Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020
☆24Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for StegaText
Users that are interested in StegaText are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganographic text via language models☆25Nov 21, 2022Updated 3 years ago
- collection of the SOTA linguistic steganalysis methods☆28Dec 29, 2023Updated 2 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- [TNNLS, to appear] FET-LM: Flow Enhanced Variational Auto-Encoder for Topic-Guided Language Modeling PyTorch Implementation☆14Mar 4, 2023Updated 3 years ago
- ☆12Mar 3, 2025Updated last year
- Group Gated Fusion on Attention-based Bidirectional Alignment for Multimodal Emotion Recognition☆14May 10, 2022Updated 3 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Video Steganography / Watermarking Demo Tool☆10Jan 16, 2022Updated 4 years ago
- ☆14Jan 21, 2025Updated last year
- This code is the official implementation of WEvade.☆41Mar 12, 2024Updated 2 years ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- Code for our S&P'21 paper: Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding☆54Nov 15, 2022Updated 3 years ago
- Code and data for paper "Can LLM Watermarks Robustly Prevent Unauthorized Knowledge Distillation?". (ACL 2025 Main)☆22Jun 18, 2025Updated 9 months ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17May 25, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- This repository includes functions by Carlos López and Alberto González that enable the interchange of information between Matlab and Pol…☆10Nov 19, 2016Updated 9 years ago
- The source code, dataset, and evaluation scripts used for SetRank, published in SIGIR 2018☆15Nov 26, 2021Updated 4 years ago
- Implementation of SurfCon model for Synonym Discovery on Privacy-Aware Clinical Data☆12Jul 6, 2023Updated 2 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- ☆13Dec 18, 2024Updated last year
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- ☆55Nov 20, 2020Updated 5 years ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆31Dec 6, 2025Updated 3 months ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated last year
- This repository contains data and code used for On the Risk of Misinformation Pollution with Large Language Models (EMNLP 2023 Findings).☆16Dec 14, 2023Updated 2 years ago
- Community Detection Based on Structure and Content☆12Oct 12, 2018Updated 7 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Unet, ResUnet, DenseUnet, SE-ResUnet, Dual Attention ResUnet, Attention Gates ResUnet☆18May 8, 2021Updated 4 years ago
- Code and Benchmark Examples for JGR: Solid Earth paper☆15Nov 27, 2023Updated 2 years ago
- A Tensorflow2.x implementation of Pyramid Vision Transformer as described in Pyramid Vision Transformer: A Versatile Backbone for Dense P…☆17Jun 29, 2021Updated 4 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Code of HieRec published in ACL 2021.☆17May 2, 2023Updated 2 years ago