Steganography via adversarial training
☆15Dec 1, 2018Updated 7 years ago
Alternatives and similar repositories for advsteg
Users that are interested in advsteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Jul 23, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- ☆30May 6, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- [IJCAI'19] Nostalgic Adam: Weighting more of the past gradients when designing the adaptive learning rate☆12Dec 3, 2019Updated 6 years ago
- implement RSA-2048 with C☆10Dec 14, 2019Updated 6 years ago
- [ICCV 2023 CLVL Workshop] Zero-Shot and Few-Shot Video Question Answering with Multi-Modal Prompts☆14Jan 13, 2025Updated last year
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- Introduce a novel Video Trimming (VT) task and proposes an agent-based approach (AVT) for detecting wasted footage, selecting valuable se…☆23Jan 20, 2025Updated last year
- Word2Vec in pure Python☆19Jun 13, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- This repository for studying TraPHic paper (CVPR '18)☆12May 22, 2020Updated 5 years ago
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- ☆15Mar 2, 2014Updated 12 years ago
- Implementation of "Youtube-VOS: Sequence-to-sequence video object segmentation"☆14Oct 15, 2019Updated 6 years ago
- ☆14Sep 6, 2023Updated 2 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Accompanying code for "Weak form generalized Hamiltonian learning"☆11Feb 13, 2021Updated 5 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Go-lang Client of the OpenTSDB implementing the arranged Rest APIs☆23Dec 9, 2019Updated 6 years ago
- A ROS2 bridge for the Stanford Flightroom that takes in quadcopter trajectory data and outputs the corresponding setpoints in PX4.☆12Oct 22, 2024Updated last year
- hiding an image or text within another image☆36Jun 18, 2018Updated 7 years ago
- ☆18May 7, 2025Updated 10 months ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆377Mar 23, 2023Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- Pedestrian Trajectory Prediction with Missing Data: Datasets, Imputation, and Benchmarking (NeurIPS 2024)☆13Feb 16, 2025Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Leveraging Neural Network Gradients within Trajectory Optimization for Proactive Human-Robot Interactions☆14Jul 6, 2023Updated 2 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago