Learning Iterative Neural Optimizers for Image Steganography
☆23Jun 24, 2025Updated 10 months ago
Alternatives and similar repositories for LISO
Users that are interested in LISO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Apr 24, 2023Updated 3 years ago
- ☆14Sep 17, 2022Updated 3 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- [AAAI 2024] StegFormer: Rebuilding the Glory of the Autoencoder-Based Steganography☆35Apr 23, 2024Updated 2 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆24Mar 21, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [IJCAI 2024] Official PyTorch implementation for the paper "DiffStega: Towards Universal Training-Free Coverless Image Steganography with…☆49Feb 28, 2025Updated last year
- Accepted by CVPR 2023☆51Jun 13, 2023Updated 2 years ago
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 4 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆205Feb 9, 2022Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆381Mar 23, 2023Updated 3 years ago
- RoSteALS: Robust Steganography using Autoencoder Latent Space☆107Nov 30, 2023Updated 2 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IStego100K: Large-scale Image Steganalysis Dataset☆69Sep 1, 2020Updated 5 years ago
- A Siamese CNN for Image Steganalysis☆82Oct 27, 2020Updated 5 years ago
- [NeurIPS 2023] Official PyTorch implementation for the paper "CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganog…☆156Jun 12, 2024Updated last year
- ☆13Dec 18, 2024Updated last year
- ☆16Jun 5, 2024Updated last year
- Official repository of "DeepMIH: Deep Invertible Network for Multiple Image Hiding", TPAMI 2022.☆131Apr 1, 2022Updated 4 years ago
- Hide Your secret video inside another video☆72Mar 19, 2025Updated last year
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 9 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Nov 8, 2021Updated 4 years ago
- New non-Gatech GitHub☆12Dec 8, 2021Updated 4 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- Official code for StegoGAN: Leveraging Steganography for Non-bijective Image-to-Image Translation☆60Nov 7, 2024Updated last year
- ☆56Nov 20, 2020Updated 5 years ago
- How to Add Filtering & Pagination to Your Data Tables With Hotwire☆13Apr 22, 2022Updated 4 years ago
- Patch-Diffusion Code (AAAI2022)☆13Mar 3, 2022Updated 4 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated 2 years ago
- Hide image in audio. Image in audio steganography with deep learning. Deep learning-based psychoacoustic steganography within earshot.☆28Sep 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction☆17Aug 3, 2023Updated 2 years ago
- ToDo App☆11Jan 19, 2023Updated 3 years ago
- Code for Preventing Language Models From Hiding Their Reasoning, which evaluates defenses against LLM steganography.☆25Jan 26, 2024Updated 2 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Apr 21, 2021Updated 5 years ago
- This program can encrypt secret messages using a combination of RC4 and base 64 cryptographic algorithms then insert them into image file…☆10Jan 22, 2020Updated 6 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆27Sep 13, 2020Updated 5 years ago