可逆水印论文复现
☆10Nov 30, 2019Updated 6 years ago
Alternatives and similar repositories for Reversible-Image-Watermarking-Using-Interpolation-Technique
Users that are interested in Reversible-Image-Watermarking-Using-Interpolation-Technique are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Method for automatically segmenting trabecular and cortical bone in CT scans, using Avizo.☆14Sep 26, 2023Updated 2 years ago
- ☆31Mar 11, 2021Updated 5 years ago
- Embed Data Into a Picture reversibly using difference expansion☆10Dec 20, 2013Updated 12 years ago
- Parallel/GPU level set volume segmentation using OpenCL☆18Apr 23, 2019Updated 6 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Dec 11, 2020Updated 5 years ago
- Research & Development of paper "Snake: Active contour models" which is used to identify images using energy functions☆15Feb 16, 2014Updated 12 years ago
- Watermarking on images using Discrete Cosine Transform and Haar Transform☆12Nov 22, 2022Updated 3 years ago
- 众筹案例DApp☆15Jan 24, 2023Updated 3 years ago
- The Calorie Estimation Project can be mainly divided into two parts, identifying food from image, and estimating calorie from certain foo…☆11Jan 6, 2017Updated 9 years ago
- Automatic Segmentation of Knee Cartilage from MRI using Deep Learning☆20May 6, 2021Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- KMean Coreset evaluation and computation.☆12Jun 6, 2017Updated 8 years ago
- An eXtended Center-Symmetric Local Binary Pattern (XCS-LBP) descriptor for background modeling and subtraction in videos.☆16May 9, 2020Updated 5 years ago
- 基于搜索引擎的问答匹配度查询☆11Jun 21, 2023Updated 2 years ago
- A 3D level set method, based on a paper for X-Ray CT segmentation of root systems in WACV 2018.☆25Jul 29, 2019Updated 6 years ago
- 浙江大学区块链大作业-去中心化NFT拍卖平台(前端完善版)☆10Dec 27, 2021Updated 4 years ago
- User-Level Online Mobile Computation Offloading Framework☆11Jan 5, 2019Updated 7 years ago
- DIFFERENCE EXPANSION BASED REVERSIBLE WATERMARKING☆22May 22, 2017Updated 8 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- Utility for converting TLE to Keplerian elements and GMAT code☆12Mar 28, 2020Updated 5 years ago
- ☆34Mar 29, 2023Updated 2 years ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Apr 3, 2022Updated 3 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- NASA General Mission Analysis Tool (GMAT) used as a spacecraft simulator for the Quindar Mission Operations software.☆14Aug 27, 2018Updated 7 years ago
- The source code of the paper "Towards Problem of First Miss under Mobile EdgeCaching"☆11Apr 12, 2021Updated 4 years ago
- 过往收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集☆12Mar 28, 2025Updated 11 months ago
- ☆11Oct 28, 2023Updated 2 years ago
- ☆11Dec 30, 2021Updated 4 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- ☆14Jun 27, 2023Updated 2 years ago
- Code for our NeurIPS 2024 paper Improved Generation of Adversarial Examples Against Safety-aligned LLMs☆12Nov 7, 2024Updated last year
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- A Python project that parses Markdown files into a tree structure, then processes them into semantically meaningful text chunks.☆19Jan 9, 2025Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- clang-format 配置文件,带一个批量格式化项目代码的脚本。☆15Jul 14, 2016Updated 9 years ago
- Adaptive computational oflloading using mobile cloud computing.☆13Apr 30, 2016Updated 9 years ago
- This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Dec 11, 2020Updated 5 years ago
- Classify documents using Python based on SVM and TF-IDF.☆15Nov 19, 2019Updated 6 years ago