9, 2022Updated 4 years ago
- Steganography tools for JPEG images☆10Jul 30, 2013Updated 12 years ago
- Zicx's Notebook.☆10Nov 7, 2025Updated 3 months ago
- crawl profiles of Japanese PornStars from Javhoo.com☆12Feb 8, 2020Updated 6 years ago
- A challenge to investigate the security of the InstaHide protocol.☆12Dec 7, 2020Updated 5 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 6 years ago
- ☆15Jul 9, 2019Updated 6 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Jul 3, 2019Updated 6 years ago
- 测试平台☆38Nov 3, 2025Updated 4 months ago
- Multimodal late fusion for deepfake detection using video and audio data☆12May 7, 2019Updated 6 years ago
- Unofficial Implementation of Latent Diffusion Models for Layout-to-image Generation☆12Nov 10, 2022Updated 3 years ago
- Hyper-networks for Unified Visual Representation (HUVR) use implicit neural representation to bridge the gap between understanding and ge…☆24Jan 23, 2026Updated last month
- Official code for "FedVAD: Enhancing Federated Video Anomaly Detection with GPT-Driven Semantic Distillation"☆15Jul 13, 2024Updated last year
- Reference implementation of divergence triangle https://arxiv.org/abs/1812.10907☆15Mar 24, 2023Updated 2 years ago
- Industrial Language-Image Dataset (ILID), a web-crawled dataset containing language-image samples from various web catalogs, representing…☆16Jun 4, 2025Updated 8 months ago
- This repository contains source code to train and evaluate the vision-centric foundation model CheXFound.☆23Sep 29, 2025Updated 5 months ago
- This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, plea…☆13Apr 26, 2020Updated 5 years ago
- 无服务端多线程图像加密系统☆16Apr 15, 2025Updated 10 months ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Code for reproducing the experiment results of the paper Imitation Learning with Sinkhorn Distances.☆14Aug 2, 2020Updated 5 years ago
- ☆15Nov 12, 2021Updated 4 years ago
- ☆21Aug 8, 2024Updated last year
- ☆20Updated this week