mohammedAcheddad / DRM-using-Watermarking-and-blockchainLinks
a digital rights management system based on DWT/LSB steganography and blockchain
☆15Updated 3 years ago
Alternatives and similar repositories for DRM-using-Watermarking-and-blockchain
Users that are interested in DRM-using-Watermarking-and-blockchain are comparing it to the libraries listed below
Sorting:
- ☆11Updated 8 months ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 5 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- An implementation of S-UNIWARD steganography in python☆22Updated 5 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Updated last week
- Python Steganography data hiding in image☆10Updated 3 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Updated 6 years ago
- ☆13Updated 2 years ago
- ☆55Updated 5 years ago
- ☆11Updated 5 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆101Updated 2 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆40Updated 5 months ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Updated 2 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆16Updated 2 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 6 years ago
- Deep Steganalysis training script☆12Updated 6 months ago
- Image steganography usings Generative Adverserial Networks☆41Updated last year
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
- Joint adjustment image steganography networks☆10Updated 2 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 6 years ago
- An open-source toolbox for steganalysis☆186Updated last month
- Steganography via adversarial training☆15Updated 6 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆63Updated 4 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆22Updated 5 months ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆107Updated last year
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- Hiding Images in Plain Sight: Deep Steganography☆39Updated 7 years ago