rokkuran / stegasawusLinks
Machine learning steganographic image detection.
☆15Updated 8 years ago
Alternatives and similar repositories for stegasawus
Users that are interested in stegasawus are comparing it to the libraries listed below
Sorting:
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- Deep learning based image steganalysis in spatial domain☆11Updated 7 years ago
- An open-source toolbox for steganalysis☆180Updated 2 months ago
- ☆11Updated 5 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Updated 8 years ago
- Fun exercises on image steganography in Python☆13Updated 8 years ago
- Text steganography based on Markov chains☆34Updated 11 years ago
- ☆21Updated last year
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 7 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Updated 7 years ago
- Hiding Images within other images using Deep Learning☆210Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- Malware Machine Learning☆27Updated 7 years ago
- Information Security using Steganography over Cryptography☆14Updated last year
- a python implement of f5 steganography☆47Updated 13 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- ☆30Updated 8 years ago
- Speedy Camera Fingerprinting Library☆22Updated 3 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 6 years ago
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Updated 6 years ago
- ☆31Updated 4 years ago
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆75Updated 8 years ago
- PDF Malware Parser☆20Updated 9 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆129Updated 7 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Updated 7 years ago
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆21Updated 2 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Updated 9 years ago
- The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"☆13Updated last year
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 6 years ago