Provably Secure Steganography
☆26Sep 13, 2025Updated 7 months ago
Alternatives and similar repositories for provably-secure-steganography
Users that are interested in provably-secure-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆55Jun 1, 2025Updated 11 months ago
- ☆15Jun 26, 2023Updated 2 years ago
- A provably secure disambiguating steganography method based on grouping ambiguous pools and synchronous sampling.☆16Apr 24, 2025Updated last year
- ☆54Feb 24, 2024Updated 2 years ago
- ☆12Oct 28, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [TDSC 2025] InferDPT: Privacy-Preserving Inference for Closed-box Large Language Model☆41Nov 16, 2025Updated 5 months ago
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- Audio encoding authentication and validation library for verifying audio as being from a trusted source☆15Jan 6, 2024Updated 2 years ago
- ☆11May 18, 2025Updated 11 months ago
- ☆28Sep 9, 2021Updated 4 years ago
- Code for minimum-entropy coupling.☆33Jan 6, 2026Updated 3 months ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- ☆11Nov 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 4 months ago
- LiveSecBench:动态中文大模型安全榜单☆28Mar 9, 2026Updated last month
- Official implementation of "Data Mixture Inference: What do BPE tokenizers reveal about their training data?"☆18May 15, 2025Updated 11 months ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 7 months ago
- ☆11Sep 14, 2022Updated 3 years ago
- ☆34Nov 3, 2022Updated 3 years ago
- 本项目旨在构建一套多场景下可复用的辅助决策型智能 Agent 系统。通过提取用户输入的关键信息,结合历史数据进行智能匹配,系统可在教育路径、法律咨询、金融投资、心理健康、企业经营、供应链优化、危机应对、智能客服等多个领域提供个性化决策建议。系统采用统一的决策流程设计,具备高…☆25Mar 7, 2026Updated last month
- ConTPL: Controlling Temporal Privacy Leakage in Streaming Data Release with Differential Privacy☆12Sep 7, 2018Updated 7 years ago
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- langgraph的deepagent源码分析☆16Jan 1, 2026Updated 4 months ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- ☆19Jul 18, 2024Updated last year
- Advanced Programming course mid-term Porject☆11Apr 7, 2023Updated 3 years ago
- ☆13Feb 21, 2025Updated last year
- A list Viterbo algorithm for decoding PAC codes with various code constructions/rate-profiles☆11May 6, 2022Updated 4 years ago
- Steganography with help of LLM☆13Apr 28, 2025Updated last year
- ☆21Jul 26, 2025Updated 9 months ago
- [ACL2024-Main] Data and Code for WaterBench: Towards Holistic Evaluation of LLM Watermarks☆31Nov 14, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Oct 19, 2023Updated 2 years ago
- Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.☆27Mar 1, 2026Updated 2 months ago
- ☆22May 23, 2025Updated 11 months ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆16Jan 18, 2023Updated 3 years ago
- 波士顿房价数据集☆17Jan 22, 2022Updated 4 years ago
- Quantifying Differential Privacy under Temporal Correlations☆12Mar 24, 2026Updated last month
- Recommended resources for the "Graph Theory" course at Shahid Beheshti University - Fall 2024☆16Sep 5, 2025Updated 8 months ago