Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆62Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for perfectly-secure-steganography
Users that are interested in perfectly-secure-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- Code for minimum-entropy coupling.☆33Jan 6, 2026Updated 2 months ago
- ☆27Sep 9, 2021Updated 4 years ago
- Pulsar: Secure Steganography for Diffusion Models☆15Oct 15, 2024Updated last year
- ☆12Mar 3, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆19Sep 27, 2021Updated 4 years ago
- ☆15Jun 26, 2023Updated 2 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- DAO DAO documentation.☆12Jun 17, 2025Updated 9 months ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Nov 14, 2022Updated 3 years ago
- Smart contracts for the $WYND token and Wynd DAO☆17Apr 13, 2023Updated 2 years ago
- ☆14Nov 11, 2025Updated 4 months ago
- ☆13Sep 1, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- Pin files for contextual, codebase-level AI assistance.☆16Jul 11, 2024Updated last year
- CasaOS Internationalization(i18n) Project☆14Feb 1, 2026Updated last month
- 本项目旨在构建一套多场景下可复用的辅助决策型智能 Agent 系统。通过提取用户输入的关键信息,结合历史数据进行智能匹配,系统可在教育路径、法律咨询、金融投资、心理健康、企业经营、供应链优化、危机应对、智能客服等多个领域提供个性化决策建议。系统采用统一的决策流程设计,具备高…☆23Mar 7, 2026Updated 2 weeks ago
- Java Nostr-Relay, Relay Framework & WebSocket Application Server☆14Mar 19, 2026Updated last week
- ☆16Oct 16, 2024Updated last year
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- langgraph的deepagent源码分析☆15Jan 1, 2026Updated 2 months ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Nov 24, 2016Updated 9 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year
- ☆11Aug 20, 2024Updated last year
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- ☆14Mar 31, 2024Updated last year
- ☆10Mar 4, 2024Updated 2 years ago
- Multiplayer JS game platform☆16Oct 16, 2017Updated 8 years ago
- ☆11Feb 9, 2016Updated 10 years ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆15Mar 2, 2014Updated 12 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- Learn fundamentals of scientific computing for biochemistry using Jupyter notebooks in Python☆16Dec 2, 2025Updated 3 months ago
- Invisible Unicode Messages☆26Aug 27, 2015Updated 10 years ago
- Codes for "NAST: A Non-Autoregressive Generator with Word Alignment for Unsupervised Text Style Transfer" (ACL 2021 findings)☆15Nov 3, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago