Steganography via adversarial training
☆15Dec 1, 2018Updated 7 years ago
Alternatives and similar repositories for advsteg
Users that are interested in advsteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Jul 23, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- ☆30May 6, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- [IJCAI'19] Nostalgic Adam: Weighting more of the past gradients when designing the adaptive learning rate☆12Dec 3, 2019Updated 6 years ago
- [ICCV 2023 CLVL Workshop] Zero-Shot and Few-Shot Video Question Answering with Multi-Modal Prompts☆14Jan 13, 2025Updated last year
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- Introduce a novel Video Trimming (VT) task and proposes an agent-based approach (AVT) for detecting wasted footage, selecting valuable se…☆25Jan 20, 2025Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation of "Youtube-VOS: Sequence-to-sequence video object segmentation"☆14Oct 15, 2019Updated 6 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆18May 7, 2025Updated 11 months ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆380Mar 23, 2023Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- Demo code for connecting the Raspberry Pi and the Melexis MLX90620 16x4 thermopile array.☆12May 6, 2015Updated 10 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- PyTorch Official Implementation of DiscriminAtive Masking (NeurIPS 2021)☆13Aug 28, 2024Updated last year
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- [TPAMI 2026] Enhancing MMDiT-Based Text-to-Image Models for Similar Subject Generation☆13Mar 7, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆18Jun 5, 2021Updated 4 years ago
- Stores email header and body information in JSON format☆12Mar 10, 2016Updated 10 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆58Oct 7, 2017Updated 8 years ago
- ☆16Feb 13, 2018Updated 8 years ago
- Mininet setup for playing around with static multicast routing☆15Jul 22, 2018Updated 7 years ago