hiding an image or text within another image
☆36Jun 18, 2018Updated 7 years ago
Alternatives and similar repositories for steganography
Users that are interested in steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains code and explanation doc for the JP Morgan Quant Challenge, 2018☆11Sep 30, 2018Updated 7 years ago
- Hiding Images within other images using Deep Learning☆215Apr 25, 2018Updated 8 years ago
- Steganography applied to conceal small files inside a PNG image.☆18Mar 27, 2018Updated 8 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- A Telegram bot to conduct your ambulatory assessment study by sending surveys to participants' smartphones.☆13Mar 24, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61May 8, 2020Updated 6 years ago
- A simple python script to wish my friends on facebook on their birthays☆12Mar 28, 2016Updated 10 years ago
- Data augmentation with Back Translation☆14Aug 2, 2019Updated 6 years ago
- Steganography: Hiding an image inside another☆365Apr 13, 2026Updated 3 weeks ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- ☆15Sep 21, 2020Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- The implementations of paper "Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment"☆14Dec 6, 2023Updated 2 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- ☆10Apr 30, 2017Updated 9 years ago
- zero shot side scan sonar image classification☆16Mar 29, 2021Updated 5 years ago
- [TPAMI 2026] Enhancing MMDiT-Based Text-to-Image Models for Similar Subject Generation☆14Mar 7, 2026Updated 2 months ago
- Mininet setup for playing around with static multicast routing☆15Jul 22, 2018Updated 7 years ago
- CS663 course project☆13Nov 22, 2016Updated 9 years ago
- Everything related to competitive programming☆14Oct 29, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Batch-testing for CodeForces : Linux version☆16May 21, 2017Updated 8 years ago
- C# Implement of F5 Algorithm for JPEG Steganography☆18Nov 8, 2023Updated 2 years ago
- Contains all my codes from programming contests☆18Jun 10, 2015Updated 10 years ago
- ☆17Jul 23, 2022Updated 3 years ago
- Application to securely send messages using encryption, decryption and hashing techniques.☆12Dec 7, 2015Updated 10 years ago
- Simple object classification project with deep-learning. We choose CIFAR10, CIFAR100 and Caltech101 as training datasets.☆15Jun 22, 2017Updated 8 years ago
- Cross-connect stdin and stdout of 2 processes and show outputs from each. (No longer maintained)☆16Nov 18, 2020Updated 5 years ago
- ☆11Dec 18, 2024Updated last year
- Code and data release of the paper Enhancing LLM Complex Problem-Solving with Hybrid Thinking and Dynamic Workflows☆15Oct 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Oct 12, 2023Updated 2 years ago
- ☆16Jul 16, 2020Updated 5 years ago
- ☆18Feb 16, 2023Updated 3 years ago
- Injecting watermarks to protein sequences for privacy protection in biosecurity☆10Oct 1, 2024Updated last year
- Adversarial Images for Variational Autoencoders