edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingLinks
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
☆29Updated 5 years ago
Alternatives and similar repositories for Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding
Users that are interested in Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding are comparing it to the libraries listed below
Sorting:
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 4 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Updated 5 years ago
- List for learning image steganography☆34Updated last year
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Updated 6 years ago
- 基于混沌系统和DNA编码运算的图像分块加密算法☆50Updated 7 years ago
- 基于混沌系统和DNA编码的彩色数字图像加密、解密、抗噪声性能分析以及抗裁剪性能分析☆132Updated 5 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆70Updated 4 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-Pixel-Prediction-and-Bit-plane-CompressionThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆15Updated 5 years ago
- ☆54Updated 6 months ago
- 武大信息隐藏实验☆21Updated 2 years ago
- Reversible Data Hiding in Color Image With Grayscale Invariance☆37Updated 2 years ago
- 可逆水印论文复现☆10Updated 6 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Updated 6 years ago
- Implementation of algorithms DCT, DWT watermarking.☆40Updated 2 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆111Updated last year
- The demo of paper "Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry".☆22Updated 2 years ago
- From Image to Imuge: Immunized Image Generation, official code, implemented by PyTorch, ACMMM 2021 paper☆21Updated 3 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆99Updated 3 years ago
- ☆17Updated 8 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆121Updated 4 years ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆71Updated 2 years ago
- This is the code for: Fang, Han, et al. "Screen-shooting resilient watermarking." IEEE Transactions on Information Forensics and Security…☆23Updated 3 years ago
- code repository for Practical Deep Dispersed Watermarking with Synchronization☆71Updated 2 years ago
- FangHanNUS / PIMoG-An-Effective-Screen-shooting-Noise-Layer-Simulation-for-Deep-Learning-Based-Watermarking-NetwThis is the code for paper: ``PIMoG : An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network. .…☆72Updated 3 years ago
- This repository is the official PyTorch implementation of ARWGAN: attention-guided robust image watermarking model based on GAN.☆49Updated 2 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆10Updated 4 years ago
- This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes r…☆14Updated 5 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆198Updated 3 years ago
- A Siamese CNN for Image Steganalysis☆79Updated 5 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆110Updated last year