Steganography via adversarial training
☆15Dec 1, 2018Updated 7 years ago
Alternatives and similar repositories for advsteg
Users that are interested in advsteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Jul 23, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- ☆30May 6, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- List for learning image steganography☆35Jun 11, 2024Updated last year
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- [IJCAI'19] Nostalgic Adam: Weighting more of the past gradients when designing the adaptive learning rate☆12Dec 3, 2019Updated 6 years ago
- implement RSA-2048 with C☆10Dec 14, 2019Updated 6 years ago
- [ICCV 2023 CLVL Workshop] Zero-Shot and Few-Shot Video Question Answering with Multi-Modal Prompts☆14Jan 13, 2025Updated last year
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- Introduce a novel Video Trimming (VT) task and proposes an agent-based approach (AVT) for detecting wasted footage, selecting valuable se…☆26Jan 20, 2025Updated last year
- Word2Vec in pure Python☆19Jun 13, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- This repository for studying TraPHic paper (CVPR '18)☆12May 22, 2020Updated 5 years ago
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- ☆15Mar 2, 2014Updated 12 years ago
- Implementation of "Youtube-VOS: Sequence-to-sequence video object segmentation"☆14Oct 15, 2019Updated 6 years ago
- ☆14Sep 6, 2023Updated 2 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Accompanying code for "Weak form generalized Hamiltonian learning"☆11Feb 13, 2021Updated 5 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Go-lang Client of the OpenTSDB implementing the arranged Rest APIs☆23Dec 9, 2019Updated 6 years ago
- A ROS2 bridge for the Stanford Flightroom that takes in quadcopter trajectory data and outputs the corresponding setpoints in PX4.☆12Oct 22, 2024Updated last year
- hiding an image or text within another image☆36Jun 18, 2018Updated 7 years ago
- ☆18May 7, 2025Updated last year
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆381Mar 23, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- Pedestrian Trajectory Prediction with Missing Data: Datasets, Imputation, and Benchmarking (NeurIPS 2024)☆13Feb 16, 2025Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Leveraging Neural Network Gradients within Trajectory Optimization for Proactive Human-Robot Interactions☆14Jul 6, 2023Updated 2 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago