☆52Feb 24, 2024Updated 2 years ago
Alternatives and similar repositories for Robust_Steganography
Users that are interested in Robust_Steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Nov 16, 2025Updated 4 months ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆45Nov 2, 2025Updated 4 months ago
- ☆34Dec 2, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [ICCV 2025] The official code of the paper "Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration R…☆111Jul 9, 2025Updated 8 months ago
- ☆21Jul 26, 2025Updated 8 months ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 5 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆105Nov 30, 2023Updated 2 years ago
- This is the source code of paper FIN: Flow-based Robust Watermarking with Invertible Noise Layer for Black-box Distortions, which is rece…☆63Sep 4, 2024Updated last year
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆116Jun 25, 2024Updated last year
- [CVPR 2024] Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models☆137May 15, 2024Updated last year
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆32Oct 15, 2024Updated last year
- ☆13Feb 21, 2025Updated last year
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆39Jan 2, 2026Updated 2 months ago
- ☆39Aug 30, 2024Updated last year
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆155Jun 12, 2024Updated last year
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆14Oct 17, 2022Updated 3 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- [ICLR 2025] An Undetectable Watermark for Generative Image Models☆71Mar 6, 2025Updated last year
- [IJCAI 2024] Official PyTorch implementation for the paper "DiffStega: Towards Universal Training-Free Coverless Image Steganography with…☆48Feb 28, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆22Nov 17, 2024Updated last year
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆25Jun 14, 2023Updated 2 years ago
- [ACL2024-Main] Data and Code for WaterBench: Towards Holistic Evaluation of LLM Watermarks☆31Nov 14, 2023Updated 2 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆203Feb 9, 2022Updated 4 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- Improved the original repo, 'Invisible Hyperlinks in Physical Photographs', embedded with longer string than the original☆39May 27, 2024Updated last year
- This is an unofficial implementation of the Paper by Kejiang Chen et.al. on Gaussian Shading: Provable Performance-Lossless Image Waterma…☆38Aug 6, 2024Updated last year
- The official implementation of MuST: Robust Image Watermarking for Multi-source Tracing☆26Dec 27, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- This is the code for: Fang, Han, et al. "Screen-shooting resilient watermarking." IEEE Transactions on Information Forensics and Security…☆23Dec 5, 2022Updated 3 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- IStego100K: Large-scale Image Steganalysis Dataset☆70Sep 1, 2020Updated 5 years ago
- A provably secure disambiguating steganography method based on grouping ambiguous pools and synchronous sampling.☆16Apr 24, 2025Updated 11 months ago
- Flow-based generative model for 3D point clouds.☆45Oct 30, 2020Updated 5 years ago