☆31Jul 23, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial-steganography
Users that are interested in adversarial-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- A pytorch implementation of Deep Learning Hierarchical Representation for Image Steganalysis (YeNet)☆22Sep 15, 2022Updated 3 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆380Mar 23, 2023Updated 3 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆16Mar 25, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆124Jun 21, 2021Updated 4 years ago
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆23Nov 17, 2024Updated last year
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆55Jan 30, 2018Updated 8 years ago
- ☆42Jan 17, 2021Updated 5 years ago
- A pytorch implementation of Deep Learning for Steganalysis via Convolutional Neural Networks☆19Sep 12, 2022Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆27Sep 13, 2020Updated 5 years ago
- 深度隐写术☆18Oct 28, 2020Updated 5 years ago
- 武大信息隐藏实验☆21May 17, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Light Field Messaging with Deep Photographic Steganography☆44Nov 10, 2020Updated 5 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- Source code of the paper "Zhicheng He, Jie Liu*, Na Li, and Yalou Huang. Learning Network-to-Network Model for Content-rich Network Embed…☆12May 15, 2019Updated 6 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- The source code of "Audio steganalysis with Improved CNN"☆15Jul 13, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generated Audio Samples by ALGAN-VC model are available in the folder☆19Feb 25, 2022Updated 4 years ago
- Hiding Images within other images using Deep Learning☆213Apr 25, 2018Updated 7 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆39Jan 2, 2026Updated 3 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- Image steganalysis based on deep learning☆10Nov 7, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆15Mar 2, 2014Updated 12 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆204Feb 9, 2022Updated 4 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆14Sep 17, 2022Updated 3 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- A steganalysis tool for detecting LSB steganography in images☆239Aug 14, 2018Updated 7 years ago