Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020
☆24Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for StegaText
Users that are interested in StegaText are comparing it to the libraries listed below
Sorting:
- ☆27Sep 9, 2021Updated 4 years ago
- Steganographic text via language models☆25Nov 21, 2022Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆27Dec 29, 2023Updated 2 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- This repository contains the implementations of the MUSIC and ESPRIT algorithms, which can be used for super-resolution spectral analysis…☆23May 13, 2020Updated 5 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- Android extension for JRAW☆29Jun 9, 2018Updated 7 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆16Dec 6, 2014Updated 11 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆14Mar 29, 2024Updated last year
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- This project mainly aims to build a model to predict the Big Five Personality scores of an individual according to a video clip.☆11Jan 17, 2018Updated 8 years ago
- [ICML 2023] Protecting Language Generation Models via Invisible Watermarking☆13Sep 8, 2023Updated 2 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Dec 19, 2019Updated 6 years ago
- Symmetric Delete spelling correction algorithm using Java☆14Aug 26, 2024Updated last year
- ☆11Sep 19, 2017Updated 8 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- ☆14Jan 24, 2021Updated 5 years ago
- Finding Camouflaged Needle in a Haystack? Pornographic Products Detection via Berrypicking Tree Model☆10Jul 29, 2019Updated 6 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Code for reconstructing the object domain contrast function using Born Approximation in inverse scattering problem☆13Jul 30, 2020Updated 5 years ago
- Subsurface Pipes Detection Using DNN-based Back Projection on gprMax Data☆10Jan 19, 2021Updated 5 years ago
- Code for personality detection from image and about text from linkedin user url☆12Feb 15, 2021Updated 5 years ago
- Deep Steganalysis training script☆13May 1, 2025Updated 10 months ago
- ☆11Sep 16, 2019Updated 6 years ago
- A Kodi add-on for Giant Bomb, improved from the original☆13Jan 2, 2020Updated 6 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- A python implementation for computing the PoR metric for video summarization from "Performance over Random: A Robust Evaluation Protocol …☆10May 4, 2022Updated 3 years ago
- A simple cli for displaying ascii gifs☆12Dec 18, 2023Updated 2 years ago
- ☆55Nov 20, 2020Updated 5 years ago
- Using U-Net model to solve Inverse Scattering Problems☆11Aug 8, 2021Updated 4 years ago