☆14Jul 3, 2020Updated 5 years ago
Alternatives and similar repositories for awesome-image-steganography
Users that are interested in awesome-image-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Nov 8, 2021Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- ☆11Jan 24, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PyTorch implementation of various distillation approaches for continual learning of Diffusion Models.☆27Mar 4, 2025Updated last year
- Open-source strong baseline for domain generlization re-ID. We will udpate the strong baseline and CFD method~☆10Nov 30, 2021Updated 4 years ago
- Simple Serial Port Tool Based on pyqt6,基于 pyqt6 的简单串口工具☆10May 11, 2024Updated last year
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- This is a PyTorch implementation of a Transformer Decoder based model that plays chess.☆17Mar 15, 2024Updated 2 years ago
- A lightweight and useful config of PowerShell.☆13Feb 16, 2020Updated 6 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆20Mar 26, 2025Updated last year
- Official code release for Deep Extreme Mixture Model by Wilson, McDonald, Galib, Tan, and Luo.☆10Feb 11, 2022Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Jul 5, 2024Updated last year
- The most detailed matlab version of the jpeg toolbox code and how to use it.☆16May 14, 2020Updated 5 years ago
- Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction☆17Aug 3, 2023Updated 2 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- A list of papers and other resources on deep learning with anime style images.☆17Feb 8, 2018Updated 8 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- ☆14Jun 12, 2022Updated 3 years ago
- The SQALE of CSIDH: Square-root velu Quantum-resistant isogeny Action with Low Exponents☆12Jul 1, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 根据论文:"Minimum Barrier Salient Object Detection At 80 FPS"给出的matlab代码,使用c++重写的。 The c++ implementation on "Minimum Barrier Salient Object …☆10Dec 4, 2016Updated 9 years ago
- This project is a reimplementation of the paper Progressive Growing of GANs for Improved Quality, Stability, and Variation☆12Aug 29, 2025Updated 7 months ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Ranking Models in Unlabeled New Environments (iccv21)☆16Aug 21, 2021Updated 4 years ago
- ☆10Feb 2, 2020Updated 6 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- Unofficial PyTorch implementation of 'Fast and High-Quality Image Denoising via Malleable Convolutions'.☆12Mar 7, 2026Updated 3 weeks ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆15Sep 21, 2020Updated 5 years ago
- Netcan OS is an operation system for x86 PCs, for learning how os works.☆13Jul 15, 2018Updated 7 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- ☆29Jul 26, 2021Updated 4 years ago
- Python (toy) implementation of Gale-Shapley algorithm for the stable marriage problem☆18May 15, 2010Updated 15 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago