liyewen521 / image_recoveryView external linksLinks
The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"
☆11Apr 22, 2021Updated 4 years ago
Alternatives and similar repositories for image_recovery
Users that are interested in image_recovery are comparing it to the libraries listed below
Sorting:
- ☆17Jun 14, 2017Updated 8 years ago
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13May 22, 2019Updated 6 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 3 years ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Apr 3, 2022Updated 3 years ago
- Watermarking Deep Neural Networks☆16Jul 18, 2025Updated 6 months ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- Label propagation algorithm for community detection based on node importance and label influence☆12Feb 15, 2018Updated 7 years ago
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- Code for [Re] On the Reproducibility of Post-Hoc Concept Bottleneck Models.☆12Nov 27, 2024Updated last year
- Matlab code for DCT-based color digital image watermarking.☆10Sep 2, 2020Updated 5 years ago
- Co-processor for whole genome alignment☆13Jun 6, 2020Updated 5 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- A Blockchain Implementation in MATLAB.☆12May 1, 2023Updated 2 years ago
- This repository contains code for the method proposed in the paper: Two-stream Encoder-Decoder Network for Localizing Image Forgeries☆12Nov 12, 2021Updated 4 years ago
- 毕设,分层自嵌入数字水印☆11Sep 2, 2019Updated 6 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆111Mar 11, 2024Updated last year
- ☆12Dec 26, 2018Updated 7 years ago
- ☆12Sep 23, 2020Updated 5 years ago
- 🥤 毕业设计☆15May 8, 2020Updated 5 years ago
- 长沙理工大学网络教学平台爬虫☆10Jul 4, 2022Updated 3 years ago
- Unofficial implementation of 《Towards Photo-Realistic VisibleWatermark Removal with Conditional Generative Adversarial Networks》☆12Feb 24, 2023Updated 2 years ago
- A modern, responsive academic personal website.☆22Apr 5, 2025Updated 10 months ago
- ☆15Aug 16, 2025Updated 5 months ago
- JPEG forgery detection and localization with support vector machines and mode-based first digit features.☆12Jul 28, 2020Updated 5 years ago
- This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".☆13Dec 11, 2020Updated 5 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆15Dec 11, 2020Updated 5 years ago
- GenDP: A Dynamic Programming Framework for Genome Sequencing Analysis☆17Jan 12, 2024Updated 2 years ago
- GenStore is the first in-storage processing system designed for genome sequence analysis that greatly reduces both data movement and comp…☆15Apr 6, 2022Updated 3 years ago
- This repository embed the message into an Image using optimized DWT-DCT☆56Oct 1, 2018Updated 7 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- ☆58Nov 7, 2025Updated 3 months ago
- A Matlab project of Histogram Transfer Based Reversible Data Hiding with Image Enhancement☆15Aug 29, 2020Updated 5 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 5 years ago
- Tensorflow implementation of 'Robust Image Watermarking based on Cross-Attention and Invariant Domain Learning'☆18Nov 11, 2025Updated 3 months ago
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- A comprehensive content-addressable accelerator simulation framework.☆20Nov 15, 2024Updated last year