A Python interface for Syndrome Trellis Codes Steganography
☆20Mar 3, 2025Updated last year
Alternatives and similar repositories for pySTC
Users that are interested in pySTC are comparing it to the libraries listed below
Sorting:
- Implementation of several Steganography and steganalysis techniques.☆49Nov 20, 2025Updated 3 months ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆38Jan 2, 2026Updated 2 months ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Oct 24, 2022Updated 3 years ago
- PyTorch implementation of image hiding networks☆34Dec 8, 2023Updated 2 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- For CVPR2022 Submission☆10Sep 4, 2022Updated 3 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- SImple Tensorflow implementations of " Image-to-Image Translation with Conditional Adversarial Networks" (CVPR 2017)☆10Apr 11, 2018Updated 7 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- Breaking the Alaska steganalysis challenge☆45Mar 24, 2023Updated 2 years ago
- Improving the Speed and Quality of GAN by Adversarial Training☆11Jan 6, 2021Updated 5 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated 11 months ago
- GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification☆15Mar 25, 2023Updated 2 years ago
- SEU网络自动重连☆13May 24, 2019Updated 6 years ago
- ☆16Nov 16, 2022Updated 3 years ago
- A GAN framework☆66Nov 22, 2022Updated 3 years ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- ☆13Nov 28, 2023Updated 2 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- Code from my research papers☆12May 12, 2022Updated 3 years ago
- script that helps to hide your ports from the public☆13Jul 14, 2018Updated 7 years ago
- Repo for https://hackernoon.com/binary-face-classifier-using-pytorch-2d835ccb7816☆15Mar 12, 2019Updated 6 years ago
- Image data augmentation scheduler for albumentations transforms☆19May 1, 2021Updated 4 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- Chinese language sentiment analysis engine, extracting corpus from Chinese Weibo☆21Mar 2, 2012Updated 14 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆19Dec 6, 2021Updated 4 years ago
- Implement some trivial digital watermark and test its robustness☆17Apr 12, 2019Updated 6 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- Calculating Peak Signal-to-noise-ratio with tensorflow☆16Jan 19, 2018Updated 8 years ago