☆31Jul 23, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial-steganography
Users that are interested in adversarial-steganography are comparing it to the libraries listed below
Sorting:
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆57Oct 7, 2017Updated 8 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 8 months ago
- A pytorch implementation of Deep Learning Hierarchical Representation for Image Steganalysis (YeNet)☆22Sep 15, 2022Updated 3 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆138Apr 10, 2018Updated 7 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆375Mar 23, 2023Updated 2 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- Machine learning steganographic image detection.☆15Feb 8, 2017Updated 9 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Fun exercises on image steganography in Python☆13Jun 29, 2017Updated 8 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- PyTorch implementation of 'Cover-separable Fixed Neural Network Steganography via Deep Generative Models' (ACM MM 2024)☆22Nov 17, 2024Updated last year
- ☆18Feb 16, 2023Updated 3 years ago
- 深度隐写术☆18Oct 28, 2020Updated 5 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆50Nov 16, 2022Updated 3 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 8 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- ☆29Jan 7, 2018Updated 8 years ago
- ☆30May 6, 2017Updated 8 years ago
- An open-source toolbox for steganalysis☆197Feb 12, 2026Updated 3 weeks ago
- Hiding Images within other images using Deep Learning☆211Apr 25, 2018Updated 7 years ago
- ☆38May 7, 2020Updated 5 years ago
- A pytorch implementation of Structural Design of Convolutional Neural Networks for Steganalysis (Xunet)☆38Jan 2, 2026Updated 2 months ago
- ☆42Jan 17, 2021Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 深度學習與電腦視覺半百馬拉松☆10Nov 29, 2020Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- Biometrical Solitions (Fingerprint Verification, Face Recognition)☆13Jul 19, 2012Updated 13 years ago
- Image steganalysis based on deep learning☆10Nov 7, 2021Updated 4 years ago
- ☆10Dec 16, 2023Updated 2 years ago