Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch
☆37Feb 11, 2018Updated 8 years ago
Alternatives and similar repositories for DeepSteg
Users that are interested in DeepSteg are comparing it to the libraries listed below
Sorting:
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Jun 26, 2021Updated 4 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- A collection of default and new, original themes I've found for rutorrent. More will be added as I find them.☆11Jul 30, 2013Updated 12 years ago
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- HiDDeN: Hiding Data with Deep Networks.☆104Dec 12, 2018Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Deep residual network for steganalysis of digital images☆20Aug 1, 2023Updated 2 years ago
- Light Field Messaging with Deep Photographic Steganography☆43Nov 10, 2020Updated 5 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- The PyTorch implementation of our paper "Password-conditioned Anonymization and Deanonymization with Face Identity Transformers" in ECCV …☆34Mar 4, 2021Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- An easy to use boilerplate to kickstart your Wappler project☆11May 8, 2020Updated 5 years ago
- ☆31Jul 23, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- [ACM MM 2021 Oral] Unsupervised Portrait Shadow Removal via Generative Priors☆82Jun 30, 2022Updated 3 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Upload books to Library genesis☆11Aug 10, 2024Updated last year
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago
- PyTorch implementation of “Purified and Unified Steganographic Networks” (CVPR 2024)☆42Jul 14, 2024Updated last year
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- ☆17Feb 6, 2024Updated 2 years ago
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Feb 27, 2021Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Source for the Github Wiki / ReadTheDocs documentation for AchiveBox, the self-hosted internet archiving solution.☆16Aug 1, 2025Updated 7 months ago
- A translation of Apple's sample code MetalBasic3D into Swift☆11Apr 20, 2019Updated 6 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- System check tools that shouldn't be missing from any storage ninja's utility belt☆12Feb 1, 2021Updated 5 years ago
- Image steganography usings Generative Adverserial Networks☆42Oct 12, 2024Updated last year