alexandremuzio / deep-stegView external linksLinks
Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"
☆54Jan 30, 2018Updated 8 years ago
Alternatives and similar repositories for deep-steg
Users that are interested in deep-steg are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆37Feb 11, 2018Updated 8 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆135Apr 10, 2018Updated 7 years ago
- Hiding Images in Plain Sight: Deep Steganography☆39Jun 18, 2018Updated 7 years ago
- Hiding Images within other images using Deep Learning☆210Apr 25, 2018Updated 7 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Jun 26, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- Code from my research papers☆12May 12, 2022Updated 3 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆371Mar 23, 2023Updated 2 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- ☆31Jul 23, 2021Updated 4 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- ☆13Sep 17, 2022Updated 3 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆57Oct 7, 2017Updated 8 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- Adversarial Images for Variational Autoencoders☆13Nov 30, 2016Updated 9 years ago
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆129Apr 1, 2022Updated 3 years ago
- ☆53Apr 24, 2023Updated 2 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- ☆54Jun 27, 2025Updated 7 months ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆27Aug 21, 2023Updated 2 years ago
- HiDDeN: Hiding Data with Deep Networks.☆104Dec 12, 2018Updated 7 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- ☆28Jun 27, 2022Updated 3 years ago
- ☆30Oct 13, 2018Updated 7 years ago
- Invisible Hyperlinks in Physical Photographs☆817Dec 8, 2023Updated 2 years ago
- A Siamese CNN for Image Steganalysis☆81Oct 27, 2020Updated 5 years ago
- WIL is like my personal diary, where I jot down all the exciting things I've learned on my journey as a computer science enthusiast! 📝💻☆10Nov 24, 2024Updated last year
- A mainstream audio & video player service that puts accessibility first —☆13Aug 12, 2024Updated last year
- 一步步带你通过项目(MNIST手写识别)学习入门TensorFlow以及神经网络的知识☆11Oct 5, 2018Updated 7 years ago
- hiding an image or text within another image☆36Jun 18, 2018Updated 7 years ago